Merge ~gboutry/ubuntu/+source/horizon:stable/2024.1 into ~ubuntu-openstack-dev/ubuntu/+source/horizon:stable/2024.1

Proposed by Guillaume Boutry
Status: Needs review
Proposed branch: ~gboutry/ubuntu/+source/horizon:stable/2024.1
Merge into: ~ubuntu-openstack-dev/ubuntu/+source/horizon:stable/2024.1
Diff against target: 42017 lines (+3386/-2073)
74 files modified
AUTHORS (+3/-0)
ChangeLog (+22/-0)
PKG-INFO (+117/-58)
debian/changelog (+7/-2)
debian/patches/series (+0/-1)
dev/null (+0/-508)
doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po (+21/-3)
doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po (+16/-3)
doc/source/locale/en_GB/LC_MESSAGES/doc-install.po (+13/-3)
horizon.egg-info/PKG-INFO (+117/-58)
horizon.egg-info/SOURCES.txt (+1/-7)
horizon.egg-info/entry_points.txt (+0/-1)
horizon.egg-info/pbr.json (+1/-1)
horizon.egg-info/requires.txt (+33/-33)
openstack_auth/policy.py (+5/-2)
openstack_dashboard/api/keystone.py (+1/-1)
openstack_dashboard/api/neutron.py (+2/-1)
openstack_dashboard/api/placement.py (+51/-25)
openstack_dashboard/conf/default_policies/cinder.yaml (+483/-206)
openstack_dashboard/conf/default_policies/glance.yaml (+228/-70)
openstack_dashboard/conf/default_policies/keystone.yaml (+463/-314)
openstack_dashboard/conf/default_policies/neutron.yaml (+820/-458)
openstack_dashboard/conf/default_policies/nova.yaml (+700/-150)
openstack_dashboard/dashboards/admin/backups/tables.py (+3/-1)
openstack_dashboard/dashboards/admin/backups/templates/backups/_detail_overview.html (+2/-0)
openstack_dashboard/dashboards/identity/projects/tabs.py (+9/-4)
openstack_dashboard/dashboards/identity/projects/tests.py (+17/-10)
openstack_dashboard/dashboards/project/backups/tables.py (+3/-0)
openstack_dashboard/dashboards/project/backups/templates/backups/_detail_overview.html (+2/-0)
openstack_dashboard/dashboards/project/floating_ips/tables.py (+1/-3)
openstack_dashboard/dashboards/project/networks/ports/extensions/allowed_address_pairs/tables.py (+2/-2)
openstack_dashboard/dashboards/project/networks/ports/tests.py (+2/-2)
openstack_dashboard/dashboards/project/volumes/forms.py (+5/-2)
openstack_dashboard/locale/as/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/bn_IN/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/brx/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/cs/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/de/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/en_AU/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/en_GB/LC_MESSAGES/django.po (+72/-5)
openstack_dashboard/locale/en_GB/LC_MESSAGES/djangojs.po (+35/-2)
openstack_dashboard/locale/eo/LC_MESSAGES/django.po (+72/-5)
openstack_dashboard/locale/es/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/fr/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/gu/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/hi/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/id/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/it/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ja/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ka_GE/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/kn/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ko_KR/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/kok/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ks/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/mai/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/mni/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/mr/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ne/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/pa_IN/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/pl_PL/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/pt_BR/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ru/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ta/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/tr_TR/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/ur/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/zh_Hans/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/locale/zh_Hant/LC_MESSAGES/django.po (+1/-4)
openstack_dashboard/management/commands/dump_default_policies.py (+2/-2)
openstack_dashboard/static/app/core/metadata/metadata.service.js (+1/-1)
openstack_dashboard/static/app/core/openstack-service-api/common-test.mock.js (+8/-1)
openstack_dashboard/static/app/core/openstack-service-api/swift.service.js (+1/-0)
openstack_dashboard/static/app/core/openstack-service-api/swift.service.spec.js (+6/-2)
releasenotes/notes/change-metadef-for-cinder-volume-type-f65dd215d2a3ce75.yaml (+6/-0)
tox.ini (+2/-2)
Reviewer Review Type Date Requested Status
Ubuntu Sponsors Pending
Ubuntu OpenStack uploaders Pending
Review via email: mp+487195@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Guillaume Boutry (gboutry) wrote :

The bug reports contains the debdiff.

Unmerged commits

41f5b5f... by Guillaume Boutry

d/chanlog: mentionned dropped patches

Signed-off-by: Guillaume Boutry <email address hidden>

Succeeded
[SUCCEEDED] ubuntu-build:0 (build)
[SUCCEEDED] ubuntu-autopkgtest:0 (build)
[SUCCEEDED] cloud-archive-build:0 (build)
[SUCCEEDED] cloud-archive-autopkgtest:0 (build)
14 of 4 results
85bf4cf... by Guillaume Boutry

d/p/lp2054799.patch: drop integrated patch

Signed-off-by: Guillaume Boutry <email address hidden>

927ef9d... by Guillaume Boutry

New upstream release for OpenStack Caracal. (LP: #2110279)

dfb1a73... by Guillaume Boutry

Merging upstream release 24.0.1

9eb8dee... by Guillaume Boutry

New upstream version 24.0.1

9eb5160... by James Page

New upstream version 25.0.0

06a798e... by James Page

New upstream version 25.0.0+git2024080809.d171cee3

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/AUTHORS b/AUTHORS
2index 22f3602..4f99bfd 100644
3--- a/AUTHORS
4+++ b/AUTHORS
5@@ -735,6 +735,7 @@ Tim Schnell <tim.schnell@rackspace.com>
6 Timur Sufiev <tsufiev@gmail.com>
7 Timur Sufiev <tsufiev@mirantis.com>
8 Tin Lam <tin@irrational.io>
9+Tobias Urdin <tobias.urdin@binero.com>
10 Tobias Urdin <tobias.urdin@binero.se>
11 Todd Willey <todd@ansolabs.com>
12 Tom Fifield <fifieldt@unimelb.edu.au>
13@@ -979,6 +980,7 @@ utsav dusad <utsavdusad@gmail.com>
14 utsavdusad <utsavdusad@gmail.com>
15 veena <mveenasl@gmail.com>
16 venkatamahesh <venkatamaheshkotha@gmail.com>
17+viktorkrivak <viktor.krivak@ultimum.io>
18 vinay_m <vinay.harsha@tcs.com>
19 vmarkov <vmarkov@mirantis.com>
20 wangbo <wangbo_bupt@163.com>
21@@ -996,6 +998,7 @@ yan.haifeng <haifeng.yan@hp.com>
22 yanghuichan <yanghc@fiberhome.com>
23 yangyapeng <yang.yapeng@99cloud.net>
24 yaraat <Yaraat@gmail.com>
25+yatinkarel <ykarel@redhat.com>
26 yfzhao <dsware@126.com>
27 yong sheng gong <gong.yongsheng@99cloud.net>
28 yuanke wei <weiyuanke123@gmail.com>
29diff --git a/ChangeLog b/ChangeLog
30index 62bd2ca..61ad329 100644
31--- a/ChangeLog
32+++ b/ChangeLog
33@@ -1,6 +1,28 @@
34 CHANGES
35 =======
36
37+24.0.1
38+------
39+
40+* Fix typo in metadef for Cinder Volume Type
41+* Force scope when listing domains
42+* Move deprecated since/reason to deprecated\_rule object
43+* Fix generation of inventory capacities
44+* Imported Translations from Zanata
45+* Delete container show duplicate toast notifications
46+* Fix Placement statistics display
47+* Sort image source choices by name for volume
48+* Fix floating IP associated to unbound port
49+* Fix allowed address pair row unique ID
50+* Show Created At column for backups table
51+* Show availability zone for volume backups
52+* Imported Translations from Zanata
53+* Respect SSL settings in placement API
54+* Fix Users/Groups tab list when a domain context is set
55+* Imported Translations from Zanata
56+* Update TOX\_CONSTRAINTS\_FILE for stable/2024.1
57+* Update .gitreview for stable/2024.1
58+
59 24.0.0
60 ------
61
62diff --git a/PKG-INFO b/PKG-INFO
63index b7dca79..ca6115f 100644
64--- a/PKG-INFO
65+++ b/PKG-INFO
66@@ -1,66 +1,10 @@
67-Metadata-Version: 1.2
68+Metadata-Version: 2.1
69 Name: horizon
70-Version: 24.0.0
71+Version: 24.0.1
72 Summary: OpenStack Dashboard
73 Home-page: https://docs.openstack.org/horizon/latest/
74 Author: OpenStack
75 Author-email: openstack-discuss@lists.openstack.org
76-License: UNKNOWN
77-Description: =============================
78- Horizon (OpenStack Dashboard)
79- =============================
80-
81- Horizon is a Django-based project aimed at providing a complete OpenStack
82- Dashboard along with an extensible framework for building new dashboards
83- from reusable components. The ``openstack_dashboard`` module is a reference
84- implementation of a Django site that uses the ``horizon`` app to provide
85- web-based interactions with the various OpenStack projects.
86-
87- * Project documentation: https://docs.openstack.org/horizon/latest/
88- * Release management: https://launchpad.net/horizon
89- * Blueprints and feature specifications: https://blueprints.launchpad.net/horizon
90- * Issue tracking: https://bugs.launchpad.net/horizon
91- * Release notes: https://docs.openstack.org/releasenotes/horizon/
92-
93- .. image:: https://governance.openstack.org/tc/badges/horizon.svg
94- :target: https://governance.openstack.org/tc/reference/tags/
95-
96- Using Horizon
97- =============
98-
99- See ``doc/source/install/index.rst`` about how to install Horizon
100- in your OpenStack setup. It describes the example steps and
101- has pointers for more detailed settings and configurations.
102-
103- It is also available at
104- `Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_.
105-
106- Getting Started for Developers
107- ==============================
108-
109- ``doc/source/quickstart.rst`` or
110- `Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_
111- describes how to setup Horizon development environment and start development.
112-
113- Building Contributor Documentation
114- ==================================
115-
116- This documentation is written by contributors, for contributors.
117-
118- The source is maintained in the ``doc/source`` directory using
119- `reStructuredText`_ and built by `Sphinx`_
120-
121- .. _reStructuredText: http://docutils.sourceforge.net/rst.html
122- .. _Sphinx: http://sphinx-doc.org/
123-
124- To build the docs, use::
125-
126- $ tox -e docs
127-
128- Results are in the ``doc/build/html`` directory
129-
130-
131-Platform: UNKNOWN
132 Classifier: Development Status :: 5 - Production/Stable
133 Classifier: Environment :: OpenStack
134 Classifier: Framework :: Django
135@@ -77,3 +21,118 @@ Classifier: Programming Language :: Python :: 3.8
136 Classifier: Programming Language :: Python :: 3.9
137 Classifier: Topic :: Internet :: WWW/HTTP
138 Requires-Python: >=3.8
139+License-File: LICENSE
140+Requires-Dist: pbr>=5.5.0
141+Requires-Dist: Babel>=2.6.0
142+Requires-Dist: debtcollector>=1.2.0
143+Requires-Dist: Django<4.3,>=4.2
144+Requires-Dist: django-compressor>=2.4.1
145+Requires-Dist: django-debreach>=1.4.2
146+Requires-Dist: django-pyscss>=2.0.3
147+Requires-Dist: futurist>=1.2.0
148+Requires-Dist: iso8601>=0.1.11
149+Requires-Dist: keystoneauth1>=4.3.1
150+Requires-Dist: netaddr>=0.7.18
151+Requires-Dist: oslo.concurrency>=4.5.0
152+Requires-Dist: oslo.config>=8.8.0
153+Requires-Dist: oslo.i18n>=5.1.0
154+Requires-Dist: oslo.policy>=3.11.0
155+Requires-Dist: oslo.serialization>=4.3.0
156+Requires-Dist: oslo.upgradecheck>=1.5.0
157+Requires-Dist: oslo.utils>=4.12.0
158+Requires-Dist: osprofiler>=3.4.2
159+Requires-Dist: pymongo!=3.1,>=3.0.2
160+Requires-Dist: pyScss>=1.4.0
161+Requires-Dist: python-cinderclient>=8.0.0
162+Requires-Dist: python-glanceclient>=2.8.0
163+Requires-Dist: python-keystoneclient>=3.22.0
164+Requires-Dist: python-neutronclient>=8.1.0
165+Requires-Dist: python-novaclient>=9.1.0
166+Requires-Dist: python-swiftclient>=3.2.0
167+Requires-Dist: pytz>=2013.6
168+Requires-Dist: PyYAML>=6.0
169+Requires-Dist: requests>=2.25.1
170+Requires-Dist: semantic-version>=2.3.1
171+Requires-Dist: XStatic>=1.0.3
172+Requires-Dist: XStatic-Angular>=1.8.2.2
173+Requires-Dist: XStatic-Angular-Bootstrap>=2.2.0.0
174+Requires-Dist: XStatic-Angular-FileUpload>=12.0.4.0
175+Requires-Dist: XStatic-Angular-Gettext>=2.3.8.0
176+Requires-Dist: XStatic-Angular-lrdragndrop>=1.0.2.2
177+Requires-Dist: XStatic-Angular-Schema-Form>=0.8.13.0
178+Requires-Dist: XStatic-Bootstrap-Datepicker>=1.3.1.0
179+Requires-Dist: XStatic-Bootstrap-SCSS>=3.3.7.1
180+Requires-Dist: XStatic-bootswatch>=3.3.7.0
181+Requires-Dist: XStatic-D3>=3.5.17.0
182+Requires-Dist: XStatic-Hogan>=2.0.0.2
183+Requires-Dist: XStatic-Font-Awesome>=4.7.0.0
184+Requires-Dist: XStatic-Jasmine>=2.4.1.1
185+Requires-Dist: XStatic-jQuery>=3.5.1.1
186+Requires-Dist: XStatic-JQuery-Migrate>=3
187+Requires-Dist: XStatic-JQuery.quicksearch>=2.0.3.1
188+Requires-Dist: XStatic-JQuery.TableSorter>=2.14.5.1
189+Requires-Dist: XStatic-jquery-ui>=1.12.1.1
190+Requires-Dist: XStatic-JSEncrypt>=2.3.1.1
191+Requires-Dist: XStatic-mdi>=1.6.50.2
192+Requires-Dist: XStatic-objectpath>=1.2.1.0
193+Requires-Dist: XStatic-Rickshaw>=1.5.0.0
194+Requires-Dist: XStatic-roboto-fontface>=0.5.0.0
195+Requires-Dist: XStatic-smart-table>=1.4.13.2
196+Requires-Dist: XStatic-Spin>=1.2.5.2
197+Requires-Dist: XStatic-term.js>=0.0.7.0
198+Requires-Dist: XStatic-tv4>=1.2.7.0
199+Requires-Dist: enmerkar>=0.7.1
200+
201+=============================
202+Horizon (OpenStack Dashboard)
203+=============================
204+
205+Horizon is a Django-based project aimed at providing a complete OpenStack
206+Dashboard along with an extensible framework for building new dashboards
207+from reusable components. The ``openstack_dashboard`` module is a reference
208+implementation of a Django site that uses the ``horizon`` app to provide
209+web-based interactions with the various OpenStack projects.
210+
211+* Project documentation: https://docs.openstack.org/horizon/latest/
212+* Release management: https://launchpad.net/horizon
213+* Blueprints and feature specifications: https://blueprints.launchpad.net/horizon
214+* Issue tracking: https://bugs.launchpad.net/horizon
215+* Release notes: https://docs.openstack.org/releasenotes/horizon/
216+
217+.. image:: https://governance.openstack.org/tc/badges/horizon.svg
218+ :target: https://governance.openstack.org/tc/reference/tags/
219+
220+Using Horizon
221+=============
222+
223+See ``doc/source/install/index.rst`` about how to install Horizon
224+in your OpenStack setup. It describes the example steps and
225+has pointers for more detailed settings and configurations.
226+
227+It is also available at
228+`Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_.
229+
230+Getting Started for Developers
231+==============================
232+
233+``doc/source/quickstart.rst`` or
234+`Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_
235+describes how to setup Horizon development environment and start development.
236+
237+Building Contributor Documentation
238+==================================
239+
240+This documentation is written by contributors, for contributors.
241+
242+The source is maintained in the ``doc/source`` directory using
243+`reStructuredText`_ and built by `Sphinx`_
244+
245+.. _reStructuredText: http://docutils.sourceforge.net/rst.html
246+.. _Sphinx: http://sphinx-doc.org/
247+
248+To build the docs, use::
249+
250+ $ tox -e docs
251+
252+Results are in the ``doc/build/html`` directory
253+
254diff --git a/debian/changelog b/debian/changelog
255index bf2383e..d575ad6 100644
256--- a/debian/changelog
257+++ b/debian/changelog
258@@ -1,9 +1,14 @@
259-horizon (4:24.0.0-0ubuntu1.4) UNRELEASED; urgency=medium
260+horizon (4:24.0.1-0ubuntu0.24.04.1) noble; urgency=medium
261
262+ [ James Page ]
263 * d/gbp.conf, .launchpad.yaml: Sync from cloud-archive-tools for
264 caracal.
265
266- -- James Page <james.page@ubuntu.com> Mon, 22 Jul 2024 09:38:02 +0100
267+ [ Guillaume Boutry ]
268+ * New upstream release for OpenStack Caracal. (LP: #2110279)
269+ * d/p/lp2054799.patch: drop integrated patch
270+
271+ -- Guillaume Boutry <guillaume.boutry@canonical.com> Mon, 16 Jun 2025 12:38:28 +0200
272
273 horizon (4:24.0.0-0ubuntu1.3) noble; urgency=medium
274
275diff --git a/debian/patches/lp2054799.patch b/debian/patches/lp2054799.patch
276deleted file mode 100644
277index 9317d26..0000000
278--- a/debian/patches/lp2054799.patch
279+++ /dev/null
280@@ -1,161 +0,0 @@
281-Bug-Ubuntu: https://bugs.launchpad.net/bugs/2054799
282-Origin: upstream, https://opendev.org/openstack/horizon/commit/ed768ab5071307ee15f95636ea548050cb894f9e
283-
284-From ed768ab5071307ee15f95636ea548050cb894f9e Mon Sep 17 00:00:00 2001
285-From: Zhang Hua <joshua.zhang@canonical.com>
286-Date: Tue, 27 Feb 2024 15:26:28 +0800
287-Subject: [PATCH] Fix Users/Groups tab list when a domain context is set
288-
289-The list of users assigned to a project becomes invisible when a domain context
290-is set in Horizon. If a domain context is set, the user list call should
291-provide a list of users within the specified domain context, rather than users
292-within the user's own domain.
293-
294-Groups tab of project also has the same problem.
295-
296-Change-Id: Ia778317acc41fe589765e6cd04c7fe8cad2360ab
297-Closes-Bug: #2054799
298----
299- .../dashboards/identity/projects/tabs.py | 13 ++++++---
300- .../dashboards/identity/projects/tests.py | 27 ++++++++++++-------
301- 2 files changed, 26 insertions(+), 14 deletions(-)
302-
303-diff --git a/openstack_dashboard/dashboards/identity/projects/tabs.py b/openstack_dashboard/dashboards/identity/projects/tabs.py
304-index 5899efd760..80ace64fb6 100644
305---- a/openstack_dashboard/dashboards/identity/projects/tabs.py
306-+++ b/openstack_dashboard/dashboards/identity/projects/tabs.py
307-@@ -23,6 +23,7 @@ from openstack_dashboard.dashboards.identity.projects.groups \
308- import tables as groups_tables
309- from openstack_dashboard.dashboards.identity.projects.users \
310- import tables as users_tables
311-+from openstack_dashboard.utils import identity
312-
313-
314- class OverviewTab(tabs.Tab):
315-@@ -93,7 +94,8 @@ class UsersTab(tabs.TableTab):
316- # For keystone.user_list project_id is not passed as argument because
317- # it is ignored when using admin credentials
318- # Get all users (to be able to find user name)
319-- users = api.keystone.user_list(self.request)
320-+ domain_id = identity.get_domain_id_for_operation(self.request)
321-+ users = api.keystone.user_list(self.request, domain=domain_id)
322- users = {user.id: user for user in users}
323-
324- # Get project_users_roles ({user_id: [role_id_1, role_id_2]})
325-@@ -128,7 +130,8 @@ class UsersTab(tabs.TableTab):
326- # For keystone.group_list project_id is not passed as argument because
327- # it is ignored when using admin credentials
328- # Get all groups (to be able to find group name)
329-- groups = api.keystone.group_list(self.request)
330-+ domain_id = identity.get_domain_id_for_operation(self.request)
331-+ groups = api.keystone.group_list(self.request, domain=domain_id)
332- group_names = {group.id: group.name for group in groups}
333-
334- # Get a dictionary {group_id: [role_id_1, role_id_2]}
335-@@ -138,7 +141,8 @@ class UsersTab(tabs.TableTab):
336-
337- for group_id in project_groups_roles:
338- group_users = api.keystone.user_list(self.request,
339-- group=group_id)
340-+ group=group_id,
341-+ domain=domain_id)
342- group_roles_names = [
343- role.name for role in roles
344- if role.id in project_groups_roles[group_id]]
345-@@ -202,6 +206,7 @@ class GroupsTab(tabs.TableTab):
346- project = self.tab_group.kwargs['project']
347-
348- try:
349-+ domain_id = identity.get_domain_id_for_operation(self.request)
350- # Get project_groups_roles: {group_id: [role_id_1, role_id_2]}
351- project_groups_roles = api.keystone.get_project_groups_roles(
352- self.request,
353-@@ -210,7 +215,7 @@ class GroupsTab(tabs.TableTab):
354- roles = api.keystone.role_list(self.request)
355- # For keystone.group_list, we do not give the project_id because it
356- # is ignored when called with admin creds.
357-- groups = api.keystone.group_list(self.request)
358-+ groups = api.keystone.group_list(self.request, domain=domain_id)
359- groups = {group.id: group for group in groups}
360- except Exception:
361- exceptions.handle(self.request,
362-diff --git a/openstack_dashboard/dashboards/identity/projects/tests.py b/openstack_dashboard/dashboards/identity/projects/tests.py
363-index 635f981238..9fae5fd426 100644
364---- a/openstack_dashboard/dashboards/identity/projects/tests.py
365-+++ b/openstack_dashboard/dashboards/identity/projects/tests.py
366-@@ -31,6 +31,7 @@ from openstack_dashboard.dashboards.identity.projects import workflows
367- from openstack_dashboard.test import helpers as test
368- from openstack_dashboard import usage
369- from openstack_dashboard.usage import quotas
370-+from openstack_dashboard.utils import identity
371-
372-
373- INDEX_URL = reverse('horizon:identity:projects:index')
374-@@ -1339,7 +1340,8 @@ class DetailProjectViewTests(test.BaseAdminViewTests):
375- 'get_project_groups_roles',
376- 'role_list',
377- 'group_list'),
378-- quotas: ('enabled_quotas',)})
379-+ quotas: ('enabled_quotas',),
380-+ identity: ('get_domain_id_for_operation',)})
381- def test_detail_view_users_tab(self):
382- project = self.tenants.first()
383- domain = self.domains.first()
384-@@ -1357,8 +1359,9 @@ class DetailProjectViewTests(test.BaseAdminViewTests):
385- self.mock_domain_get.return_value = domain
386- self.mock_enabled_quotas.return_value = ('instances',)
387- self.mock_role_list.return_value = self.roles.list()
388-+ self.mock_get_domain_id_for_operation.return_value = domain.id
389-
390-- def _user_list_side_effect(request, group=None):
391-+ def _user_list_side_effect(request, group=None, domain=None):
392- if group:
393- return self._get_users_in_group(group)
394- return users
395-@@ -1408,13 +1411,14 @@ class DetailProjectViewTests(test.BaseAdminViewTests):
396- domain.id)
397- self.mock_enabled_quotas.assert_called_once_with(test.IsHttpRequest())
398- self.mock_role_list.assert_called_once_with(test.IsHttpRequest())
399-- self.mock_group_list.assert_called_once_with(test.IsHttpRequest())
400-+ self.mock_group_list.assert_called_once_with(test.IsHttpRequest(),
401-+ domain="1")
402- self.mock_get_project_users_roles.assert_called_once_with(
403- test.IsHttpRequest(), project=project.id)
404- self.mock_get_project_groups_roles.assert_called_once_with(
405- test.IsHttpRequest(), project=project.id)
406-- calls = [mock.call(test.IsHttpRequest()),
407-- mock.call(test.IsHttpRequest(), group="1"), ]
408-+ calls = [mock.call(test.IsHttpRequest(), domain="1"),
409-+ mock.call(test.IsHttpRequest(), group="1", domain="1"), ]
410-
411- self.mock_user_list.assert_has_calls(calls)
412-
413-@@ -1506,11 +1510,13 @@ class DetailProjectViewTests(test.BaseAdminViewTests):
414-
415- self.mock_tenant_get.assert_called_once_with(test.IsHttpRequest(),
416- self.tenant.id)
417-- self.mock_domain_get.assert_called_once_with(test.IsHttpRequest(),
418-- domain.id)
419-+ calls = [mock.call(test.IsHttpRequest(), "1"),
420-+ mock.call(test.IsHttpRequest(), None), ]
421-+ self.mock_domain_get.assert_has_calls(calls)
422- self.mock_enabled_quotas.assert_called_once_with(test.IsHttpRequest())
423- self.mock_role_list.assert_called_once_with(test.IsHttpRequest())
424-- self.mock_group_list.assert_called_once_with(test.IsHttpRequest())
425-+ self.mock_group_list.assert_called_once_with(test.IsHttpRequest(),
426-+ domain=None)
427- self.mock_get_project_groups_roles.assert_called_once_with(
428- test.IsHttpRequest(), project=project.id)
429-
430-@@ -1546,8 +1552,9 @@ class DetailProjectViewTests(test.BaseAdminViewTests):
431-
432- self.mock_tenant_get.assert_called_once_with(test.IsHttpRequest(),
433- self.tenant.id)
434-- self.mock_domain_get.assert_called_once_with(test.IsHttpRequest(),
435-- domain.id)
436-+ calls = [mock.call(test.IsHttpRequest(), "1"),
437-+ mock.call(test.IsHttpRequest(), None), ]
438-+ self.mock_domain_get.assert_has_calls(calls)
439- self.mock_enabled_quotas.assert_called_once_with(test.IsHttpRequest())
440- self.mock_get_project_groups_roles.assert_called_once_with(
441- test.IsHttpRequest(), project=project.id)
442diff --git a/debian/patches/series b/debian/patches/series
443index b087504..e99cd52 100644
444--- a/debian/patches/series
445+++ b/debian/patches/series
446@@ -3,4 +3,3 @@ fix-dashboard-manage.patch
447 embedded-xstatic.patch
448 ubuntu_settings.patch
449 lp1728031.patch
450-lp2054799.patch
451diff --git a/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po b/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po
452index 8d852aa..b414960 100644
453--- a/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po
454+++ b/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po
455@@ -4,15 +4,16 @@
456 # Andi Chandler <andi@gowling.com>, 2021. #zanata
457 # Andi Chandler <andi@gowling.com>, 2022. #zanata
458 # Andi Chandler <andi@gowling.com>, 2023. #zanata
459+# Andi Chandler <andi@gowling.com>, 2024. #zanata
460 msgid ""
461 msgstr ""
462-"Project-Id-Version: horizon 23.4.0.dev3\n"
463+"Project-Id-Version: horizon 24.0.1.dev2\n"
464 "Report-Msgid-Bugs-To: \n"
465-"POT-Creation-Date: 2023-09-25 17:31+0000\n"
466+"POT-Creation-Date: 2024-03-23 17:30+0000\n"
467 "MIME-Version: 1.0\n"
468 "Content-Type: text/plain; charset=UTF-8\n"
469 "Content-Transfer-Encoding: 8bit\n"
470-"PO-Revision-Date: 2023-09-09 10:45+0000\n"
471+"PO-Revision-Date: 2024-04-18 12:43+0000\n"
472 "Last-Translator: Andi Chandler <andi@gowling.com>\n"
473 "Language-Team: English (United Kingdom)\n"
474 "Language: en_GB\n"
475@@ -966,6 +967,17 @@ msgid "DROPDOWN_MAX_ITEMS"
476 msgstr "DROPDOWN_MAX_ITEMS"
477
478 msgid ""
479+"Decides whether the DHCP Agents column should be shown on the Admin Networks "
480+"panel. Retrieving data for that column takes time, and it may be advisable "
481+"to disable it on large deployments with a large number on networks to speed "
482+"up displaying of that view."
483+msgstr ""
484+"Decides whether the DHCP Agents column should be shown on the Admin Networks "
485+"panel. Retrieving data for that column takes time, and it may be advisable "
486+"to disable it on large deployments with a large number on networks to speed "
487+"up displaying of that view."
488+
489+msgid ""
490 "Default DNS servers you would like to use when a subnet is created. This is "
491 "only a default. Users can still choose a different list of dns servers."
492 msgstr ""
493@@ -989,6 +1001,9 @@ msgstr ""
494 "as much as possible, and support for this is given preference over more "
495 "exotic methods such as monkey patching and overrides files."
496
497+msgid "Default ``True``"
498+msgstr "Default ``True``"
499+
500 msgid "Default ``['*']``"
501 msgstr "Default ``['*']``"
502
503@@ -4734,6 +4749,9 @@ msgstr "physical_networks"
504 msgid "segmentation_id_range"
505 msgstr "segmentation_id_range"
506
507+msgid "show_agents_column"
508+msgstr "show_agents_column"
509+
510 msgid "supported_provider_types"
511 msgstr "supported_provider_types"
512
513diff --git a/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po b/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po
514index f9980d7..e352181 100644
515--- a/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po
516+++ b/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po
517@@ -4,15 +4,16 @@
518 # Andi Chandler <andi@gowling.com>, 2021. #zanata
519 # Andi Chandler <andi@gowling.com>, 2022. #zanata
520 # Andi Chandler <andi@gowling.com>, 2023. #zanata
521+# Andi Chandler <andi@gowling.com>, 2024. #zanata
522 msgid ""
523 msgstr ""
524-"Project-Id-Version: horizon 23.4.1.dev25\n"
525+"Project-Id-Version: horizon 24.0.1.dev2\n"
526 "Report-Msgid-Bugs-To: \n"
527-"POT-Creation-Date: 2024-02-07 17:51+0000\n"
528+"POT-Creation-Date: 2024-03-23 17:30+0000\n"
529 "MIME-Version: 1.0\n"
530 "Content-Type: text/plain; charset=UTF-8\n"
531 "Content-Transfer-Encoding: 8bit\n"
532-"PO-Revision-Date: 2023-09-09 10:45+0000\n"
533+"PO-Revision-Date: 2024-04-18 12:49+0000\n"
534 "Last-Translator: Andi Chandler <andi@gowling.com>\n"
535 "Language-Team: English (United Kingdom)\n"
536 "Language: en_GB\n"
537@@ -7305,6 +7306,9 @@ msgstr ""
538 "Runs pep8, which is a tool that checks Python code style. You can read more "
539 "about pep8 at https://www.python.org/dev/peps/pep-0008/"
540
541+msgid "Runs the Python unit tests against Django 4.2."
542+msgstr "Runs the Python unit tests against Django 4.2."
543+
544 msgid ""
545 "Runs the Python unit tests against the current default version of Django "
546 "with Python 3.7 environment. Check ``requirements.txt`` in horizon "
547@@ -7314,6 +7318,9 @@ msgstr ""
548 "with Python 3.7 environment. Check ``requirements.txt`` in Horizon "
549 "repository to know which version of Django is actually used."
550
551+msgid "Runs the Python unit tests with a Python 3.11 environment."
552+msgstr "Runs the Python unit tests with a Python 3.11 environment."
553+
554 msgid "SCSS files"
555 msgstr "SCSS files"
556
557@@ -12394,6 +12401,12 @@ msgstr "panel.py"
558 msgid "pep8"
559 msgstr "pep8"
560
561+msgid "py3-dj42"
562+msgstr "py3-dj42"
563+
564+msgid "py311"
565+msgstr "py311"
566+
567 msgid "py37"
568 msgstr "py37"
569
570diff --git a/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po b/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po
571index ec0acea..83012ff 100644
572--- a/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po
573+++ b/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po
574@@ -2,15 +2,16 @@
575 # Andi Chandler <andi@gowling.com>, 2019. #zanata
576 # Andi Chandler <andi@gowling.com>, 2020. #zanata
577 # Andi Chandler <andi@gowling.com>, 2022. #zanata
578+# Andi Chandler <andi@gowling.com>, 2024. #zanata
579 msgid ""
580 msgstr ""
581-"Project-Id-Version: horizon 23.4.1.dev25\n"
582+"Project-Id-Version: horizon 24.0.1.dev2\n"
583 "Report-Msgid-Bugs-To: \n"
584-"POT-Creation-Date: 2024-02-07 17:51+0000\n"
585+"POT-Creation-Date: 2024-03-23 17:30+0000\n"
586 "MIME-Version: 1.0\n"
587 "Content-Type: text/plain; charset=UTF-8\n"
588 "Content-Transfer-Encoding: 8bit\n"
589-"PO-Revision-Date: 2022-05-25 09:09+0000\n"
590+"PO-Revision-Date: 2024-04-18 12:43+0000\n"
591 "Last-Translator: Andi Chandler <andi@gowling.com>\n"
592 "Language-Team: English (United Kingdom)\n"
593 "Language: en_GB\n"
594@@ -364,6 +365,9 @@ msgstr ""
595 msgid "Deployment"
596 msgstr "Deployment"
597
598+msgid "Django 4.2"
599+msgstr "Django 4.2"
600+
601 msgid "Django support policy is documented at :ref:`django_support`."
602 msgstr "Django support policy is documented at :ref:`django_support`."
603
604@@ -582,6 +586,9 @@ msgstr ""
605 "certificate connection problems, point the server IP address to a domain "
606 "name, and give users access."
607
608+msgid "Python 3.8 or 3.11"
609+msgstr "Python 3.8 or 3.11"
610+
611 msgid "Python memcached module installed"
612 msgstr "Python memcached module installed"
613
614@@ -647,6 +654,9 @@ msgstr "Static Assets"
615 msgid "System Requirements"
616 msgstr "System Requirements"
617
618+msgid "The Caracal release of horizon has the following dependencies."
619+msgstr "The Caracal release of Horizon has the following dependencies."
620+
621 msgid ""
622 "The ``systemctl restart`` command starts each service if not currently "
623 "running."
624diff --git a/horizon.egg-info/PKG-INFO b/horizon.egg-info/PKG-INFO
625index b7dca79..ca6115f 100644
626--- a/horizon.egg-info/PKG-INFO
627+++ b/horizon.egg-info/PKG-INFO
628@@ -1,66 +1,10 @@
629-Metadata-Version: 1.2
630+Metadata-Version: 2.1
631 Name: horizon
632-Version: 24.0.0
633+Version: 24.0.1
634 Summary: OpenStack Dashboard
635 Home-page: https://docs.openstack.org/horizon/latest/
636 Author: OpenStack
637 Author-email: openstack-discuss@lists.openstack.org
638-License: UNKNOWN
639-Description: =============================
640- Horizon (OpenStack Dashboard)
641- =============================
642-
643- Horizon is a Django-based project aimed at providing a complete OpenStack
644- Dashboard along with an extensible framework for building new dashboards
645- from reusable components. The ``openstack_dashboard`` module is a reference
646- implementation of a Django site that uses the ``horizon`` app to provide
647- web-based interactions with the various OpenStack projects.
648-
649- * Project documentation: https://docs.openstack.org/horizon/latest/
650- * Release management: https://launchpad.net/horizon
651- * Blueprints and feature specifications: https://blueprints.launchpad.net/horizon
652- * Issue tracking: https://bugs.launchpad.net/horizon
653- * Release notes: https://docs.openstack.org/releasenotes/horizon/
654-
655- .. image:: https://governance.openstack.org/tc/badges/horizon.svg
656- :target: https://governance.openstack.org/tc/reference/tags/
657-
658- Using Horizon
659- =============
660-
661- See ``doc/source/install/index.rst`` about how to install Horizon
662- in your OpenStack setup. It describes the example steps and
663- has pointers for more detailed settings and configurations.
664-
665- It is also available at
666- `Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_.
667-
668- Getting Started for Developers
669- ==============================
670-
671- ``doc/source/quickstart.rst`` or
672- `Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_
673- describes how to setup Horizon development environment and start development.
674-
675- Building Contributor Documentation
676- ==================================
677-
678- This documentation is written by contributors, for contributors.
679-
680- The source is maintained in the ``doc/source`` directory using
681- `reStructuredText`_ and built by `Sphinx`_
682-
683- .. _reStructuredText: http://docutils.sourceforge.net/rst.html
684- .. _Sphinx: http://sphinx-doc.org/
685-
686- To build the docs, use::
687-
688- $ tox -e docs
689-
690- Results are in the ``doc/build/html`` directory
691-
692-
693-Platform: UNKNOWN
694 Classifier: Development Status :: 5 - Production/Stable
695 Classifier: Environment :: OpenStack
696 Classifier: Framework :: Django
697@@ -77,3 +21,118 @@ Classifier: Programming Language :: Python :: 3.8
698 Classifier: Programming Language :: Python :: 3.9
699 Classifier: Topic :: Internet :: WWW/HTTP
700 Requires-Python: >=3.8
701+License-File: LICENSE
702+Requires-Dist: pbr>=5.5.0
703+Requires-Dist: Babel>=2.6.0
704+Requires-Dist: debtcollector>=1.2.0
705+Requires-Dist: Django<4.3,>=4.2
706+Requires-Dist: django-compressor>=2.4.1
707+Requires-Dist: django-debreach>=1.4.2
708+Requires-Dist: django-pyscss>=2.0.3
709+Requires-Dist: futurist>=1.2.0
710+Requires-Dist: iso8601>=0.1.11
711+Requires-Dist: keystoneauth1>=4.3.1
712+Requires-Dist: netaddr>=0.7.18
713+Requires-Dist: oslo.concurrency>=4.5.0
714+Requires-Dist: oslo.config>=8.8.0
715+Requires-Dist: oslo.i18n>=5.1.0
716+Requires-Dist: oslo.policy>=3.11.0
717+Requires-Dist: oslo.serialization>=4.3.0
718+Requires-Dist: oslo.upgradecheck>=1.5.0
719+Requires-Dist: oslo.utils>=4.12.0
720+Requires-Dist: osprofiler>=3.4.2
721+Requires-Dist: pymongo!=3.1,>=3.0.2
722+Requires-Dist: pyScss>=1.4.0
723+Requires-Dist: python-cinderclient>=8.0.0
724+Requires-Dist: python-glanceclient>=2.8.0
725+Requires-Dist: python-keystoneclient>=3.22.0
726+Requires-Dist: python-neutronclient>=8.1.0
727+Requires-Dist: python-novaclient>=9.1.0
728+Requires-Dist: python-swiftclient>=3.2.0
729+Requires-Dist: pytz>=2013.6
730+Requires-Dist: PyYAML>=6.0
731+Requires-Dist: requests>=2.25.1
732+Requires-Dist: semantic-version>=2.3.1
733+Requires-Dist: XStatic>=1.0.3
734+Requires-Dist: XStatic-Angular>=1.8.2.2
735+Requires-Dist: XStatic-Angular-Bootstrap>=2.2.0.0
736+Requires-Dist: XStatic-Angular-FileUpload>=12.0.4.0
737+Requires-Dist: XStatic-Angular-Gettext>=2.3.8.0
738+Requires-Dist: XStatic-Angular-lrdragndrop>=1.0.2.2
739+Requires-Dist: XStatic-Angular-Schema-Form>=0.8.13.0
740+Requires-Dist: XStatic-Bootstrap-Datepicker>=1.3.1.0
741+Requires-Dist: XStatic-Bootstrap-SCSS>=3.3.7.1
742+Requires-Dist: XStatic-bootswatch>=3.3.7.0
743+Requires-Dist: XStatic-D3>=3.5.17.0
744+Requires-Dist: XStatic-Hogan>=2.0.0.2
745+Requires-Dist: XStatic-Font-Awesome>=4.7.0.0
746+Requires-Dist: XStatic-Jasmine>=2.4.1.1
747+Requires-Dist: XStatic-jQuery>=3.5.1.1
748+Requires-Dist: XStatic-JQuery-Migrate>=3
749+Requires-Dist: XStatic-JQuery.quicksearch>=2.0.3.1
750+Requires-Dist: XStatic-JQuery.TableSorter>=2.14.5.1
751+Requires-Dist: XStatic-jquery-ui>=1.12.1.1
752+Requires-Dist: XStatic-JSEncrypt>=2.3.1.1
753+Requires-Dist: XStatic-mdi>=1.6.50.2
754+Requires-Dist: XStatic-objectpath>=1.2.1.0
755+Requires-Dist: XStatic-Rickshaw>=1.5.0.0
756+Requires-Dist: XStatic-roboto-fontface>=0.5.0.0
757+Requires-Dist: XStatic-smart-table>=1.4.13.2
758+Requires-Dist: XStatic-Spin>=1.2.5.2
759+Requires-Dist: XStatic-term.js>=0.0.7.0
760+Requires-Dist: XStatic-tv4>=1.2.7.0
761+Requires-Dist: enmerkar>=0.7.1
762+
763+=============================
764+Horizon (OpenStack Dashboard)
765+=============================
766+
767+Horizon is a Django-based project aimed at providing a complete OpenStack
768+Dashboard along with an extensible framework for building new dashboards
769+from reusable components. The ``openstack_dashboard`` module is a reference
770+implementation of a Django site that uses the ``horizon`` app to provide
771+web-based interactions with the various OpenStack projects.
772+
773+* Project documentation: https://docs.openstack.org/horizon/latest/
774+* Release management: https://launchpad.net/horizon
775+* Blueprints and feature specifications: https://blueprints.launchpad.net/horizon
776+* Issue tracking: https://bugs.launchpad.net/horizon
777+* Release notes: https://docs.openstack.org/releasenotes/horizon/
778+
779+.. image:: https://governance.openstack.org/tc/badges/horizon.svg
780+ :target: https://governance.openstack.org/tc/reference/tags/
781+
782+Using Horizon
783+=============
784+
785+See ``doc/source/install/index.rst`` about how to install Horizon
786+in your OpenStack setup. It describes the example steps and
787+has pointers for more detailed settings and configurations.
788+
789+It is also available at
790+`Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_.
791+
792+Getting Started for Developers
793+==============================
794+
795+``doc/source/quickstart.rst`` or
796+`Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_
797+describes how to setup Horizon development environment and start development.
798+
799+Building Contributor Documentation
800+==================================
801+
802+This documentation is written by contributors, for contributors.
803+
804+The source is maintained in the ``doc/source`` directory using
805+`reStructuredText`_ and built by `Sphinx`_
806+
807+.. _reStructuredText: http://docutils.sourceforge.net/rst.html
808+.. _Sphinx: http://sphinx-doc.org/
809+
810+To build the docs, use::
811+
812+ $ tox -e docs
813+
814+Results are in the ``doc/build/html`` directory
815+
816diff --git a/horizon.egg-info/SOURCES.txt b/horizon.egg-info/SOURCES.txt
817index c853f9d..e2a8f9f 100644
818--- a/horizon.egg-info/SOURCES.txt
819+++ b/horizon.egg-info/SOURCES.txt
820@@ -2954,6 +2954,7 @@ releasenotes/notes/bug_1963652_fix_policy_for_resume-a719efb23054c708.yaml
821 releasenotes/notes/change-default-image-visibility-560c3b6ab2830cdc.yaml
822 releasenotes/notes/change-keystone-default-role-3f95b6af11aed63b.yaml
823 releasenotes/notes/change-keystone-url-default-value-6a56397acf4f7328.yaml
824+releasenotes/notes/change-metadef-for-cinder-volume-type-f65dd215d2a3ce75.yaml
825 releasenotes/notes/cinder-api-v3-by-default-d6e3c12760fdf655.yaml
826 releasenotes/notes/cinder-backup-cinder-messages-2127d04da3c82033.yaml
827 releasenotes/notes/cinder-user-facing-messages-92cfd25492616d6d.yaml
828@@ -3144,13 +3145,6 @@ releasenotes/source/yoga.rst
829 releasenotes/source/zed.rst
830 releasenotes/source/_static/.placeholder
831 releasenotes/source/_templates/.placeholder
832-releasenotes/source/locale/de/LC_MESSAGES/releasenotes.po
833-releasenotes/source/locale/en_GB/LC_MESSAGES/releasenotes.po
834-releasenotes/source/locale/id/LC_MESSAGES/releasenotes.po
835-releasenotes/source/locale/ja/LC_MESSAGES/releasenotes.po
836-releasenotes/source/locale/ko_KR/LC_MESSAGES/releasenotes.po
837-releasenotes/source/locale/pt_BR/LC_MESSAGES/releasenotes.po
838-releasenotes/source/locale/zh_CN/LC_MESSAGES/releasenotes.po
839 roles/ensure-django/defaults/main.yaml
840 roles/ensure-django/tasks/main.yaml
841 roles/fetch-video-output/README.rst
842diff --git a/horizon.egg-info/entry_points.txt b/horizon.egg-info/entry_points.txt
843index 15c19b3..1011e3a 100644
844--- a/horizon.egg-info/entry_points.txt
845+++ b/horizon.egg-info/entry_points.txt
846@@ -4,4 +4,3 @@ angular = horizon.utils.babel_extract_angular:extract_angular
847 [oslo.config.opts]
848 openstack_dashboard = openstack_dashboard.utils.config:list_options
849 openstack_dashboard_integration_tests = openstack_dashboard.test.integration_tests.config:list_opts
850-
851diff --git a/horizon.egg-info/pbr.json b/horizon.egg-info/pbr.json
852index 006b632..8a54205 100644
853--- a/horizon.egg-info/pbr.json
854+++ b/horizon.egg-info/pbr.json
855@@ -1 +1 @@
856-{"git_version": "3d9855eeb", "is_release": true}
857\ No newline at end of file
858+{"git_version": "a9267a60d", "is_release": true}
859\ No newline at end of file
860diff --git a/horizon.egg-info/requires.txt b/horizon.egg-info/requires.txt
861index ab85861..29ab7f5 100644
862--- a/horizon.egg-info/requires.txt
863+++ b/horizon.egg-info/requires.txt
864@@ -1,39 +1,10 @@
865+pbr>=5.5.0
866 Babel>=2.6.0
867-Django<4.3,>=4.2
868-PyYAML>=6.0
869-XStatic-Angular-Bootstrap>=2.2.0.0
870-XStatic-Angular-FileUpload>=12.0.4.0
871-XStatic-Angular-Gettext>=2.3.8.0
872-XStatic-Angular-Schema-Form>=0.8.13.0
873-XStatic-Angular-lrdragndrop>=1.0.2.2
874-XStatic-Angular>=1.8.2.2
875-XStatic-Bootstrap-Datepicker>=1.3.1.0
876-XStatic-Bootstrap-SCSS>=3.3.7.1
877-XStatic-D3>=3.5.17.0
878-XStatic-Font-Awesome>=4.7.0.0
879-XStatic-Hogan>=2.0.0.2
880-XStatic-JQuery-Migrate>=3
881-XStatic-JQuery.TableSorter>=2.14.5.1
882-XStatic-JQuery.quicksearch>=2.0.3.1
883-XStatic-JSEncrypt>=2.3.1.1
884-XStatic-Jasmine>=2.4.1.1
885-XStatic-Rickshaw>=1.5.0.0
886-XStatic-Spin>=1.2.5.2
887-XStatic-bootswatch>=3.3.7.0
888-XStatic-jQuery>=3.5.1.1
889-XStatic-jquery-ui>=1.12.1.1
890-XStatic-mdi>=1.6.50.2
891-XStatic-objectpath>=1.2.1.0
892-XStatic-roboto-fontface>=0.5.0.0
893-XStatic-smart-table>=1.4.13.2
894-XStatic-term.js>=0.0.7.0
895-XStatic-tv4>=1.2.7.0
896-XStatic>=1.0.3
897 debtcollector>=1.2.0
898+Django<4.3,>=4.2
899 django-compressor>=2.4.1
900 django-debreach>=1.4.2
901 django-pyscss>=2.0.3
902-enmerkar>=0.7.1
903 futurist>=1.2.0
904 iso8601>=0.1.11
905 keystoneauth1>=4.3.1
906@@ -46,9 +17,8 @@ oslo.serialization>=4.3.0
907 oslo.upgradecheck>=1.5.0
908 oslo.utils>=4.12.0
909 osprofiler>=3.4.2
910-pbr>=5.5.0
911-pyScss>=1.4.0
912 pymongo!=3.1,>=3.0.2
913+pyScss>=1.4.0
914 python-cinderclient>=8.0.0
915 python-glanceclient>=2.8.0
916 python-keystoneclient>=3.22.0
917@@ -56,5 +26,35 @@ python-neutronclient>=8.1.0
918 python-novaclient>=9.1.0
919 python-swiftclient>=3.2.0
920 pytz>=2013.6
921+PyYAML>=6.0
922 requests>=2.25.1
923 semantic-version>=2.3.1
924+XStatic>=1.0.3
925+XStatic-Angular>=1.8.2.2
926+XStatic-Angular-Bootstrap>=2.2.0.0
927+XStatic-Angular-FileUpload>=12.0.4.0
928+XStatic-Angular-Gettext>=2.3.8.0
929+XStatic-Angular-lrdragndrop>=1.0.2.2
930+XStatic-Angular-Schema-Form>=0.8.13.0
931+XStatic-Bootstrap-Datepicker>=1.3.1.0
932+XStatic-Bootstrap-SCSS>=3.3.7.1
933+XStatic-bootswatch>=3.3.7.0
934+XStatic-D3>=3.5.17.0
935+XStatic-Hogan>=2.0.0.2
936+XStatic-Font-Awesome>=4.7.0.0
937+XStatic-Jasmine>=2.4.1.1
938+XStatic-jQuery>=3.5.1.1
939+XStatic-JQuery-Migrate>=3
940+XStatic-JQuery.quicksearch>=2.0.3.1
941+XStatic-JQuery.TableSorter>=2.14.5.1
942+XStatic-jquery-ui>=1.12.1.1
943+XStatic-JSEncrypt>=2.3.1.1
944+XStatic-mdi>=1.6.50.2
945+XStatic-objectpath>=1.2.1.0
946+XStatic-Rickshaw>=1.5.0.0
947+XStatic-roboto-fontface>=0.5.0.0
948+XStatic-smart-table>=1.4.13.2
949+XStatic-Spin>=1.2.5.2
950+XStatic-term.js>=0.0.7.0
951+XStatic-tv4>=1.2.7.0
952+enmerkar>=0.7.1
953diff --git a/openstack_auth/policy.py b/openstack_auth/policy.py
954index 2b43ef3..30b29e4 100644
955--- a/openstack_auth/policy.py
956+++ b/openstack_auth/policy.py
957@@ -59,8 +59,11 @@ def _get_policy_file_with_full_path(service):
958 def _convert_to_ruledefault(p):
959 deprecated = p.get('deprecated_rule')
960 if deprecated:
961- deprecated_rule = policy.DeprecatedRule(deprecated['name'],
962- deprecated['check_str'])
963+ deprecated_rule = policy.DeprecatedRule(
964+ deprecated['name'],
965+ deprecated['check_str'],
966+ deprecated_reason=deprecated.get('deprecated_reason'),
967+ deprecated_since=deprecated.get('deprecated_since'))
968 else:
969 deprecated_rule = None
970
971diff --git a/openstack_dashboard/api/keystone.py b/openstack_dashboard/api/keystone.py
972index 976b61c..5bb86af 100644
973--- a/openstack_dashboard/api/keystone.py
974+++ b/openstack_dashboard/api/keystone.py
975@@ -221,7 +221,7 @@ def domain_delete(request, domain_id):
976
977 @profiler.trace
978 def domain_list(request):
979- manager = keystoneclient(request, admin=True).domains
980+ manager = keystoneclient(request, admin=True, force_scoped=True).domains
981 return manager.list()
982
983
984diff --git a/openstack_dashboard/api/neutron.py b/openstack_dashboard/api/neutron.py
985index 3df0e8a..2ad1ca5 100644
986--- a/openstack_dashboard/api/neutron.py
987+++ b/openstack_dashboard/api/neutron.py
988@@ -213,7 +213,8 @@ class PortAllowedAddressPair(NeutronAPIDictWrapper):
989 def __init__(self, addr_pair):
990 super().__init__(addr_pair)
991 # Horizon references id property for table operations
992- self.id = addr_pair['ip_address']
993+ mac_addr = addr_pair['mac_address'].replace(':', '-')
994+ self.id = addr_pair['ip_address'] + ":" + mac_addr
995
996
997 class Router(NeutronAPIDictWrapper):
998diff --git a/openstack_dashboard/api/placement.py b/openstack_dashboard/api/placement.py
999index 60c07d4..f2cf5ae 100644
1000--- a/openstack_dashboard/api/placement.py
1001+++ b/openstack_dashboard/api/placement.py
1002@@ -10,6 +10,7 @@
1003 # License for the specific language governing permissions and limitations
1004 # under the License.
1005
1006+from django.conf import settings
1007 from keystoneauth1 import adapter
1008 from keystoneauth1 import identity
1009 from keystoneauth1 import session
1010@@ -41,7 +42,15 @@ def make_adapter(request):
1011 project_name=request.user.project_name,
1012 project_domain_name=request.user.domain_id,
1013 )
1014- return Adapter(session.Session(auth=auth), api_version="placement 1.6")
1015+ verify = True
1016+ if settings.OPENSTACK_SSL_NO_VERIFY:
1017+ verify = False
1018+ elif settings.OPENSTACK_SSL_CACERT:
1019+ verify = settings.OPENSTACK_SSL_CACERT
1020+ return Adapter(
1021+ session.Session(auth=auth, verify=verify),
1022+ api_version="placement 1.6",
1023+ )
1024
1025
1026 def _get_json(request, path):
1027@@ -91,38 +100,55 @@ def get_providers(request):
1028 usages = resource_provider_usages(request, p['uuid'])
1029 vcpus = inventories.get('VCPU')
1030 pcpus = inventories.get('PCPU')
1031+ memory = inventories.get('MEMORY_MB')
1032+ disk = inventories.get('DISK_GB')
1033 p['inventories'] = inventories
1034 p['usages'] = usages
1035 p['aggregates'] = resource_provider_aggregates(request, p['uuid'])
1036 p['traits'] = resource_provider_traits(request, p['uuid'])
1037
1038 p['vcpus_used'] = usages.get('VCPU')
1039- p['vcpus_reserved'] = vcpus['reserved'] if vcpus is not None else None
1040+ # Reserved:
1041 # The actual amount of the resource that the provider can accommodate
1042- p['vcpus'] = vcpus['total'] if vcpus is not None else None
1043+ # Total:
1044 # Overall capacity
1045- p['vcpus_ar'] = vcpus['allocation_ratio'] \
1046- if vcpus is not None else None
1047- p['vcpus_capacity'] = int(vcpus['allocation_ratio'] * vcpus['total']) \
1048- if vcpus is not None else None
1049+ if vcpus is not None:
1050+ p.update(vcpus_reserved=vcpus['reserved'],
1051+ vcpus=vcpus['total'],
1052+ vcpus_ar=vcpus['allocation_ratio'])
1053+ p['vcpus_capacity'] = int(p['vcpus_ar'] * p['vcpus'])
1054+ else:
1055+ p.update(vcpus_reserved=None, vcpus=None,
1056+ vcpus_ar=None, vcpus_capacity=None)
1057
1058 p['pcpus_used'] = usages.get('PCPU')
1059- p['pcpus_reserved'] = pcpus['reserved'] if pcpus is not None else None
1060- p['pcpus'] = pcpus['total'] if pcpus is not None else None
1061- p['pcpus_ar'] = pcpus['allocation_ratio'] \
1062- if pcpus is not None else None
1063- p['pcpus_capacity'] = int(pcpus['allocation_ratio'] * pcpus['total']) \
1064- if pcpus is not None else None
1065-
1066- p['memory_mb_used'] = usages['MEMORY_MB']
1067- p['memory_mb_reserved'] = inventories['MEMORY_MB']['reserved']
1068- p['memory_mb'] = inventories['MEMORY_MB']['total']
1069- p['memory_mb_ar'] = inventories['MEMORY_MB']['allocation_ratio']
1070- p['memory_mb_capacity'] = p['memory_mb_ar'] * p['memory_mb']
1071-
1072- p['disk_gb_used'] = usages['DISK_GB']
1073- p['disk_gb_reserved'] = inventories['DISK_GB']['reserved']
1074- p['disk_gb'] = inventories['DISK_GB']['total']
1075- p['disk_gb_ar'] = inventories['DISK_GB']['allocation_ratio']
1076- p['disk_gb_capacity'] = p['disk_gb_ar'] * p['disk_gb']
1077+ if pcpus is not None:
1078+ p.update(pcpus_reserved=pcpus['reserved'],
1079+ pcpus=pcpus['total'],
1080+ pcpus_ar=pcpus['allocation_ratio'])
1081+ p['pcpus_capacity'] = int(p['pcpus_ar'] * p['pcpus'])
1082+ else:
1083+ p.update(pcpus_reserved=None, pcpus=None,
1084+ pcpus_ar=None, pcpus_capacity=None)
1085+
1086+ p['memory_mb_used'] = usages.get('MEMORY_MB')
1087+ if memory is not None:
1088+ p.update(memory_mb_reserved=memory['reserved'],
1089+ memory_mb=memory['total'],
1090+ memory_mb_ar=memory['allocation_ratio'])
1091+ p['memory_mb_capacity'] = p['memory_mb_ar'] * p['memory_mb']
1092+ else:
1093+ p.update(memory_mb_reserved=None, memory_mb=None,
1094+ memory_mb_ar=None, memory_mb_capacity=None)
1095+
1096+ p['disk_gb_used'] = usages.get('DISK_GB')
1097+ if disk is not None:
1098+ p.update(disk_gb_reserved=disk['reserved'],
1099+ disk_gb=disk['total'],
1100+ disk_gb_ar=disk['allocation_ratio'])
1101+ p['disk_gb_capacity'] = p['disk_gb_ar'] * p['disk_gb']
1102+ else:
1103+ p.update(disk_gb_reserved=None, disk_gb=None,
1104+ disk_gb_ar=None, disk_gb_capacity=None)
1105+
1106 return providers
1107diff --git a/openstack_dashboard/conf/default_policies/cinder.yaml b/openstack_dashboard/conf/default_policies/cinder.yaml
1108index 1badc61..31dda6e 100644
1109--- a/openstack_dashboard/conf/default_policies/cinder.yaml
1110+++ b/openstack_dashboard/conf/default_policies/cinder.yaml
1111@@ -32,11 +32,14 @@
1112 operations: []
1113 scope_types: null
1114 - check_str: rule:xena_system_admin_or_project_member
1115- deprecated_reason: null
1116 deprecated_rule:
1117 check_str: ''
1118+ deprecated_reason: Default policies now support the three Keystone default roles,
1119+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1120+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1121+ (Xena release) for details.
1122+ deprecated_since: X
1123 name: volume:attachment_create
1124- deprecated_since: null
1125 description: Create attachment.
1126 name: volume:attachment_create
1127 operations:
1128@@ -44,11 +47,14 @@
1129 path: /attachments
1130 scope_types: null
1131 - check_str: rule:xena_system_admin_or_project_member
1132- deprecated_reason: null
1133 deprecated_rule:
1134 check_str: rule:admin_or_owner
1135+ deprecated_reason: Default policies now support the three Keystone default roles,
1136+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1137+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1138+ (Xena release) for details.
1139+ deprecated_since: X
1140 name: volume:attachment_update
1141- deprecated_since: null
1142 description: Update attachment.
1143 name: volume:attachment_update
1144 operations:
1145@@ -56,11 +62,14 @@
1146 path: /attachments/{attachment_id}
1147 scope_types: null
1148 - check_str: rule:xena_system_admin_or_project_member
1149- deprecated_reason: null
1150 deprecated_rule:
1151 check_str: rule:admin_or_owner
1152+ deprecated_reason: Default policies now support the three Keystone default roles,
1153+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1154+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1155+ (Xena release) for details.
1156+ deprecated_since: X
1157 name: volume:attachment_delete
1158- deprecated_since: null
1159 description: Delete attachment.
1160 name: volume:attachment_delete
1161 operations:
1162@@ -68,11 +77,14 @@
1163 path: /attachments/{attachment_id}
1164 scope_types: null
1165 - check_str: rule:xena_system_admin_or_project_member
1166- deprecated_reason: null
1167 deprecated_rule:
1168 check_str: rule:admin_or_owner
1169+ deprecated_reason: Default policies now support the three Keystone default roles,
1170+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1171+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1172+ (Xena release) for details.
1173+ deprecated_since: X
1174 name: volume:attachment_complete
1175- deprecated_since: null
1176 description: Mark a volume attachment process as completed (in-use)
1177 name: volume:attachment_complete
1178 operations:
1179@@ -80,11 +92,14 @@
1180 path: /attachments/{attachment_id}/action (os-complete)
1181 scope_types: null
1182 - check_str: rule:xena_system_admin_or_project_member
1183- deprecated_reason: null
1184 deprecated_rule:
1185 check_str: rule:admin_or_owner
1186+ deprecated_reason: Default policies now support the three Keystone default roles,
1187+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1188+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1189+ (Xena release) for details.
1190+ deprecated_since: X
1191 name: volume:multiattach_bootable_volume
1192- deprecated_since: null
1193 description: Allow multiattach of bootable volumes.
1194 name: volume:multiattach_bootable_volume
1195 operations:
1196@@ -92,11 +107,14 @@
1197 path: /attachments
1198 scope_types: null
1199 - check_str: rule:xena_system_admin_or_project_reader
1200- deprecated_reason: null
1201 deprecated_rule:
1202 check_str: rule:admin_or_owner
1203+ deprecated_reason: Default policies now support the three Keystone default roles,
1204+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1205+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1206+ (Xena release) for details.
1207+ deprecated_since: X
1208 name: message:get_all
1209- deprecated_since: null
1210 description: List messages.
1211 name: message:get_all
1212 operations:
1213@@ -104,11 +122,14 @@
1214 path: /messages
1215 scope_types: null
1216 - check_str: rule:xena_system_admin_or_project_reader
1217- deprecated_reason: null
1218 deprecated_rule:
1219 check_str: rule:admin_or_owner
1220+ deprecated_reason: Default policies now support the three Keystone default roles,
1221+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1222+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1223+ (Xena release) for details.
1224+ deprecated_since: X
1225 name: message:get
1226- deprecated_since: null
1227 description: Show message.
1228 name: message:get
1229 operations:
1230@@ -116,11 +137,14 @@
1231 path: /messages/{message_id}
1232 scope_types: null
1233 - check_str: rule:xena_system_admin_or_project_member
1234- deprecated_reason: null
1235 deprecated_rule:
1236 check_str: rule:admin_or_owner
1237+ deprecated_reason: Default policies now support the three Keystone default roles,
1238+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1239+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1240+ (Xena release) for details.
1241+ deprecated_since: X
1242 name: message:delete
1243- deprecated_since: null
1244 description: Delete message.
1245 name: message:delete
1246 operations:
1247@@ -158,11 +182,14 @@
1248 path: /workers/cleanup
1249 scope_types: null
1250 - check_str: rule:xena_system_admin_or_project_reader
1251- deprecated_reason: null
1252 deprecated_rule:
1253 check_str: rule:admin_or_owner
1254+ deprecated_reason: Default policies now support the three Keystone default roles,
1255+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1256+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1257+ (Xena release) for details.
1258+ deprecated_since: X
1259 name: volume:get_snapshot_metadata
1260- deprecated_since: null
1261 description: Show snapshot's metadata or one specified metadata with a given key.
1262 name: volume:get_snapshot_metadata
1263 operations:
1264@@ -172,11 +199,14 @@
1265 path: /snapshots/{snapshot_id}/metadata/{key}
1266 scope_types: null
1267 - check_str: rule:xena_system_admin_or_project_member
1268- deprecated_reason: null
1269 deprecated_rule:
1270 check_str: rule:admin_or_owner
1271+ deprecated_reason: Default policies now support the three Keystone default roles,
1272+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1273+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1274+ (Xena release) for details.
1275+ deprecated_since: X
1276 name: volume:update_snapshot_metadata
1277- deprecated_since: null
1278 description: Update snapshot's metadata or one specified metadata with a given key.
1279 name: volume:update_snapshot_metadata
1280 operations:
1281@@ -186,11 +216,14 @@
1282 path: /snapshots/{snapshot_id}/metadata/{key}
1283 scope_types: null
1284 - check_str: rule:xena_system_admin_or_project_member
1285- deprecated_reason: null
1286 deprecated_rule:
1287 check_str: rule:admin_or_owner
1288+ deprecated_reason: Default policies now support the three Keystone default roles,
1289+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1290+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1291+ (Xena release) for details.
1292+ deprecated_since: X
1293 name: volume:delete_snapshot_metadata
1294- deprecated_since: null
1295 description: Delete snapshot's specified metadata with a given key.
1296 name: volume:delete_snapshot_metadata
1297 operations:
1298@@ -198,11 +231,14 @@
1299 path: /snapshots/{snapshot_id}/metadata/{key}
1300 scope_types: null
1301 - check_str: rule:xena_system_admin_or_project_reader
1302- deprecated_reason: null
1303 deprecated_rule:
1304 check_str: rule:admin_or_owner
1305+ deprecated_reason: Default policies now support the three Keystone default roles,
1306+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1307+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1308+ (Xena release) for details.
1309+ deprecated_since: X
1310 name: volume:get_all_snapshots
1311- deprecated_since: null
1312 description: List snapshots.
1313 name: volume:get_all_snapshots
1314 operations:
1315@@ -212,11 +248,14 @@
1316 path: /snapshots/detail
1317 scope_types: null
1318 - check_str: rule:xena_system_admin_or_project_reader
1319- deprecated_reason: null
1320 deprecated_rule:
1321 check_str: rule:admin_or_owner
1322+ deprecated_reason: Default policies now support the three Keystone default roles,
1323+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1324+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1325+ (Xena release) for details.
1326+ deprecated_since: X
1327 name: volume_extension:extended_snapshot_attributes
1328- deprecated_since: null
1329 description: List or show snapshots with extended attributes.
1330 name: volume_extension:extended_snapshot_attributes
1331 operations:
1332@@ -226,11 +265,14 @@
1333 path: /snapshots/detail
1334 scope_types: null
1335 - check_str: rule:xena_system_admin_or_project_member
1336- deprecated_reason: null
1337 deprecated_rule:
1338 check_str: rule:admin_or_owner
1339+ deprecated_reason: Default policies now support the three Keystone default roles,
1340+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1341+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1342+ (Xena release) for details.
1343+ deprecated_since: X
1344 name: volume:create_snapshot
1345- deprecated_since: null
1346 description: Create snapshot.
1347 name: volume:create_snapshot
1348 operations:
1349@@ -238,11 +280,14 @@
1350 path: /snapshots
1351 scope_types: null
1352 - check_str: rule:xena_system_admin_or_project_reader
1353- deprecated_reason: null
1354 deprecated_rule:
1355 check_str: rule:admin_or_owner
1356+ deprecated_reason: Default policies now support the three Keystone default roles,
1357+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1358+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1359+ (Xena release) for details.
1360+ deprecated_since: X
1361 name: volume:get_snapshot
1362- deprecated_since: null
1363 description: Show snapshot.
1364 name: volume:get_snapshot
1365 operations:
1366@@ -250,11 +295,14 @@
1367 path: /snapshots/{snapshot_id}
1368 scope_types: null
1369 - check_str: rule:xena_system_admin_or_project_member
1370- deprecated_reason: null
1371 deprecated_rule:
1372 check_str: rule:admin_or_owner
1373+ deprecated_reason: Default policies now support the three Keystone default roles,
1374+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1375+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1376+ (Xena release) for details.
1377+ deprecated_since: X
1378 name: volume:update_snapshot
1379- deprecated_since: null
1380 description: Update snapshot.
1381 name: volume:update_snapshot
1382 operations:
1383@@ -262,11 +310,14 @@
1384 path: /snapshots/{snapshot_id}
1385 scope_types: null
1386 - check_str: rule:xena_system_admin_or_project_member
1387- deprecated_reason: null
1388 deprecated_rule:
1389 check_str: rule:admin_or_owner
1390+ deprecated_reason: Default policies now support the three Keystone default roles,
1391+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1392+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1393+ (Xena release) for details.
1394+ deprecated_since: X
1395 name: volume:delete_snapshot
1396- deprecated_since: null
1397 description: Delete snapshot.
1398 name: volume:delete_snapshot
1399 operations:
1400@@ -281,11 +332,14 @@
1401 path: /snapshots/{snapshot_id}/action (os-reset_status)
1402 scope_types: null
1403 - check_str: rule:xena_system_admin_or_project_member
1404- deprecated_reason: null
1405 deprecated_rule:
1406 check_str: ''
1407+ deprecated_reason: Default policies now support the three Keystone default roles,
1408+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1409+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1410+ (Xena release) for details.
1411+ deprecated_since: X
1412 name: snapshot_extension:snapshot_actions:update_snapshot_status
1413- deprecated_since: null
1414 description: Update database fields of snapshot.
1415 name: snapshot_extension:snapshot_actions:update_snapshot_status
1416 operations:
1417@@ -323,11 +377,14 @@
1418 path: /snapshots/{snapshot_id}/action (os-unmanage)
1419 scope_types: null
1420 - check_str: rule:xena_system_admin_or_project_reader
1421- deprecated_reason: null
1422 deprecated_rule:
1423 check_str: rule:admin_or_owner
1424+ deprecated_reason: Default policies now support the three Keystone default roles,
1425+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1426+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1427+ (Xena release) for details.
1428+ deprecated_since: X
1429 name: backup:get_all
1430- deprecated_since: null
1431 description: List backups.
1432 name: backup:get_all
1433 operations:
1434@@ -346,11 +403,14 @@
1435 path: /backups/detail
1436 scope_types: null
1437 - check_str: rule:xena_system_admin_or_project_member
1438- deprecated_reason: null
1439 deprecated_rule:
1440 check_str: ''
1441+ deprecated_reason: Default policies now support the three Keystone default roles,
1442+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1443+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1444+ (Xena release) for details.
1445+ deprecated_since: X
1446 name: backup:create
1447- deprecated_since: null
1448 description: Create backup.
1449 name: backup:create
1450 operations:
1451@@ -358,11 +418,14 @@
1452 path: /backups
1453 scope_types: null
1454 - check_str: rule:xena_system_admin_or_project_reader
1455- deprecated_reason: null
1456 deprecated_rule:
1457 check_str: rule:admin_or_owner
1458+ deprecated_reason: Default policies now support the three Keystone default roles,
1459+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1460+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1461+ (Xena release) for details.
1462+ deprecated_since: X
1463 name: backup:get
1464- deprecated_since: null
1465 description: Show backup.
1466 name: backup:get
1467 operations:
1468@@ -370,11 +433,14 @@
1469 path: /backups/{backup_id}
1470 scope_types: null
1471 - check_str: rule:xena_system_admin_or_project_member
1472- deprecated_reason: null
1473 deprecated_rule:
1474 check_str: rule:admin_or_owner
1475+ deprecated_reason: Default policies now support the three Keystone default roles,
1476+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1477+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1478+ (Xena release) for details.
1479+ deprecated_since: X
1480 name: backup:update
1481- deprecated_since: null
1482 description: Update backup.
1483 name: backup:update
1484 operations:
1485@@ -382,11 +448,14 @@
1486 path: /backups/{backup_id}
1487 scope_types: null
1488 - check_str: rule:xena_system_admin_or_project_member
1489- deprecated_reason: null
1490 deprecated_rule:
1491 check_str: rule:admin_or_owner
1492+ deprecated_reason: Default policies now support the three Keystone default roles,
1493+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1494+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1495+ (Xena release) for details.
1496+ deprecated_since: X
1497 name: backup:delete
1498- deprecated_since: null
1499 description: Delete backup.
1500 name: backup:delete
1501 operations:
1502@@ -394,11 +463,14 @@
1503 path: /backups/{backup_id}
1504 scope_types: null
1505 - check_str: rule:xena_system_admin_or_project_member
1506- deprecated_reason: null
1507 deprecated_rule:
1508 check_str: rule:admin_or_owner
1509+ deprecated_reason: Default policies now support the three Keystone default roles,
1510+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1511+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1512+ (Xena release) for details.
1513+ deprecated_since: X
1514 name: backup:restore
1515- deprecated_since: null
1516 description: Restore backup.
1517 name: backup:restore
1518 operations:
1519@@ -434,11 +506,14 @@
1520 path: /backups/{backup_id}/action (os-force_delete)
1521 scope_types: null
1522 - check_str: rule:xena_system_admin_or_project_reader
1523- deprecated_reason: null
1524 deprecated_rule:
1525 check_str: rule:admin_or_owner
1526+ deprecated_reason: Default policies now support the three Keystone default roles,
1527+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1528+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1529+ (Xena release) for details.
1530+ deprecated_since: X
1531 name: group:get_all
1532- deprecated_since: null
1533 description: List groups.
1534 name: group:get_all
1535 operations:
1536@@ -448,11 +523,14 @@
1537 path: /groups/detail
1538 scope_types: null
1539 - check_str: rule:xena_system_admin_or_project_member
1540- deprecated_reason: null
1541 deprecated_rule:
1542 check_str: ''
1543+ deprecated_reason: Default policies now support the three Keystone default roles,
1544+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1545+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1546+ (Xena release) for details.
1547+ deprecated_since: X
1548 name: group:create
1549- deprecated_since: null
1550 description: Create group.
1551 name: group:create
1552 operations:
1553@@ -460,11 +538,14 @@
1554 path: /groups
1555 scope_types: null
1556 - check_str: rule:xena_system_admin_or_project_reader
1557- deprecated_reason: null
1558 deprecated_rule:
1559 check_str: rule:admin_or_owner
1560+ deprecated_reason: Default policies now support the three Keystone default roles,
1561+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1562+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1563+ (Xena release) for details.
1564+ deprecated_since: X
1565 name: group:get
1566- deprecated_since: null
1567 description: Show group.
1568 name: group:get
1569 operations:
1570@@ -472,11 +553,14 @@
1571 path: /groups/{group_id}
1572 scope_types: null
1573 - check_str: rule:xena_system_admin_or_project_member
1574- deprecated_reason: null
1575 deprecated_rule:
1576 check_str: rule:admin_or_owner
1577+ deprecated_reason: Default policies now support the three Keystone default roles,
1578+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1579+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1580+ (Xena release) for details.
1581+ deprecated_since: X
1582 name: group:update
1583- deprecated_since: null
1584 description: Update group.
1585 name: group:update
1586 operations:
1587@@ -493,11 +577,12 @@
1588 path: /groups/detail
1589 scope_types: null
1590 - check_str: rule:admin_api
1591- deprecated_reason: null
1592 deprecated_rule:
1593 check_str: rule:admin_api
1594+ deprecated_reason: group:group_types_manage has been replaced by more granular
1595+ policies that separately govern POST, PUT, and DELETE operations.
1596+ deprecated_since: X
1597 name: group:group_types_manage
1598- deprecated_since: null
1599 description: Create a group type.
1600 name: group:group_types:create
1601 operations:
1602@@ -505,11 +590,12 @@
1603 path: /group_types/
1604 scope_types: null
1605 - check_str: rule:admin_api
1606- deprecated_reason: null
1607 deprecated_rule:
1608 check_str: rule:admin_api
1609+ deprecated_reason: group:group_types_manage has been replaced by more granular
1610+ policies that separately govern POST, PUT, and DELETE operations.
1611+ deprecated_since: X
1612 name: group:group_types_manage
1613- deprecated_since: null
1614 description: Update a group type.
1615 name: group:group_types:update
1616 operations:
1617@@ -517,11 +603,12 @@
1618 path: /group_types/{group_type_id}
1619 scope_types: null
1620 - check_str: rule:admin_api
1621- deprecated_reason: null
1622 deprecated_rule:
1623 check_str: rule:admin_api
1624+ deprecated_reason: group:group_types_manage has been replaced by more granular
1625+ policies that separately govern POST, PUT, and DELETE operations.
1626+ deprecated_since: X
1627 name: group:group_types_manage
1628- deprecated_since: null
1629 description: Delete a group type.
1630 name: group:group_types:delete
1631 operations:
1632@@ -536,11 +623,12 @@
1633 path: /group_types/{group_type_id}
1634 scope_types: null
1635 - check_str: rule:admin_api
1636- deprecated_reason: null
1637 deprecated_rule:
1638 check_str: rule:admin_api
1639+ deprecated_reason: group:group_types_specs has been replaced by more granular
1640+ policies that separately govern GET, POST, PUT, and DELETE operations.
1641+ deprecated_since: X
1642 name: group:group_types_specs
1643- deprecated_since: null
1644 description: Show a group type spec.
1645 name: group:group_types_specs:get
1646 operations:
1647@@ -548,11 +636,12 @@
1648 path: /group_types/{group_type_id}/group_specs/{g_spec_id}
1649 scope_types: null
1650 - check_str: rule:admin_api
1651- deprecated_reason: null
1652 deprecated_rule:
1653 check_str: rule:admin_api
1654+ deprecated_reason: group:group_types_specs has been replaced by more granular
1655+ policies that separately govern GET, POST, PUT, and DELETE operations.
1656+ deprecated_since: X
1657 name: group:group_types_specs
1658- deprecated_since: null
1659 description: List group type specs.
1660 name: group:group_types_specs:get_all
1661 operations:
1662@@ -560,11 +649,12 @@
1663 path: /group_types/{group_type_id}/group_specs
1664 scope_types: null
1665 - check_str: rule:admin_api
1666- deprecated_reason: null
1667 deprecated_rule:
1668 check_str: rule:admin_api
1669+ deprecated_reason: group:group_types_specs has been replaced by more granular
1670+ policies that separately govern GET, POST, PUT, and DELETE operations.
1671+ deprecated_since: X
1672 name: group:group_types_specs
1673- deprecated_since: null
1674 description: Create a group type spec.
1675 name: group:group_types_specs:create
1676 operations:
1677@@ -572,11 +662,12 @@
1678 path: /group_types/{group_type_id}/group_specs
1679 scope_types: null
1680 - check_str: rule:admin_api
1681- deprecated_reason: null
1682 deprecated_rule:
1683 check_str: rule:admin_api
1684+ deprecated_reason: group:group_types_specs has been replaced by more granular
1685+ policies that separately govern GET, POST, PUT, and DELETE operations.
1686+ deprecated_since: X
1687 name: group:group_types_specs
1688- deprecated_since: null
1689 description: Update a group type spec.
1690 name: group:group_types_specs:update
1691 operations:
1692@@ -584,11 +675,12 @@
1693 path: /group_types/{group_type_id}/group_specs/{g_spec_id}
1694 scope_types: null
1695 - check_str: rule:admin_api
1696- deprecated_reason: null
1697 deprecated_rule:
1698 check_str: rule:admin_api
1699+ deprecated_reason: group:group_types_specs has been replaced by more granular
1700+ policies that separately govern GET, POST, PUT, and DELETE operations.
1701+ deprecated_since: X
1702 name: group:group_types_specs
1703- deprecated_since: null
1704 description: Delete a group type spec.
1705 name: group:group_types_specs:delete
1706 operations:
1707@@ -596,11 +688,14 @@
1708 path: /group_types/{group_type_id}/group_specs/{g_spec_id}
1709 scope_types: null
1710 - check_str: rule:xena_system_admin_or_project_reader
1711- deprecated_reason: null
1712 deprecated_rule:
1713 check_str: rule:admin_or_owner
1714+ deprecated_reason: Default policies now support the three Keystone default roles,
1715+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1716+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1717+ (Xena release) for details.
1718+ deprecated_since: X
1719 name: group:get_all_group_snapshots
1720- deprecated_since: null
1721 description: List group snapshots.
1722 name: group:get_all_group_snapshots
1723 operations:
1724@@ -610,11 +705,14 @@
1725 path: /group_snapshots/detail
1726 scope_types: null
1727 - check_str: rule:xena_system_admin_or_project_member
1728- deprecated_reason: null
1729 deprecated_rule:
1730 check_str: ''
1731+ deprecated_reason: Default policies now support the three Keystone default roles,
1732+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1733+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1734+ (Xena release) for details.
1735+ deprecated_since: X
1736 name: group:create_group_snapshot
1737- deprecated_since: null
1738 description: Create group snapshot.
1739 name: group:create_group_snapshot
1740 operations:
1741@@ -622,11 +720,14 @@
1742 path: /group_snapshots
1743 scope_types: null
1744 - check_str: rule:xena_system_admin_or_project_reader
1745- deprecated_reason: null
1746 deprecated_rule:
1747 check_str: rule:admin_or_owner
1748+ deprecated_reason: Default policies now support the three Keystone default roles,
1749+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1750+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1751+ (Xena release) for details.
1752+ deprecated_since: X
1753 name: group:get_group_snapshot
1754- deprecated_since: null
1755 description: Show group snapshot.
1756 name: group:get_group_snapshot
1757 operations:
1758@@ -634,11 +735,14 @@
1759 path: /group_snapshots/{group_snapshot_id}
1760 scope_types: null
1761 - check_str: rule:xena_system_admin_or_project_member
1762- deprecated_reason: null
1763 deprecated_rule:
1764 check_str: rule:admin_or_owner
1765+ deprecated_reason: Default policies now support the three Keystone default roles,
1766+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1767+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1768+ (Xena release) for details.
1769+ deprecated_since: X
1770 name: group:delete_group_snapshot
1771- deprecated_since: null
1772 description: Delete group snapshot.
1773 name: group:delete_group_snapshot
1774 operations:
1775@@ -646,11 +750,14 @@
1776 path: /group_snapshots/{group_snapshot_id}
1777 scope_types: null
1778 - check_str: rule:xena_system_admin_or_project_member
1779- deprecated_reason: null
1780 deprecated_rule:
1781 check_str: rule:admin_or_owner
1782+ deprecated_reason: Default policies now support the three Keystone default roles,
1783+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1784+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1785+ (Xena release) for details.
1786+ deprecated_since: X
1787 name: group:update_group_snapshot
1788- deprecated_since: null
1789 description: Update group snapshot.
1790 name: group:update_group_snapshot
1791 operations:
1792@@ -674,11 +781,14 @@
1793 path: /group_snapshots/{g_snapshot_id}/action (reset_status)
1794 scope_types: null
1795 - check_str: rule:xena_system_admin_or_project_member
1796- deprecated_reason: null
1797 deprecated_rule:
1798 check_str: rule:admin_or_owner
1799+ deprecated_reason: Default policies now support the three Keystone default roles,
1800+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1801+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1802+ (Xena release) for details.
1803+ deprecated_since: X
1804 name: group:delete
1805- deprecated_since: null
1806 description: Delete group.
1807 name: group:delete
1808 operations:
1809@@ -693,11 +803,14 @@
1810 path: /groups/{group_id}/action (reset_status)
1811 scope_types: null
1812 - check_str: rule:xena_system_admin_or_project_member
1813- deprecated_reason: null
1814 deprecated_rule:
1815 check_str: rule:admin_or_owner
1816+ deprecated_reason: Default policies now support the three Keystone default roles,
1817+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1818+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1819+ (Xena release) for details.
1820+ deprecated_since: X
1821 name: group:enable_replication
1822- deprecated_since: null
1823 description: Enable replication.
1824 name: group:enable_replication
1825 operations:
1826@@ -705,11 +818,14 @@
1827 path: /groups/{group_id}/action (enable_replication)
1828 scope_types: null
1829 - check_str: rule:xena_system_admin_or_project_member
1830- deprecated_reason: null
1831 deprecated_rule:
1832 check_str: rule:admin_or_owner
1833+ deprecated_reason: Default policies now support the three Keystone default roles,
1834+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1835+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1836+ (Xena release) for details.
1837+ deprecated_since: X
1838 name: group:disable_replication
1839- deprecated_since: null
1840 description: Disable replication.
1841 name: group:disable_replication
1842 operations:
1843@@ -717,11 +833,14 @@
1844 path: /groups/{group_id}/action (disable_replication)
1845 scope_types: null
1846 - check_str: rule:xena_system_admin_or_project_member
1847- deprecated_reason: null
1848 deprecated_rule:
1849 check_str: rule:admin_or_owner
1850+ deprecated_reason: Default policies now support the three Keystone default roles,
1851+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1852+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1853+ (Xena release) for details.
1854+ deprecated_since: X
1855 name: group:failover_replication
1856- deprecated_since: null
1857 description: Fail over replication.
1858 name: group:failover_replication
1859 operations:
1860@@ -729,11 +848,14 @@
1861 path: /groups/{group_id}/action (failover_replication)
1862 scope_types: null
1863 - check_str: rule:xena_system_admin_or_project_member
1864- deprecated_reason: null
1865 deprecated_rule:
1866 check_str: rule:admin_or_owner
1867+ deprecated_reason: Default policies now support the three Keystone default roles,
1868+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1869+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1870+ (Xena release) for details.
1871+ deprecated_since: X
1872 name: group:list_replication_targets
1873- deprecated_since: null
1874 description: List failover replication.
1875 name: group:list_replication_targets
1876 operations:
1877@@ -786,11 +908,12 @@
1878 path: /qos-specs/{qos_id}/delete_keys
1879 scope_types: null
1880 - check_str: rule:admin_api
1881- deprecated_reason: null
1882 deprecated_rule:
1883 check_str: rule:admin_api
1884+ deprecated_reason: volume_extension:quota_classes has been replaced by more granular
1885+ policies that separately govern GET and PUT operations.
1886+ deprecated_since: X
1887 name: volume_extension:quota_classes
1888- deprecated_since: null
1889 description: Show project quota class.
1890 name: volume_extension:quota_classes:get
1891 operations:
1892@@ -798,11 +921,12 @@
1893 path: /os-quota-class-sets/{project_id}
1894 scope_types: null
1895 - check_str: rule:admin_api
1896- deprecated_reason: null
1897 deprecated_rule:
1898 check_str: rule:admin_api
1899+ deprecated_reason: volume_extension:quota_classes has been replaced by more granular
1900+ policies that separately govern GET and PUT operations.
1901+ deprecated_since: X
1902 name: volume_extension:quota_classes
1903- deprecated_since: null
1904 description: Update project quota class.
1905 name: volume_extension:quota_classes:update
1906 operations:
1907@@ -810,11 +934,11 @@
1908 path: /os-quota-class-sets/{project_id}
1909 scope_types: null
1910 - check_str: rule:xena_system_admin_or_project_reader
1911- deprecated_reason: null
1912 deprecated_rule:
1913 check_str: rule:admin_or_owner
1914+ deprecated_reason: null
1915+ deprecated_since: null
1916 name: volume_extension:quotas:show
1917- deprecated_since: null
1918 description: Show project quota (including usage and default).
1919 name: volume_extension:quotas:show
1920 operations:
1921@@ -901,11 +1025,14 @@
1922 path: /os-hosts/{host_id}
1923 scope_types: null
1924 - check_str: rule:xena_system_admin_or_project_reader
1925- deprecated_reason: null
1926 deprecated_rule:
1927 check_str: rule:admin_or_owner
1928+ deprecated_reason: Default policies now support the three Keystone default roles,
1929+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1930+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1931+ (Xena release) for details.
1932+ deprecated_since: X
1933 name: limits_extension:used_limits
1934- deprecated_since: null
1935 description: Show limits with used limit attributes.
1936 name: limits_extension:used_limits
1937 operations:
1938@@ -936,11 +1063,12 @@
1939 path: /volumes/{volume_id}/action (os-unmanage)
1940 scope_types: null
1941 - check_str: rule:admin_api
1942- deprecated_reason: null
1943 deprecated_rule:
1944 check_str: rule:admin_api
1945+ deprecated_reason: volume_extension:types_manage has been replaced by more granular
1946+ policies that separately govern POST, PUT, and DELETE operations.
1947+ deprecated_since: X
1948 name: volume_extension:types_manage
1949- deprecated_since: null
1950 description: Create volume type.
1951 name: volume_extension:type_create
1952 operations:
1953@@ -948,11 +1076,12 @@
1954 path: /types
1955 scope_types: null
1956 - check_str: rule:admin_api
1957- deprecated_reason: null
1958 deprecated_rule:
1959 check_str: rule:admin_api
1960+ deprecated_reason: volume_extension:types_manage has been replaced by more granular
1961+ policies that separately govern POST, PUT, and DELETE operations.
1962+ deprecated_since: X
1963 name: volume_extension:types_manage
1964- deprecated_since: null
1965 description: Update volume type.
1966 name: volume_extension:type_update
1967 operations:
1968@@ -960,11 +1089,12 @@
1969 path: /types
1970 scope_types: null
1971 - check_str: rule:admin_api
1972- deprecated_reason: null
1973 deprecated_rule:
1974 check_str: rule:admin_api
1975+ deprecated_reason: volume_extension:types_manage has been replaced by more granular
1976+ policies that separately govern POST, PUT, and DELETE operations.
1977+ deprecated_since: X
1978 name: volume_extension:types_manage
1979- deprecated_since: null
1980 description: Delete volume type.
1981 name: volume_extension:type_delete
1982 operations:
1983@@ -972,11 +1102,14 @@
1984 path: /types
1985 scope_types: null
1986 - check_str: rule:xena_system_admin_or_project_reader
1987- deprecated_reason: null
1988 deprecated_rule:
1989 check_str: ''
1990+ deprecated_reason: Default policies now support the three Keystone default roles,
1991+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
1992+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
1993+ (Xena release) for details.
1994+ deprecated_since: X
1995 name: volume_extension:type_get
1996- deprecated_since: null
1997 description: Get one specific volume type.
1998 name: volume_extension:type_get
1999 operations:
2000@@ -984,11 +1117,14 @@
2001 path: /types/{type_id}
2002 scope_types: null
2003 - check_str: rule:xena_system_admin_or_project_reader
2004- deprecated_reason: null
2005 deprecated_rule:
2006 check_str: ''
2007+ deprecated_reason: Default policies now support the three Keystone default roles,
2008+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2009+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2010+ (Xena release) for details.
2011+ deprecated_since: X
2012 name: volume_extension:type_get_all
2013- deprecated_since: null
2014 description: List volume types.
2015 name: volume_extension:type_get_all
2016 operations:
2017@@ -996,11 +1132,14 @@
2018 path: /types/
2019 scope_types: null
2020 - check_str: rule:xena_system_admin_or_project_reader
2021- deprecated_reason: null
2022 deprecated_rule:
2023 check_str: rule:admin_api
2024+ deprecated_reason: Default policies now support the three Keystone default roles,
2025+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2026+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2027+ (Xena release) for details.
2028+ deprecated_since: X
2029 name: volume_extension:access_types_extra_specs
2030- deprecated_since: null
2031 description: Include the volume type's extra_specs attribute in the volume type
2032 list or show requests. The ability to make these calls is governed by other policies.
2033 name: volume_extension:access_types_extra_specs
2034@@ -1027,11 +1166,15 @@
2035 operations: []
2036 scope_types: null
2037 - check_str: rule:admin_api
2038- deprecated_reason: null
2039 deprecated_rule:
2040 check_str: rule:volume_extension:volume_type_encryption
2041+ deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a
2042+ convenience policy that allowed you to set all volume encryption type policies
2043+ to the same value. We are deprecating this rule to prepare for a future release
2044+ in which the default values for policies that read, create/update, and delete
2045+ encryption types will be different from each other.'
2046+ deprecated_since: X
2047 name: volume_extension:volume_type_encryption:create
2048- deprecated_since: null
2049 description: Create volume type encryption.
2050 name: volume_extension:volume_type_encryption:create
2051 operations:
2052@@ -1039,11 +1182,15 @@
2053 path: /types/{type_id}/encryption
2054 scope_types: null
2055 - check_str: rule:admin_api
2056- deprecated_reason: null
2057 deprecated_rule:
2058 check_str: rule:volume_extension:volume_type_encryption
2059+ deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a
2060+ convenience policy that allowed you to set all volume encryption type policies
2061+ to the same value. We are deprecating this rule to prepare for a future release
2062+ in which the default values for policies that read, create/update, and delete
2063+ encryption types will be different from each other.'
2064+ deprecated_since: X
2065 name: volume_extension:volume_type_encryption:get
2066- deprecated_since: null
2067 description: Show a volume type's encryption type, show an encryption specs item.
2068 name: volume_extension:volume_type_encryption:get
2069 operations:
2070@@ -1053,11 +1200,15 @@
2071 path: /types/{type_id}/encryption/{key}
2072 scope_types: null
2073 - check_str: rule:admin_api
2074- deprecated_reason: null
2075 deprecated_rule:
2076 check_str: rule:volume_extension:volume_type_encryption
2077+ deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a
2078+ convenience policy that allowed you to set all volume encryption type policies
2079+ to the same value. We are deprecating this rule to prepare for a future release
2080+ in which the default values for policies that read, create/update, and delete
2081+ encryption types will be different from each other.'
2082+ deprecated_since: X
2083 name: volume_extension:volume_type_encryption:update
2084- deprecated_since: null
2085 description: Update volume type encryption.
2086 name: volume_extension:volume_type_encryption:update
2087 operations:
2088@@ -1065,11 +1216,15 @@
2089 path: /types/{type_id}/encryption/{encryption_id}
2090 scope_types: null
2091 - check_str: rule:admin_api
2092- deprecated_reason: null
2093 deprecated_rule:
2094 check_str: rule:volume_extension:volume_type_encryption
2095+ deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a
2096+ convenience policy that allowed you to set all volume encryption type policies
2097+ to the same value. We are deprecating this rule to prepare for a future release
2098+ in which the default values for policies that read, create/update, and delete
2099+ encryption types will be different from each other.'
2100+ deprecated_since: X
2101 name: volume_extension:volume_type_encryption:delete
2102- deprecated_since: null
2103 description: Delete volume type encryption.
2104 name: volume_extension:volume_type_encryption:delete
2105 operations:
2106@@ -1077,11 +1232,14 @@
2107 path: /types/{type_id}/encryption/{encryption_id}
2108 scope_types: null
2109 - check_str: rule:xena_system_admin_or_project_member
2110- deprecated_reason: null
2111 deprecated_rule:
2112 check_str: rule:admin_or_owner
2113+ deprecated_reason: Default policies now support the three Keystone default roles,
2114+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2115+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2116+ (Xena release) for details.
2117+ deprecated_since: X
2118 name: volume_extension:volume_type_access
2119- deprecated_since: null
2120 description: Adds the boolean field 'os-volume-type-access:is_public' to the responses
2121 for these API calls. The ability to make these calls is governed by other policies.
2122 name: volume_extension:volume_type_access
2123@@ -1108,11 +1266,13 @@
2124 path: /types/{type_id}/action (removeProjectAccess)
2125 scope_types: null
2126 - check_str: rule:admin_api
2127- deprecated_reason: null
2128 deprecated_rule:
2129 check_str: volume_extension:volume_type_access
2130+ deprecated_reason: 'Reason: ''volume_extension:volume_type_access:get_all_for_type''
2131+ is a new policy that protects an API call formerly governed by ''volume_extension:volume_type_access'',
2132+ but which has been separated for finer-grained policy control.'
2133+ deprecated_since: X
2134 name: volume_extension:volume_type_access:get_all_for_type
2135- deprecated_since: null
2136 description: List private volume type access detail, that is, list the projects
2137 that have access to this volume type.
2138 name: volume_extension:volume_type_access:get_all_for_type
2139@@ -1121,11 +1281,14 @@
2140 path: /types/{type_id}/os-volume-type-access
2141 scope_types: null
2142 - check_str: rule:xena_system_admin_or_project_member
2143- deprecated_reason: null
2144 deprecated_rule:
2145 check_str: rule:admin_or_owner
2146+ deprecated_reason: Default policies now support the three Keystone default roles,
2147+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2148+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2149+ (Xena release) for details.
2150+ deprecated_since: X
2151 name: volume:extend
2152- deprecated_since: null
2153 description: Extend a volume.
2154 name: volume:extend
2155 operations:
2156@@ -1133,11 +1296,14 @@
2157 path: /volumes/{volume_id}/action (os-extend)
2158 scope_types: null
2159 - check_str: rule:xena_system_admin_or_project_member
2160- deprecated_reason: null
2161 deprecated_rule:
2162 check_str: rule:admin_or_owner
2163+ deprecated_reason: Default policies now support the three Keystone default roles,
2164+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2165+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2166+ (Xena release) for details.
2167+ deprecated_since: X
2168 name: volume:extend_attached_volume
2169- deprecated_since: null
2170 description: Extend a attached volume.
2171 name: volume:extend_attached_volume
2172 operations:
2173@@ -1152,11 +1318,14 @@
2174 path: /volumes/{volume_id}/action (os-extend_volume_completion)
2175 scope_types: null
2176 - check_str: rule:xena_system_admin_or_project_member
2177- deprecated_reason: null
2178 deprecated_rule:
2179 check_str: rule:admin_or_owner
2180+ deprecated_reason: Default policies now support the three Keystone default roles,
2181+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2182+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2183+ (Xena release) for details.
2184+ deprecated_since: X
2185 name: volume:revert_to_snapshot
2186- deprecated_since: null
2187 description: Revert a volume to a snapshot.
2188 name: volume:revert_to_snapshot
2189 operations:
2190@@ -1171,11 +1340,14 @@
2191 path: /volumes/{volume_id}/action (os-reset_status)
2192 scope_types: null
2193 - check_str: rule:xena_system_admin_or_project_member
2194- deprecated_reason: null
2195 deprecated_rule:
2196 check_str: rule:admin_or_owner
2197+ deprecated_reason: Default policies now support the three Keystone default roles,
2198+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2199+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2200+ (Xena release) for details.
2201+ deprecated_since: X
2202 name: volume:retype
2203- deprecated_since: null
2204 description: Retype a volume.
2205 name: volume:retype
2206 operations:
2207@@ -1183,11 +1355,14 @@
2208 path: /volumes/{volume_id}/action (os-retype)
2209 scope_types: null
2210 - check_str: rule:xena_system_admin_or_project_member
2211- deprecated_reason: null
2212 deprecated_rule:
2213 check_str: rule:admin_or_owner
2214+ deprecated_reason: Default policies now support the three Keystone default roles,
2215+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2216+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2217+ (Xena release) for details.
2218+ deprecated_since: X
2219 name: volume:update_readonly_flag
2220- deprecated_since: null
2221 description: Update a volume's readonly flag.
2222 name: volume:update_readonly_flag
2223 operations:
2224@@ -1209,11 +1384,14 @@
2225 path: /volumes/{volume_id}/action (os-volume_upload_image)
2226 scope_types: null
2227 - check_str: rule:xena_system_admin_or_project_member
2228- deprecated_reason: null
2229 deprecated_rule:
2230 check_str: rule:admin_or_owner
2231+ deprecated_reason: Default policies now support the three Keystone default roles,
2232+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2233+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2234+ (Xena release) for details.
2235+ deprecated_since: X
2236 name: volume_extension:volume_actions:upload_image
2237- deprecated_since: null
2238 description: Upload a volume to image.
2239 name: volume_extension:volume_actions:upload_image
2240 operations:
2241@@ -1242,11 +1420,14 @@
2242 path: /volumes/{volume_id}/action (os-migrate_volume_completion)
2243 scope_types: null
2244 - check_str: rule:xena_system_admin_or_project_member
2245- deprecated_reason: null
2246 deprecated_rule:
2247 check_str: rule:admin_or_owner
2248+ deprecated_reason: Default policies now support the three Keystone default roles,
2249+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2250+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2251+ (Xena release) for details.
2252+ deprecated_since: X
2253 name: volume_extension:volume_actions:initialize_connection
2254- deprecated_since: null
2255 description: Initialize volume attachment.
2256 name: volume_extension:volume_actions:initialize_connection
2257 operations:
2258@@ -1254,11 +1435,14 @@
2259 path: /volumes/{volume_id}/action (os-initialize_connection)
2260 scope_types: null
2261 - check_str: rule:xena_system_admin_or_project_member
2262- deprecated_reason: null
2263 deprecated_rule:
2264 check_str: rule:admin_or_owner
2265+ deprecated_reason: Default policies now support the three Keystone default roles,
2266+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2267+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2268+ (Xena release) for details.
2269+ deprecated_since: X
2270 name: volume_extension:volume_actions:terminate_connection
2271- deprecated_since: null
2272 description: Terminate volume attachment.
2273 name: volume_extension:volume_actions:terminate_connection
2274 operations:
2275@@ -1266,11 +1450,14 @@
2276 path: /volumes/{volume_id}/action (os-terminate_connection)
2277 scope_types: null
2278 - check_str: rule:xena_system_admin_or_project_member
2279- deprecated_reason: null
2280 deprecated_rule:
2281 check_str: rule:admin_or_owner
2282+ deprecated_reason: Default policies now support the three Keystone default roles,
2283+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2284+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2285+ (Xena release) for details.
2286+ deprecated_since: X
2287 name: volume_extension:volume_actions:roll_detaching
2288- deprecated_since: null
2289 description: Roll back volume status to 'in-use'.
2290 name: volume_extension:volume_actions:roll_detaching
2291 operations:
2292@@ -1278,11 +1465,14 @@
2293 path: /volumes/{volume_id}/action (os-roll_detaching)
2294 scope_types: null
2295 - check_str: rule:xena_system_admin_or_project_member
2296- deprecated_reason: null
2297 deprecated_rule:
2298 check_str: rule:admin_or_owner
2299+ deprecated_reason: Default policies now support the three Keystone default roles,
2300+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2301+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2302+ (Xena release) for details.
2303+ deprecated_since: X
2304 name: volume_extension:volume_actions:reserve
2305- deprecated_since: null
2306 description: Mark volume as reserved.
2307 name: volume_extension:volume_actions:reserve
2308 operations:
2309@@ -1290,11 +1480,14 @@
2310 path: /volumes/{volume_id}/action (os-reserve)
2311 scope_types: null
2312 - check_str: rule:xena_system_admin_or_project_member
2313- deprecated_reason: null
2314 deprecated_rule:
2315 check_str: rule:admin_or_owner
2316+ deprecated_reason: Default policies now support the three Keystone default roles,
2317+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2318+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2319+ (Xena release) for details.
2320+ deprecated_since: X
2321 name: volume_extension:volume_actions:unreserve
2322- deprecated_since: null
2323 description: Unmark volume as reserved.
2324 name: volume_extension:volume_actions:unreserve
2325 operations:
2326@@ -1302,11 +1495,14 @@
2327 path: /volumes/{volume_id}/action (os-unreserve)
2328 scope_types: null
2329 - check_str: rule:xena_system_admin_or_project_member
2330- deprecated_reason: null
2331 deprecated_rule:
2332 check_str: rule:admin_or_owner
2333+ deprecated_reason: Default policies now support the three Keystone default roles,
2334+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2335+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2336+ (Xena release) for details.
2337+ deprecated_since: X
2338 name: volume_extension:volume_actions:begin_detaching
2339- deprecated_since: null
2340 description: Begin detach volumes.
2341 name: volume_extension:volume_actions:begin_detaching
2342 operations:
2343@@ -1314,11 +1510,14 @@
2344 path: /volumes/{volume_id}/action (os-begin_detaching)
2345 scope_types: null
2346 - check_str: rule:xena_system_admin_or_project_member
2347- deprecated_reason: null
2348 deprecated_rule:
2349 check_str: rule:admin_or_owner
2350+ deprecated_reason: Default policies now support the three Keystone default roles,
2351+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2352+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2353+ (Xena release) for details.
2354+ deprecated_since: X
2355 name: volume_extension:volume_actions:attach
2356- deprecated_since: null
2357 description: Add attachment metadata.
2358 name: volume_extension:volume_actions:attach
2359 operations:
2360@@ -1326,11 +1525,14 @@
2361 path: /volumes/{volume_id}/action (os-attach)
2362 scope_types: null
2363 - check_str: rule:xena_system_admin_or_project_member
2364- deprecated_reason: null
2365 deprecated_rule:
2366 check_str: rule:admin_or_owner
2367+ deprecated_reason: Default policies now support the three Keystone default roles,
2368+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2369+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2370+ (Xena release) for details.
2371+ deprecated_since: X
2372 name: volume_extension:volume_actions:detach
2373- deprecated_since: null
2374 description: Clear attachment metadata.
2375 name: volume_extension:volume_actions:detach
2376 operations:
2377@@ -1352,11 +1554,14 @@
2378 path: /volumes/{volume_id}/action (os-reimage)
2379 scope_types: null
2380 - check_str: rule:xena_system_admin_or_project_reader
2381- deprecated_reason: null
2382 deprecated_rule:
2383 check_str: rule:admin_or_owner
2384+ deprecated_reason: Default policies now support the three Keystone default roles,
2385+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2386+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2387+ (Xena release) for details.
2388+ deprecated_since: X
2389 name: volume:get_all_transfers
2390- deprecated_since: null
2391 description: List volume transfer.
2392 name: volume:get_all_transfers
2393 operations:
2394@@ -1370,11 +1575,14 @@
2395 path: /volume-transfers/detail
2396 scope_types: null
2397 - check_str: rule:xena_system_admin_or_project_member
2398- deprecated_reason: null
2399 deprecated_rule:
2400 check_str: rule:admin_or_owner
2401+ deprecated_reason: Default policies now support the three Keystone default roles,
2402+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2403+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2404+ (Xena release) for details.
2405+ deprecated_since: X
2406 name: volume:create_transfer
2407- deprecated_since: null
2408 description: Create a volume transfer.
2409 name: volume:create_transfer
2410 operations:
2411@@ -1384,11 +1592,14 @@
2412 path: /volume_transfers
2413 scope_types: null
2414 - check_str: rule:xena_system_admin_or_project_reader
2415- deprecated_reason: null
2416 deprecated_rule:
2417 check_str: rule:admin_or_owner
2418+ deprecated_reason: Default policies now support the three Keystone default roles,
2419+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2420+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2421+ (Xena release) for details.
2422+ deprecated_since: X
2423 name: volume:get_transfer
2424- deprecated_since: null
2425 description: Show one specified volume transfer.
2426 name: volume:get_transfer
2427 operations:
2428@@ -1398,11 +1609,14 @@
2429 path: /volume-transfers/{transfer_id}
2430 scope_types: null
2431 - check_str: rule:xena_system_admin_or_project_member
2432- deprecated_reason: null
2433 deprecated_rule:
2434 check_str: ''
2435+ deprecated_reason: Default policies now support the three Keystone default roles,
2436+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2437+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2438+ (Xena release) for details.
2439+ deprecated_since: X
2440 name: volume:accept_transfer
2441- deprecated_since: null
2442 description: Accept a volume transfer.
2443 name: volume:accept_transfer
2444 operations:
2445@@ -1412,11 +1626,14 @@
2446 path: /volume-transfers/{transfer_id}/accept
2447 scope_types: null
2448 - check_str: rule:xena_system_admin_or_project_member
2449- deprecated_reason: null
2450 deprecated_rule:
2451 check_str: rule:admin_or_owner
2452+ deprecated_reason: Default policies now support the three Keystone default roles,
2453+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2454+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2455+ (Xena release) for details.
2456+ deprecated_since: X
2457 name: volume:delete_transfer
2458- deprecated_since: null
2459 description: Delete volume transfer.
2460 name: volume:delete_transfer
2461 operations:
2462@@ -1426,11 +1643,14 @@
2463 path: /volume-transfers/{transfer_id}
2464 scope_types: null
2465 - check_str: rule:xena_system_admin_or_project_reader
2466- deprecated_reason: null
2467 deprecated_rule:
2468 check_str: rule:admin_or_owner
2469+ deprecated_reason: Default policies now support the three Keystone default roles,
2470+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2471+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2472+ (Xena release) for details.
2473+ deprecated_since: X
2474 name: volume:get_volume_metadata
2475- deprecated_since: null
2476 description: Show volume's metadata or one specified metadata with a given key.
2477 name: volume:get_volume_metadata
2478 operations:
2479@@ -1442,11 +1662,14 @@
2480 path: /volumes/{volume_id}/action (os-show_image_metadata)
2481 scope_types: null
2482 - check_str: rule:xena_system_admin_or_project_member
2483- deprecated_reason: null
2484 deprecated_rule:
2485 check_str: rule:admin_or_owner
2486+ deprecated_reason: Default policies now support the three Keystone default roles,
2487+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2488+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2489+ (Xena release) for details.
2490+ deprecated_since: X
2491 name: volume:create_volume_metadata
2492- deprecated_since: null
2493 description: Create volume metadata.
2494 name: volume:create_volume_metadata
2495 operations:
2496@@ -1454,11 +1677,14 @@
2497 path: /volumes/{volume_id}/metadata
2498 scope_types: null
2499 - check_str: rule:xena_system_admin_or_project_member
2500- deprecated_reason: null
2501 deprecated_rule:
2502 check_str: rule:admin_or_owner
2503+ deprecated_reason: Default policies now support the three Keystone default roles,
2504+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2505+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2506+ (Xena release) for details.
2507+ deprecated_since: X
2508 name: volume:update_volume_metadata
2509- deprecated_since: null
2510 description: Replace a volume's metadata dictionary or update a single metadatum
2511 with a given key.
2512 name: volume:update_volume_metadata
2513@@ -1469,11 +1695,14 @@
2514 path: /volumes/{volume_id}/metadata/{key}
2515 scope_types: null
2516 - check_str: rule:xena_system_admin_or_project_member
2517- deprecated_reason: null
2518 deprecated_rule:
2519 check_str: rule:admin_or_owner
2520+ deprecated_reason: Default policies now support the three Keystone default roles,
2521+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2522+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2523+ (Xena release) for details.
2524+ deprecated_since: X
2525 name: volume:delete_volume_metadata
2526- deprecated_since: null
2527 description: Delete a volume's metadatum with the given key.
2528 name: volume:delete_volume_metadata
2529 operations:
2530@@ -1481,11 +1710,12 @@
2531 path: /volumes/{volume_id}/metadata/{key}
2532 scope_types: null
2533 - check_str: rule:xena_system_admin_or_project_reader
2534- deprecated_reason: null
2535 deprecated_rule:
2536 check_str: rule:admin_or_owner
2537+ deprecated_reason: volume_extension:volume_image_metadata has been replaced by
2538+ more granular policies that separately govern show, set, and remove operations.
2539+ deprecated_since: X
2540 name: volume_extension:volume_image_metadata
2541- deprecated_since: null
2542 description: Include a volume's image metadata in volume detail responses. The
2543 ability to make these calls is governed by other policies.
2544 name: volume_extension:volume_image_metadata:show
2545@@ -1496,11 +1726,12 @@
2546 path: /volumes/{volume_id}
2547 scope_types: null
2548 - check_str: rule:xena_system_admin_or_project_member
2549- deprecated_reason: null
2550 deprecated_rule:
2551 check_str: rule:admin_or_owner
2552+ deprecated_reason: volume_extension:volume_image_metadata has been replaced by
2553+ more granular policies that separately govern show, set, and remove operations.
2554+ deprecated_since: X
2555 name: volume_extension:volume_image_metadata
2556- deprecated_since: null
2557 description: Set image metadata for a volume
2558 name: volume_extension:volume_image_metadata:set
2559 operations:
2560@@ -1508,11 +1739,12 @@
2561 path: /volumes/{volume_id}/action (os-set_image_metadata)
2562 scope_types: null
2563 - check_str: rule:xena_system_admin_or_project_member
2564- deprecated_reason: null
2565 deprecated_rule:
2566 check_str: rule:admin_or_owner
2567+ deprecated_reason: volume_extension:volume_image_metadata has been replaced by
2568+ more granular policies that separately govern show, set, and remove operations.
2569+ deprecated_since: X
2570 name: volume_extension:volume_image_metadata
2571- deprecated_since: null
2572 description: Remove specific image metadata from a volume
2573 name: volume_extension:volume_image_metadata:remove
2574 operations:
2575@@ -1530,11 +1762,14 @@
2576 path: /volumes/{volume_id}/action (os-attach)
2577 scope_types: null
2578 - check_str: rule:xena_system_admin_or_project_reader
2579- deprecated_reason: null
2580 deprecated_rule:
2581 check_str: ''
2582+ deprecated_reason: Default policies now support the three Keystone default roles,
2583+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2584+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2585+ (Xena release) for details.
2586+ deprecated_since: X
2587 name: volume_extension:types_extra_specs:index
2588- deprecated_since: null
2589 description: List type extra specs.
2590 name: volume_extension:types_extra_specs:index
2591 operations:
2592@@ -1549,11 +1784,14 @@
2593 path: /types/{type_id}/extra_specs
2594 scope_types: null
2595 - check_str: rule:xena_system_admin_or_project_reader
2596- deprecated_reason: null
2597 deprecated_rule:
2598 check_str: ''
2599+ deprecated_reason: Default policies now support the three Keystone default roles,
2600+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2601+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2602+ (Xena release) for details.
2603+ deprecated_since: X
2604 name: volume_extension:types_extra_specs:show
2605- deprecated_since: null
2606 description: Show one specified type extra specs.
2607 name: volume_extension:types_extra_specs:show
2608 operations:
2609@@ -1591,11 +1829,14 @@
2610 path: /types/{type_id}/extra_specs/{extra_spec_key}
2611 scope_types: null
2612 - check_str: rule:xena_system_admin_or_project_member
2613- deprecated_reason: null
2614 deprecated_rule:
2615 check_str: ''
2616+ deprecated_reason: Default policies now support the three Keystone default roles,
2617+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2618+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2619+ (Xena release) for details.
2620+ deprecated_since: X
2621 name: volume:create
2622- deprecated_since: null
2623 description: Create volume.
2624 name: volume:create
2625 operations:
2626@@ -1603,11 +1844,14 @@
2627 path: /volumes
2628 scope_types: null
2629 - check_str: rule:xena_system_admin_or_project_member
2630- deprecated_reason: null
2631 deprecated_rule:
2632 check_str: ''
2633+ deprecated_reason: Default policies now support the three Keystone default roles,
2634+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2635+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2636+ (Xena release) for details.
2637+ deprecated_since: X
2638 name: volume:create_from_image
2639- deprecated_since: null
2640 description: Create volume from image.
2641 name: volume:create_from_image
2642 operations:
2643@@ -1615,11 +1859,14 @@
2644 path: /volumes
2645 scope_types: null
2646 - check_str: rule:xena_system_admin_or_project_reader
2647- deprecated_reason: null
2648 deprecated_rule:
2649 check_str: rule:admin_or_owner
2650+ deprecated_reason: Default policies now support the three Keystone default roles,
2651+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2652+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2653+ (Xena release) for details.
2654+ deprecated_since: X
2655 name: volume:get
2656- deprecated_since: null
2657 description: Show volume.
2658 name: volume:get
2659 operations:
2660@@ -1627,11 +1874,14 @@
2661 path: /volumes/{volume_id}
2662 scope_types: null
2663 - check_str: rule:xena_system_admin_or_project_reader
2664- deprecated_reason: null
2665 deprecated_rule:
2666 check_str: rule:admin_or_owner
2667+ deprecated_reason: Default policies now support the three Keystone default roles,
2668+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2669+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2670+ (Xena release) for details.
2671+ deprecated_since: X
2672 name: volume:get_all
2673- deprecated_since: null
2674 description: List volumes or get summary of volumes.
2675 name: volume:get_all
2676 operations:
2677@@ -1643,11 +1893,14 @@
2678 path: /volumes/summary
2679 scope_types: null
2680 - check_str: rule:xena_system_admin_or_project_member
2681- deprecated_reason: null
2682 deprecated_rule:
2683 check_str: rule:admin_or_owner
2684+ deprecated_reason: Default policies now support the three Keystone default roles,
2685+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2686+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2687+ (Xena release) for details.
2688+ deprecated_since: X
2689 name: volume:update
2690- deprecated_since: null
2691 description: Update volume or update a volume's bootable status.
2692 name: volume:update
2693 operations:
2694@@ -1657,11 +1910,14 @@
2695 path: /volumes/{volume_id}/action (os-set_bootable)
2696 scope_types: null
2697 - check_str: rule:xena_system_admin_or_project_member
2698- deprecated_reason: null
2699 deprecated_rule:
2700 check_str: rule:admin_or_owner
2701+ deprecated_reason: Default policies now support the three Keystone default roles,
2702+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2703+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2704+ (Xena release) for details.
2705+ deprecated_since: X
2706 name: volume:delete
2707- deprecated_since: null
2708 description: Delete volume.
2709 name: volume:delete
2710 operations:
2711@@ -1685,11 +1941,14 @@
2712 path: /volumes/detail
2713 scope_types: null
2714 - check_str: rule:xena_system_admin_or_project_reader
2715- deprecated_reason: null
2716 deprecated_rule:
2717 check_str: rule:admin_or_owner
2718+ deprecated_reason: Default policies now support the three Keystone default roles,
2719+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2720+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2721+ (Xena release) for details.
2722+ deprecated_since: X
2723 name: volume_extension:volume_tenant_attribute
2724- deprecated_since: null
2725 description: List or show volume with tenant attribute.
2726 name: volume_extension:volume_tenant_attribute
2727 operations:
2728@@ -1708,11 +1967,14 @@
2729 path: /volumes/detail
2730 scope_types: null
2731 - check_str: rule:xena_system_admin_or_project_reader
2732- deprecated_reason: null
2733 deprecated_rule:
2734 check_str: rule:admin_or_owner
2735+ deprecated_reason: Default policies now support the three Keystone default roles,
2736+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2737+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2738+ (Xena release) for details.
2739+ deprecated_since: X
2740 name: volume_extension:volume_encryption_metadata
2741- deprecated_since: null
2742 description: Show volume's encryption metadata.
2743 name: volume_extension:volume_encryption_metadata
2744 operations:
2745@@ -1722,11 +1984,14 @@
2746 path: /volumes/{volume_id}/encryption/{encryption_key}
2747 scope_types: null
2748 - check_str: rule:xena_system_admin_or_project_member
2749- deprecated_reason: null
2750 deprecated_rule:
2751 check_str: rule:admin_or_owner
2752+ deprecated_reason: Default policies now support the three Keystone default roles,
2753+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2754+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2755+ (Xena release) for details.
2756+ deprecated_since: X
2757 name: volume:multiattach
2758- deprecated_since: null
2759 description: Create multiattach capable volume.
2760 name: volume:multiattach
2761 operations:
2762@@ -1734,11 +1999,14 @@
2763 path: /volumes
2764 scope_types: null
2765 - check_str: rule:admin_api
2766- deprecated_reason: null
2767 deprecated_rule:
2768 check_str: rule:system_or_domain_or_project_admin
2769+ deprecated_reason: Default policies now support the three Keystone default roles,
2770+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2771+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2772+ (Xena release) for details.
2773+ deprecated_since: X
2774 name: volume_extension:default_set_or_update
2775- deprecated_since: null
2776 description: Set or update default volume type.
2777 name: volume_extension:default_set_or_update
2778 operations:
2779@@ -1746,11 +2014,14 @@
2780 path: /default-types
2781 scope_types: null
2782 - check_str: rule:admin_api
2783- deprecated_reason: null
2784 deprecated_rule:
2785 check_str: rule:system_or_domain_or_project_admin
2786+ deprecated_reason: Default policies now support the three Keystone default roles,
2787+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2788+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2789+ (Xena release) for details.
2790+ deprecated_since: X
2791 name: volume_extension:default_get
2792- deprecated_since: null
2793 description: Get default types.
2794 name: volume_extension:default_get
2795 operations:
2796@@ -1758,11 +2029,14 @@
2797 path: /default-types/{project-id}
2798 scope_types: null
2799 - check_str: rule:admin_api
2800- deprecated_reason: null
2801 deprecated_rule:
2802 check_str: role:admin and system_scope:all
2803+ deprecated_reason: Default policies now support the three Keystone default roles,
2804+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2805+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2806+ (Xena release) for details.
2807+ deprecated_since: X
2808 name: volume_extension:default_get_all
2809- deprecated_since: null
2810 description: 'Get all default types. WARNING: Changing this might open up too much
2811 information regarding cloud deployment.'
2812 name: volume_extension:default_get_all
2813@@ -1771,11 +2045,14 @@
2814 path: /default-types/
2815 scope_types: null
2816 - check_str: rule:admin_api
2817- deprecated_reason: null
2818 deprecated_rule:
2819 check_str: rule:system_or_domain_or_project_admin
2820+ deprecated_reason: Default policies now support the three Keystone default roles,
2821+ namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See
2822+ "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation
2823+ (Xena release) for details.
2824+ deprecated_since: X
2825 name: volume_extension:default_unset
2826- deprecated_since: null
2827 description: Unset default type.
2828 name: volume_extension:default_unset
2829 operations:
2830diff --git a/openstack_dashboard/conf/default_policies/glance.yaml b/openstack_dashboard/conf/default_policies/glance.yaml
2831index c3fcd62..a5ab80e 100644
2832--- a/openstack_dashboard/conf/default_policies/glance.yaml
2833+++ b/openstack_dashboard/conf/default_policies/glance.yaml
2834@@ -1,9 +1,13 @@
2835 - check_str: ''
2836- deprecated_reason: null
2837 deprecated_rule:
2838 check_str: rule:context_is_admin
2839+ deprecated_reason: In order to allow operators to accept the default policies
2840+ from code by not defining them in the policy file, while still working with
2841+ old policy files that rely on the ``default`` rule for policies that are not
2842+ specified in the policy file, the ``default`` rule must now be explicitly set
2843+ to ``"role:admin"`` when that is the desired default for unspecified rules.
2844+ deprecated_since: Ussuri
2845 name: default
2846- deprecated_since: null
2847 description: Defines the default rule used for policies that historically had an
2848 empty policy in the supplied policy.json file.
2849 name: default
2850@@ -16,11 +20,15 @@
2851 scope_types: null
2852 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s and
2853 project_id:%(owner)s)
2854- deprecated_reason: null
2855 deprecated_rule:
2856 check_str: rule:default
2857+ deprecated_reason: '
2858+
2859+ The image API now supports roles.
2860+
2861+ '
2862+ deprecated_since: W
2863 name: add_image
2864- deprecated_since: null
2865 description: Create new image
2866 name: add_image
2867 operations:
2868@@ -29,11 +37,15 @@
2869 scope_types:
2870 - project
2871 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
2872- deprecated_reason: null
2873 deprecated_rule:
2874 check_str: rule:default
2875+ deprecated_reason: '
2876+
2877+ The image API now supports roles.
2878+
2879+ '
2880+ deprecated_since: W
2881 name: delete_image
2882- deprecated_since: null
2883 description: Deletes the image
2884 name: delete_image
2885 operations:
2886@@ -44,11 +56,15 @@
2887 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
2888 or project_id:%(member_id)s or 'community':%(visibility)s or 'public':%(visibility)s
2889 or 'shared':%(visibility)s))
2890- deprecated_reason: null
2891 deprecated_rule:
2892 check_str: rule:default
2893+ deprecated_reason: '
2894+
2895+ The image API now supports roles.
2896+
2897+ '
2898+ deprecated_since: W
2899 name: get_image
2900- deprecated_since: null
2901 description: Get specified image
2902 name: get_image
2903 operations:
2904@@ -57,11 +73,15 @@
2905 scope_types:
2906 - project
2907 - check_str: rule:context_is_admin or (role:reader and project_id:%(project_id)s)
2908- deprecated_reason: null
2909 deprecated_rule:
2910 check_str: rule:default
2911+ deprecated_reason: '
2912+
2913+ The image API now supports roles.
2914+
2915+ '
2916+ deprecated_since: W
2917 name: get_images
2918- deprecated_since: null
2919 description: Get all available images
2920 name: get_images
2921 operations:
2922@@ -70,11 +90,15 @@
2923 scope_types:
2924 - project
2925 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
2926- deprecated_reason: null
2927 deprecated_rule:
2928 check_str: rule:default
2929+ deprecated_reason: '
2930+
2931+ The image API now supports roles.
2932+
2933+ '
2934+ deprecated_since: W
2935 name: modify_image
2936- deprecated_since: null
2937 description: Updates given image
2938 name: modify_image
2939 operations:
2940@@ -91,11 +115,15 @@
2941 scope_types:
2942 - project
2943 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
2944- deprecated_reason: null
2945 deprecated_rule:
2946 check_str: rule:default
2947+ deprecated_reason: '
2948+
2949+ The image API now supports roles.
2950+
2951+ '
2952+ deprecated_since: W
2953 name: communitize_image
2954- deprecated_since: null
2955 description: Communitize given image
2956 name: communitize_image
2957 operations:
2958@@ -106,11 +134,15 @@
2959 - check_str: rule:context_is_admin or (role:member and (project_id:%(project_id)s
2960 or project_id:%(member_id)s or 'community':%(visibility)s or 'public':%(visibility)s
2961 or 'shared':%(visibility)s))
2962- deprecated_reason: null
2963 deprecated_rule:
2964 check_str: rule:default
2965+ deprecated_reason: '
2966+
2967+ The image API now supports roles.
2968+
2969+ '
2970+ deprecated_since: W
2971 name: download_image
2972- deprecated_since: null
2973 description: Downloads given image
2974 name: download_image
2975 operations:
2976@@ -119,11 +151,15 @@
2977 scope_types:
2978 - project
2979 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
2980- deprecated_reason: null
2981 deprecated_rule:
2982 check_str: rule:default
2983+ deprecated_reason: '
2984+
2985+ The image API now supports roles.
2986+
2987+ '
2988+ deprecated_since: W
2989 name: upload_image
2990- deprecated_since: null
2991 description: Uploads data to specified image
2992 name: upload_image
2993 operations:
2994@@ -132,11 +168,15 @@
2995 scope_types:
2996 - project
2997 - check_str: rule:context_is_admin
2998- deprecated_reason: null
2999 deprecated_rule:
3000 check_str: rule:default
3001+ deprecated_reason: '
3002+
3003+ The image API now supports roles.
3004+
3005+ '
3006+ deprecated_since: W
3007 name: delete_image_location
3008- deprecated_since: null
3009 description: Deletes the location of given image
3010 name: delete_image_location
3011 operations:
3012@@ -145,11 +185,15 @@
3013 scope_types:
3014 - project
3015 - check_str: rule:context_is_admin or (role:reader and project_id:%(project_id)s)
3016- deprecated_reason: null
3017 deprecated_rule:
3018 check_str: rule:default
3019+ deprecated_reason: '
3020+
3021+ The image API now supports roles.
3022+
3023+ '
3024+ deprecated_since: W
3025 name: get_image_location
3026- deprecated_since: null
3027 description: Reads the location of the image
3028 name: get_image_location
3029 operations:
3030@@ -158,11 +202,15 @@
3031 scope_types:
3032 - project
3033 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
3034- deprecated_reason: null
3035 deprecated_rule:
3036 check_str: rule:default
3037+ deprecated_reason: '
3038+
3039+ The image API now supports roles.
3040+
3041+ '
3042+ deprecated_since: W
3043 name: set_image_location
3044- deprecated_since: null
3045 description: Sets location URI to given image
3046 name: set_image_location
3047 operations:
3048@@ -171,11 +219,15 @@
3049 scope_types:
3050 - project
3051 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
3052- deprecated_reason: null
3053 deprecated_rule:
3054 check_str: rule:default
3055+ deprecated_reason: '
3056+
3057+ The image API now supports roles.
3058+
3059+ '
3060+ deprecated_since: W
3061 name: add_member
3062- deprecated_since: null
3063 description: Create image member
3064 name: add_member
3065 operations:
3066@@ -184,11 +236,15 @@
3067 scope_types:
3068 - project
3069 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
3070- deprecated_reason: null
3071 deprecated_rule:
3072 check_str: rule:default
3073+ deprecated_reason: '
3074+
3075+ The image API now supports roles.
3076+
3077+ '
3078+ deprecated_since: W
3079 name: delete_member
3080- deprecated_since: null
3081 description: Delete image member
3082 name: delete_member
3083 operations:
3084@@ -198,11 +254,15 @@
3085 - project
3086 - check_str: rule:context_is_admin or role:reader and (project_id:%(project_id)s or
3087 project_id:%(member_id)s)
3088- deprecated_reason: null
3089 deprecated_rule:
3090 check_str: rule:default
3091+ deprecated_reason: '
3092+
3093+ The image API now supports roles.
3094+
3095+ '
3096+ deprecated_since: W
3097 name: get_member
3098- deprecated_since: null
3099 description: Show image member details
3100 name: get_member
3101 operations:
3102@@ -212,11 +272,15 @@
3103 - project
3104 - check_str: rule:context_is_admin or role:reader and (project_id:%(project_id)s or
3105 project_id:%(member_id)s)
3106- deprecated_reason: null
3107 deprecated_rule:
3108 check_str: rule:default
3109+ deprecated_reason: '
3110+
3111+ The image API now supports roles.
3112+
3113+ '
3114+ deprecated_since: W
3115 name: get_members
3116- deprecated_since: null
3117 description: List image members
3118 name: get_members
3119 operations:
3120@@ -225,11 +289,15 @@
3121 scope_types:
3122 - project
3123 - check_str: rule:context_is_admin or (role:member and project_id:%(member_id)s)
3124- deprecated_reason: null
3125 deprecated_rule:
3126 check_str: rule:default
3127+ deprecated_reason: '
3128+
3129+ The image API now supports roles.
3130+
3131+ '
3132+ deprecated_since: W
3133 name: modify_member
3134- deprecated_since: null
3135 description: Update image member
3136 name: modify_member
3137 operations:
3138@@ -244,11 +312,15 @@
3139 scope_types:
3140 - project
3141 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
3142- deprecated_reason: null
3143 deprecated_rule:
3144 check_str: rule:default
3145+ deprecated_reason: '
3146+
3147+ The image API now supports roles.
3148+
3149+ '
3150+ deprecated_since: W
3151 name: deactivate
3152- deprecated_since: null
3153 description: Deactivate image
3154 name: deactivate
3155 operations:
3156@@ -257,11 +329,15 @@
3157 scope_types:
3158 - project
3159 - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s)
3160- deprecated_reason: null
3161 deprecated_rule:
3162 check_str: rule:default
3163+ deprecated_reason: '
3164+
3165+ The image API now supports roles.
3166+
3167+ '
3168+ deprecated_since: W
3169 name: reactivate
3170- deprecated_since: null
3171 description: Reactivate image
3172 name: reactivate
3173 operations:
3174@@ -278,11 +354,21 @@
3175 scope_types:
3176 - project
3177 - check_str: rule:default
3178- deprecated_reason: null
3179 deprecated_rule:
3180 check_str: rule:default
3181+ deprecated_reason: '
3182+
3183+ From Xena we are enforcing policy checks in the API and policy layer where
3184+
3185+ task policies were enforcing will be removed. Since task APIs are already
3186+
3187+ deprecated and `tasks_api_access` is checked for each API at API layer,
3188+
3189+ there will be no benefit of other having other task related policies.
3190+
3191+ '
3192+ deprecated_since: X
3193 name: get_task
3194- deprecated_since: null
3195 description: 'Get an image task.
3196
3197
3198@@ -306,11 +392,21 @@
3199 scope_types:
3200 - project
3201 - check_str: rule:default
3202- deprecated_reason: null
3203 deprecated_rule:
3204 check_str: rule:default
3205+ deprecated_reason: '
3206+
3207+ From Xena we are enforcing policy checks in the API and policy layer where
3208+
3209+ task policies were enforcing will be removed. Since task APIs are already
3210+
3211+ deprecated and `tasks_api_access` is checked for each API at API layer,
3212+
3213+ there will be no benefit of other having other task related policies.
3214+
3215+ '
3216+ deprecated_since: X
3217 name: get_tasks
3218- deprecated_since: null
3219 description: 'List tasks for all images.
3220
3221
3222@@ -334,11 +430,21 @@
3223 scope_types:
3224 - project
3225 - check_str: rule:default
3226- deprecated_reason: null
3227 deprecated_rule:
3228 check_str: rule:default
3229+ deprecated_reason: '
3230+
3231+ From Xena we are enforcing policy checks in the API and policy layer where
3232+
3233+ task policies were enforcing will be removed. Since task APIs are already
3234+
3235+ deprecated and `tasks_api_access` is checked for each API at API layer,
3236+
3237+ there will be no benefit of other having other task related policies.
3238+
3239+ '
3240+ deprecated_since: X
3241 name: add_task
3242- deprecated_since: null
3243 description: 'List tasks for all images.
3244
3245
3246@@ -412,11 +518,15 @@
3247 scope_types: null
3248 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3249 or 'public':%(visibility)s))
3250- deprecated_reason: null
3251 deprecated_rule:
3252 check_str: rule:metadef_default
3253+ deprecated_reason: '
3254+
3255+ The metadata API now supports project scope and default roles.
3256+
3257+ '
3258+ deprecated_since: X
3259 name: get_metadef_namespace
3260- deprecated_since: null
3261 description: Get a specific namespace.
3262 name: get_metadef_namespace
3263 operations:
3264@@ -425,11 +535,15 @@
3265 scope_types:
3266 - project
3267 - check_str: rule:context_is_admin or (role:reader and project_id:%(project_id)s)
3268- deprecated_reason: null
3269 deprecated_rule:
3270 check_str: rule:metadef_default
3271+ deprecated_reason: '
3272+
3273+ The metadata API now supports project scope and default roles.
3274+
3275+ '
3276+ deprecated_since: X
3277 name: get_metadef_namespaces
3278- deprecated_since: null
3279 description: List namespace.
3280 name: get_metadef_namespaces
3281 operations:
3282@@ -463,11 +577,15 @@
3283 - project
3284 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3285 or 'public':%(visibility)s))
3286- deprecated_reason: null
3287 deprecated_rule:
3288 check_str: rule:metadef_default
3289+ deprecated_reason: '
3290+
3291+ The metadata API now supports project scope and default roles.
3292+
3293+ '
3294+ deprecated_since: X
3295 name: get_metadef_object
3296- deprecated_since: null
3297 description: Get a specific object from a namespace.
3298 name: get_metadef_object
3299 operations:
3300@@ -477,11 +595,15 @@
3301 - project
3302 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3303 or 'public':%(visibility)s))
3304- deprecated_reason: null
3305 deprecated_rule:
3306 check_str: rule:metadef_default
3307+ deprecated_reason: '
3308+
3309+ The metadata API now supports project scope and default roles.
3310+
3311+ '
3312+ deprecated_since: X
3313 name: get_metadef_objects
3314- deprecated_since: null
3315 description: Get objects from a namespace.
3316 name: get_metadef_objects
3317 operations:
3318@@ -515,11 +637,15 @@
3319 - project
3320 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3321 or 'public':%(visibility)s))
3322- deprecated_reason: null
3323 deprecated_rule:
3324 check_str: rule:metadef_default
3325+ deprecated_reason: '
3326+
3327+ The metadata API now supports project scope and default roles.
3328+
3329+ '
3330+ deprecated_since: X
3331 name: list_metadef_resource_types
3332- deprecated_since: null
3333 description: List meta definition resource types.
3334 name: list_metadef_resource_types
3335 operations:
3336@@ -529,11 +655,15 @@
3337 - project
3338 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3339 or 'public':%(visibility)s))
3340- deprecated_reason: null
3341 deprecated_rule:
3342 check_str: rule:metadef_default
3343+ deprecated_reason: '
3344+
3345+ The metadata API now supports project scope and default roles.
3346+
3347+ '
3348+ deprecated_since: X
3349 name: get_metadef_resource_type
3350- deprecated_since: null
3351 description: Get meta definition resource types associations.
3352 name: get_metadef_resource_type
3353 operations:
3354@@ -559,11 +689,15 @@
3355 - project
3356 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3357 or 'public':%(visibility)s))
3358- deprecated_reason: null
3359 deprecated_rule:
3360 check_str: rule:metadef_default
3361+ deprecated_reason: '
3362+
3363+ The metadata API now supports project scope and default roles.
3364+
3365+ '
3366+ deprecated_since: X
3367 name: get_metadef_property
3368- deprecated_since: null
3369 description: Get a specific meta definition property.
3370 name: get_metadef_property
3371 operations:
3372@@ -573,11 +707,15 @@
3373 - project
3374 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3375 or 'public':%(visibility)s))
3376- deprecated_reason: null
3377 deprecated_rule:
3378 check_str: rule:metadef_default
3379+ deprecated_reason: '
3380+
3381+ The metadata API now supports project scope and default roles.
3382+
3383+ '
3384+ deprecated_since: X
3385 name: get_metadef_properties
3386- deprecated_since: null
3387 description: List meta definition properties.
3388 name: get_metadef_properties
3389 operations:
3390@@ -611,11 +749,15 @@
3391 - project
3392 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3393 or 'public':%(visibility)s))
3394- deprecated_reason: null
3395 deprecated_rule:
3396 check_str: rule:metadef_default
3397+ deprecated_reason: '
3398+
3399+ The metadata API now supports project scope and default roles.
3400+
3401+ '
3402+ deprecated_since: X
3403 name: get_metadef_tag
3404- deprecated_since: null
3405 description: Get tag definition.
3406 name: get_metadef_tag
3407 operations:
3408@@ -625,11 +767,15 @@
3409 - project
3410 - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s
3411 or 'public':%(visibility)s))
3412- deprecated_reason: null
3413 deprecated_rule:
3414 check_str: rule:metadef_default
3415+ deprecated_reason: '
3416+
3417+ The metadata API now supports project scope and default roles.
3418+
3419+ '
3420+ deprecated_since: X
3421 name: get_metadef_tags
3422- deprecated_since: null
3423 description: List tag definitions.
3424 name: get_metadef_tags
3425 operations:
3426@@ -678,11 +824,15 @@
3427 scope_types:
3428 - project
3429 - check_str: rule:context_is_admin
3430- deprecated_reason: null
3431 deprecated_rule:
3432 check_str: rule:manage_image_cache
3433+ deprecated_reason: '
3434+
3435+ The image API now supports roles.
3436+
3437+ '
3438+ deprecated_since: X
3439 name: cache_image
3440- deprecated_since: null
3441 description: Queue image for caching
3442 name: cache_image
3443 operations:
3444@@ -691,11 +841,15 @@
3445 scope_types:
3446 - project
3447 - check_str: rule:context_is_admin
3448- deprecated_reason: null
3449 deprecated_rule:
3450 check_str: rule:manage_image_cache
3451+ deprecated_reason: '
3452+
3453+ The image API now supports roles.
3454+
3455+ '
3456+ deprecated_since: X
3457 name: cache_list
3458- deprecated_since: null
3459 description: List cache status
3460 name: cache_list
3461 operations:
3462@@ -704,11 +858,15 @@
3463 scope_types:
3464 - project
3465 - check_str: rule:context_is_admin
3466- deprecated_reason: null
3467 deprecated_rule:
3468 check_str: rule:manage_image_cache
3469+ deprecated_reason: '
3470+
3471+ The image API now supports roles.
3472+
3473+ '
3474+ deprecated_since: X
3475 name: cache_delete
3476- deprecated_since: null
3477 description: Delete image(s) from cache and/or queue
3478 name: cache_delete
3479 operations:
3480diff --git a/openstack_dashboard/conf/default_policies/keystone.yaml b/openstack_dashboard/conf/default_policies/keystone.yaml
3481index aa3a3af..d2f1965 100644
3482--- a/openstack_dashboard/conf/default_policies/keystone.yaml
3483+++ b/openstack_dashboard/conf/default_policies/keystone.yaml
3484@@ -118,11 +118,12 @@
3485 scope_types:
3486 - project
3487 - check_str: (role:reader and system_scope:all) or rule:owner
3488- deprecated_reason: null
3489 deprecated_rule:
3490 check_str: rule:admin_or_owner
3491+ deprecated_reason: The application credential API is now aware of system scope
3492+ and default roles.
3493+ deprecated_since: T
3494 name: identity:get_application_credential
3495- deprecated_since: null
3496 description: Show application credential details.
3497 name: identity:get_application_credential
3498 operations:
3499@@ -134,11 +135,12 @@
3500 - system
3501 - project
3502 - check_str: (role:reader and system_scope:all) or rule:owner
3503- deprecated_reason: null
3504 deprecated_rule:
3505 check_str: rule:admin_or_owner
3506+ deprecated_reason: The application credential API is now aware of system scope
3507+ and default roles.
3508+ deprecated_since: T
3509 name: identity:list_application_credentials
3510- deprecated_since: null
3511 description: List application credentials for a user.
3512 name: identity:list_application_credentials
3513 operations:
3514@@ -158,11 +160,12 @@
3515 scope_types:
3516 - project
3517 - check_str: (role:admin and system_scope:all) or rule:owner
3518- deprecated_reason: null
3519 deprecated_rule:
3520 check_str: rule:admin_or_owner
3521+ deprecated_reason: The application credential API is now aware of system scope
3522+ and default roles.
3523+ deprecated_since: T
3524 name: identity:delete_application_credential
3525- deprecated_since: null
3526 description: Delete an application credential.
3527 name: identity:delete_application_credential
3528 operations:
3529@@ -208,11 +211,12 @@
3530 path: /v3/auth/system
3531 scope_types: null
3532 - check_str: rule:admin_required or (role:reader and system_scope:all)
3533- deprecated_reason: null
3534 deprecated_rule:
3535 check_str: rule:admin_required
3536+ deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default
3537+ roles.
3538+ deprecated_since: T
3539 name: identity:get_consumer
3540- deprecated_since: null
3541 description: Show OAUTH1 consumer details.
3542 name: identity:get_consumer
3543 operations:
3544@@ -222,11 +226,12 @@
3545 - system
3546 - project
3547 - check_str: rule:admin_required or (role:reader and system_scope:all)
3548- deprecated_reason: null
3549 deprecated_rule:
3550 check_str: rule:admin_required
3551+ deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default
3552+ roles.
3553+ deprecated_since: T
3554 name: identity:list_consumers
3555- deprecated_since: null
3556 description: List OAUTH1 consumers.
3557 name: identity:list_consumers
3558 operations:
3559@@ -236,11 +241,12 @@
3560 - system
3561 - project
3562 - check_str: rule:admin_required
3563- deprecated_reason: null
3564 deprecated_rule:
3565 check_str: rule:admin_required
3566+ deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default
3567+ roles.
3568+ deprecated_since: T
3569 name: identity:create_consumer
3570- deprecated_since: null
3571 description: Create OAUTH1 consumer.
3572 name: identity:create_consumer
3573 operations:
3574@@ -250,11 +256,12 @@
3575 - system
3576 - project
3577 - check_str: rule:admin_required
3578- deprecated_reason: null
3579 deprecated_rule:
3580 check_str: rule:admin_required
3581+ deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default
3582+ roles.
3583+ deprecated_since: T
3584 name: identity:update_consumer
3585- deprecated_since: null
3586 description: Update OAUTH1 consumer.
3587 name: identity:update_consumer
3588 operations:
3589@@ -264,11 +271,12 @@
3590 - system
3591 - project
3592 - check_str: rule:admin_required
3593- deprecated_reason: null
3594 deprecated_rule:
3595 check_str: rule:admin_required
3596+ deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default
3597+ roles.
3598+ deprecated_since: T
3599 name: identity:delete_consumer
3600- deprecated_since: null
3601 description: Delete OAUTH1 consumer.
3602 name: identity:delete_consumer
3603 operations:
3604@@ -278,11 +286,12 @@
3605 - system
3606 - project
3607 - check_str: (role:reader and system_scope:all) or user_id:%(target.credential.user_id)s
3608- deprecated_reason: null
3609 deprecated_rule:
3610 check_str: rule:admin_required
3611+ deprecated_reason: The credential API is now aware of system scope and default
3612+ roles.
3613+ deprecated_since: S
3614 name: identity:get_credential
3615- deprecated_since: null
3616 description: Show credentials details.
3617 name: identity:get_credential
3618 operations:
3619@@ -292,11 +301,12 @@
3620 - system
3621 - project
3622 - check_str: (role:reader and system_scope:all) or user_id:%(target.credential.user_id)s
3623- deprecated_reason: null
3624 deprecated_rule:
3625 check_str: rule:admin_required
3626+ deprecated_reason: The credential API is now aware of system scope and default
3627+ roles.
3628+ deprecated_since: S
3629 name: identity:list_credentials
3630- deprecated_since: null
3631 description: List credentials.
3632 name: identity:list_credentials
3633 operations:
3634@@ -306,11 +316,12 @@
3635 - system
3636 - project
3637 - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s
3638- deprecated_reason: null
3639 deprecated_rule:
3640 check_str: rule:admin_required
3641+ deprecated_reason: The credential API is now aware of system scope and default
3642+ roles.
3643+ deprecated_since: S
3644 name: identity:create_credential
3645- deprecated_since: null
3646 description: Create credential.
3647 name: identity:create_credential
3648 operations:
3649@@ -320,11 +331,12 @@
3650 - system
3651 - project
3652 - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s
3653- deprecated_reason: null
3654 deprecated_rule:
3655 check_str: rule:admin_required
3656+ deprecated_reason: The credential API is now aware of system scope and default
3657+ roles.
3658+ deprecated_since: S
3659 name: identity:update_credential
3660- deprecated_since: null
3661 description: Update credential.
3662 name: identity:update_credential
3663 operations:
3664@@ -334,11 +346,12 @@
3665 - system
3666 - project
3667 - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s
3668- deprecated_reason: null
3669 deprecated_rule:
3670 check_str: rule:admin_required
3671+ deprecated_reason: The credential API is now aware of system scope and default
3672+ roles.
3673+ deprecated_since: S
3674 name: identity:delete_credential
3675- deprecated_since: null
3676 description: Delete credential.
3677 name: identity:delete_credential
3678 operations:
3679@@ -349,11 +362,11 @@
3680 - project
3681 - check_str: rule:admin_required or (role:reader and system_scope:all) or token.domain.id:%(target.domain.id)s
3682 or token.project.domain.id:%(target.domain.id)s
3683- deprecated_reason: null
3684 deprecated_rule:
3685 check_str: rule:admin_required or token.project.domain.id:%(target.domain.id)s
3686+ deprecated_reason: The domain API is now aware of system scope and default roles.
3687+ deprecated_since: S
3688 name: identity:get_domain
3689- deprecated_since: null
3690 description: Show domain details.
3691 name: identity:get_domain
3692 operations:
3693@@ -365,11 +378,11 @@
3694 - project
3695 - check_str: rule:admin_required or (role:reader and system_scope:all) or (role:reader
3696 and domain_id:%(target.domain.id)s)
3697- deprecated_reason: null
3698 deprecated_rule:
3699 check_str: rule:admin_required
3700+ deprecated_reason: The domain API is now aware of system scope and default roles.
3701+ deprecated_since: S
3702 name: identity:list_domains
3703- deprecated_since: null
3704 description: List domains.
3705 name: identity:list_domains
3706 operations:
3707@@ -380,11 +393,11 @@
3708 - domain
3709 - project
3710 - check_str: rule:admin_required
3711- deprecated_reason: null
3712 deprecated_rule:
3713 check_str: rule:admin_required
3714+ deprecated_reason: The domain API is now aware of system scope and default roles.
3715+ deprecated_since: S
3716 name: identity:create_domain
3717- deprecated_since: null
3718 description: Create domain.
3719 name: identity:create_domain
3720 operations:
3721@@ -394,11 +407,11 @@
3722 - system
3723 - project
3724 - check_str: rule:admin_required
3725- deprecated_reason: null
3726 deprecated_rule:
3727 check_str: rule:admin_required
3728+ deprecated_reason: The domain API is now aware of system scope and default roles.
3729+ deprecated_since: S
3730 name: identity:update_domain
3731- deprecated_since: null
3732 description: Update domain.
3733 name: identity:update_domain
3734 operations:
3735@@ -408,11 +421,11 @@
3736 - system
3737 - project
3738 - check_str: rule:admin_required
3739- deprecated_reason: null
3740 deprecated_rule:
3741 check_str: rule:admin_required
3742+ deprecated_reason: The domain API is now aware of system scope and default roles.
3743+ deprecated_since: S
3744 name: identity:delete_domain
3745- deprecated_since: null
3746 description: Delete domain.
3747 name: identity:delete_domain
3748 operations:
3749@@ -422,11 +435,12 @@
3750 - system
3751 - project
3752 - check_str: rule:admin_required
3753- deprecated_reason: null
3754 deprecated_rule:
3755 check_str: rule:admin_required
3756+ deprecated_reason: The domain config API is now aware of system scope and default
3757+ roles.
3758+ deprecated_since: T
3759 name: identity:create_domain_config
3760- deprecated_since: null
3761 description: Create domain configuration.
3762 name: identity:create_domain_config
3763 operations:
3764@@ -436,11 +450,12 @@
3765 - system
3766 - project
3767 - check_str: rule:admin_required or (role:reader and system_scope:all)
3768- deprecated_reason: null
3769 deprecated_rule:
3770 check_str: rule:admin_required
3771+ deprecated_reason: The domain config API is now aware of system scope and default
3772+ roles.
3773+ deprecated_since: T
3774 name: identity:get_domain_config
3775- deprecated_since: null
3776 description: Get the entire domain configuration for a domain, an option group within
3777 a domain, or a specific configuration option within a group for a domain.
3778 name: identity:get_domain_config
3779@@ -478,11 +493,12 @@
3780 - domain
3781 - project
3782 - check_str: rule:admin_required
3783- deprecated_reason: null
3784 deprecated_rule:
3785 check_str: rule:admin_required
3786+ deprecated_reason: The domain config API is now aware of system scope and default
3787+ roles.
3788+ deprecated_since: T
3789 name: identity:update_domain_config
3790- deprecated_since: null
3791 description: Update domain configuration for either a domain, specific group or
3792 a specific option in a group.
3793 name: identity:update_domain_config
3794@@ -497,11 +513,12 @@
3795 - system
3796 - project
3797 - check_str: rule:admin_required
3798- deprecated_reason: null
3799 deprecated_rule:
3800 check_str: rule:admin_required
3801+ deprecated_reason: The domain config API is now aware of system scope and default
3802+ roles.
3803+ deprecated_since: T
3804 name: identity:delete_domain_config
3805- deprecated_since: null
3806 description: Delete domain configuration for either a domain, specific group or
3807 a specific option in a group.
3808 name: identity:delete_domain_config
3809@@ -516,11 +533,12 @@
3810 - system
3811 - project
3812 - check_str: rule:admin_required or (role:reader and system_scope:all)
3813- deprecated_reason: null
3814 deprecated_rule:
3815 check_str: rule:admin_required
3816+ deprecated_reason: The domain config API is now aware of system scope and default
3817+ roles.
3818+ deprecated_since: T
3819 name: identity:get_domain_config_default
3820- deprecated_since: null
3821 description: Get domain configuration default for either a domain, specific group
3822 or a specific option in a group.
3823 name: identity:get_domain_config_default
3824@@ -541,11 +559,12 @@
3825 - system
3826 - project
3827 - check_str: (role:reader and system_scope:all) or user_id:%(target.credential.user_id)s
3828- deprecated_reason: null
3829 deprecated_rule:
3830 check_str: rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s)
3831+ deprecated_reason: The EC2 credential API is now aware of system scope and default
3832+ roles.
3833+ deprecated_since: T
3834 name: identity:ec2_get_credential
3835- deprecated_since: null
3836 description: Show ec2 credential details.
3837 name: identity:ec2_get_credential
3838 operations:
3839@@ -555,11 +574,12 @@
3840 - system
3841 - project
3842 - check_str: (role:reader and system_scope:all) or rule:owner
3843- deprecated_reason: null
3844 deprecated_rule:
3845 check_str: rule:admin_or_owner
3846+ deprecated_reason: The EC2 credential API is now aware of system scope and default
3847+ roles.
3848+ deprecated_since: T
3849 name: identity:ec2_list_credentials
3850- deprecated_since: null
3851 description: List ec2 credentials.
3852 name: identity:ec2_list_credentials
3853 operations:
3854@@ -569,11 +589,12 @@
3855 - system
3856 - project
3857 - check_str: (role:admin and system_scope:all) or rule:owner
3858- deprecated_reason: null
3859 deprecated_rule:
3860 check_str: rule:admin_or_owner
3861+ deprecated_reason: The EC2 credential API is now aware of system scope and default
3862+ roles.
3863+ deprecated_since: T
3864 name: identity:ec2_create_credential
3865- deprecated_since: null
3866 description: Create ec2 credential.
3867 name: identity:ec2_create_credential
3868 operations:
3869@@ -583,11 +604,12 @@
3870 - system
3871 - project
3872 - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s
3873- deprecated_reason: null
3874 deprecated_rule:
3875 check_str: rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s)
3876+ deprecated_reason: The EC2 credential API is now aware of system scope and default
3877+ roles.
3878+ deprecated_since: T
3879 name: identity:ec2_delete_credential
3880- deprecated_since: null
3881 description: Delete ec2 credential.
3882 name: identity:ec2_delete_credential
3883 operations:
3884@@ -597,11 +619,11 @@
3885 - system
3886 - project
3887 - check_str: rule:admin_required or (role:reader and system_scope:all)
3888- deprecated_reason: null
3889 deprecated_rule:
3890 check_str: rule:admin_required
3891+ deprecated_reason: The endpoint API is now aware of system scope and default roles.
3892+ deprecated_since: S
3893 name: identity:get_endpoint
3894- deprecated_since: null
3895 description: Show endpoint details.
3896 name: identity:get_endpoint
3897 operations:
3898@@ -611,11 +633,11 @@
3899 - system
3900 - project
3901 - check_str: rule:admin_required or (role:reader and system_scope:all)
3902- deprecated_reason: null
3903 deprecated_rule:
3904 check_str: rule:admin_required
3905+ deprecated_reason: The endpoint API is now aware of system scope and default roles.
3906+ deprecated_since: S
3907 name: identity:list_endpoints
3908- deprecated_since: null
3909 description: List endpoints.
3910 name: identity:list_endpoints
3911 operations:
3912@@ -625,11 +647,11 @@
3913 - system
3914 - project
3915 - check_str: rule:admin_required
3916- deprecated_reason: null
3917 deprecated_rule:
3918 check_str: rule:admin_required
3919+ deprecated_reason: The endpoint API is now aware of system scope and default roles.
3920+ deprecated_since: S
3921 name: identity:create_endpoint
3922- deprecated_since: null
3923 description: Create endpoint.
3924 name: identity:create_endpoint
3925 operations:
3926@@ -639,11 +661,11 @@
3927 - system
3928 - project
3929 - check_str: rule:admin_required
3930- deprecated_reason: null
3931 deprecated_rule:
3932 check_str: rule:admin_required
3933+ deprecated_reason: The endpoint API is now aware of system scope and default roles.
3934+ deprecated_since: S
3935 name: identity:update_endpoint
3936- deprecated_since: null
3937 description: Update endpoint.
3938 name: identity:update_endpoint
3939 operations:
3940@@ -653,11 +675,11 @@
3941 - system
3942 - project
3943 - check_str: rule:admin_required
3944- deprecated_reason: null
3945 deprecated_rule:
3946 check_str: rule:admin_required
3947+ deprecated_reason: The endpoint API is now aware of system scope and default roles.
3948+ deprecated_since: S
3949 name: identity:delete_endpoint
3950- deprecated_since: null
3951 description: Delete endpoint.
3952 name: identity:delete_endpoint
3953 operations:
3954@@ -667,11 +689,12 @@
3955 - system
3956 - project
3957 - check_str: rule:admin_required
3958- deprecated_reason: null
3959 deprecated_rule:
3960 check_str: rule:admin_required
3961+ deprecated_reason: The endpoint groups API is now aware of system scope and default
3962+ roles.
3963+ deprecated_since: T
3964 name: identity:create_endpoint_group
3965- deprecated_since: null
3966 description: Create endpoint group.
3967 name: identity:create_endpoint_group
3968 operations:
3969@@ -681,11 +704,12 @@
3970 - system
3971 - project
3972 - check_str: rule:admin_required or (role:reader and system_scope:all)
3973- deprecated_reason: null
3974 deprecated_rule:
3975 check_str: rule:admin_required
3976+ deprecated_reason: The endpoint groups API is now aware of system scope and default
3977+ roles.
3978+ deprecated_since: T
3979 name: identity:list_endpoint_groups
3980- deprecated_since: null
3981 description: List endpoint groups.
3982 name: identity:list_endpoint_groups
3983 operations:
3984@@ -695,11 +719,12 @@
3985 - system
3986 - project
3987 - check_str: rule:admin_required or (role:reader and system_scope:all)
3988- deprecated_reason: null
3989 deprecated_rule:
3990 check_str: rule:admin_required
3991+ deprecated_reason: The endpoint groups API is now aware of system scope and default
3992+ roles.
3993+ deprecated_since: T
3994 name: identity:get_endpoint_group
3995- deprecated_since: null
3996 description: Get endpoint group.
3997 name: identity:get_endpoint_group
3998 operations:
3999@@ -711,11 +736,12 @@
4000 - system
4001 - project
4002 - check_str: rule:admin_required
4003- deprecated_reason: null
4004 deprecated_rule:
4005 check_str: rule:admin_required
4006+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4007+ roles.
4008+ deprecated_since: T
4009 name: identity:update_endpoint_group
4010- deprecated_since: null
4011 description: Update endpoint group.
4012 name: identity:update_endpoint_group
4013 operations:
4014@@ -725,11 +751,12 @@
4015 - system
4016 - project
4017 - check_str: rule:admin_required
4018- deprecated_reason: null
4019 deprecated_rule:
4020 check_str: rule:admin_required
4021+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4022+ roles.
4023+ deprecated_since: T
4024 name: identity:delete_endpoint_group
4025- deprecated_since: null
4026 description: Delete endpoint group.
4027 name: identity:delete_endpoint_group
4028 operations:
4029@@ -739,11 +766,12 @@
4030 - system
4031 - project
4032 - check_str: rule:admin_required or (role:reader and system_scope:all)
4033- deprecated_reason: null
4034 deprecated_rule:
4035 check_str: rule:admin_required
4036+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4037+ roles.
4038+ deprecated_since: T
4039 name: identity:list_projects_associated_with_endpoint_group
4040- deprecated_since: null
4041 description: List all projects associated with a specific endpoint group.
4042 name: identity:list_projects_associated_with_endpoint_group
4043 operations:
4044@@ -753,11 +781,12 @@
4045 - system
4046 - project
4047 - check_str: rule:admin_required or (role:reader and system_scope:all)
4048- deprecated_reason: null
4049 deprecated_rule:
4050 check_str: rule:admin_required
4051+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4052+ roles.
4053+ deprecated_since: T
4054 name: identity:list_endpoints_associated_with_endpoint_group
4055- deprecated_since: null
4056 description: List all endpoints associated with an endpoint group.
4057 name: identity:list_endpoints_associated_with_endpoint_group
4058 operations:
4059@@ -767,11 +796,12 @@
4060 - system
4061 - project
4062 - check_str: rule:admin_required or (role:reader and system_scope:all)
4063- deprecated_reason: null
4064 deprecated_rule:
4065 check_str: rule:admin_required
4066+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4067+ roles.
4068+ deprecated_since: T
4069 name: identity:get_endpoint_group_in_project
4070- deprecated_since: null
4071 description: Check if an endpoint group is associated with a project.
4072 name: identity:get_endpoint_group_in_project
4073 operations:
4074@@ -783,11 +813,12 @@
4075 - system
4076 - project
4077 - check_str: rule:admin_required or (role:reader and system_scope:all)
4078- deprecated_reason: null
4079 deprecated_rule:
4080 check_str: rule:admin_required
4081+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4082+ roles.
4083+ deprecated_since: T
4084 name: identity:list_endpoint_groups_for_project
4085- deprecated_since: null
4086 description: List endpoint groups associated with a specific project.
4087 name: identity:list_endpoint_groups_for_project
4088 operations:
4089@@ -797,11 +828,12 @@
4090 - system
4091 - project
4092 - check_str: rule:admin_required
4093- deprecated_reason: null
4094 deprecated_rule:
4095 check_str: rule:admin_required
4096+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4097+ roles.
4098+ deprecated_since: T
4099 name: identity:add_endpoint_group_to_project
4100- deprecated_since: null
4101 description: Allow a project to access an endpoint group.
4102 name: identity:add_endpoint_group_to_project
4103 operations:
4104@@ -811,11 +843,12 @@
4105 - system
4106 - project
4107 - check_str: rule:admin_required
4108- deprecated_reason: null
4109 deprecated_rule:
4110 check_str: rule:admin_required
4111+ deprecated_reason: The endpoint groups API is now aware of system scope and default
4112+ roles.
4113+ deprecated_since: T
4114 name: identity:remove_endpoint_group_from_project
4115- deprecated_since: null
4116 description: Remove endpoint group from project.
4117 name: identity:remove_endpoint_group_from_project
4118 operations:
4119@@ -830,11 +863,12 @@
4120 or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.project.domain_id)s)
4121 or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.domain.id)s))
4122 and (domain_id:%(target.role.domain_id)s or None:%(target.role.domain_id)s))
4123- deprecated_reason: null
4124 deprecated_rule:
4125 check_str: rule:admin_required
4126+ deprecated_reason: The assignment API is now aware of system scope and default
4127+ roles.
4128+ deprecated_since: S
4129 name: identity:check_grant
4130- deprecated_since: null
4131 description: Check a role grant between a target and an actor. A target can be either
4132 a domain or a project. An actor can be either a user or a group. These terms also
4133 apply to the OS-INHERIT APIs, where grants on the target are inherited to all
4134@@ -882,11 +916,12 @@
4135 or (role:reader and domain_id:%(target.user.domain_id)s and domain_id:%(target.domain.id)s)
4136 or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.project.domain_id)s)
4137 or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.domain.id)s))
4138- deprecated_reason: null
4139 deprecated_rule:
4140 check_str: rule:admin_required
4141+ deprecated_reason: The assignment API is now aware of system scope and default
4142+ roles.
4143+ deprecated_since: S
4144 name: identity:list_grants
4145- deprecated_since: null
4146 description: List roles granted to an actor on a target. A target can be either
4147 a domain or a project. An actor can be either a user or a group. For the OS-INHERIT
4148 APIs, it is possible to list inherited role grants for actors on domains, where
4149@@ -923,11 +958,12 @@
4150 and domain_id:%(target.project.domain_id)s) or (role:admin and domain_id:%(target.group.domain_id)s
4151 and domain_id:%(target.domain.id)s)) and (domain_id:%(target.role.domain_id)s
4152 or None:%(target.role.domain_id)s)
4153- deprecated_reason: null
4154 deprecated_rule:
4155 check_str: rule:admin_required
4156+ deprecated_reason: The assignment API is now aware of system scope and default
4157+ roles.
4158+ deprecated_since: S
4159 name: identity:create_grant
4160- deprecated_since: null
4161 description: Create a role grant between a target and an actor. A target can be
4162 either a domain or a project. An actor can be either a user or a group. These
4163 terms also apply to the OS-INHERIT APIs, where grants on the target are inherited
4164@@ -960,11 +996,12 @@
4165 and domain_id:%(target.project.domain_id)s) or (role:admin and domain_id:%(target.group.domain_id)s
4166 and domain_id:%(target.domain.id)s)) and (domain_id:%(target.role.domain_id)s
4167 or None:%(target.role.domain_id)s)
4168- deprecated_reason: null
4169 deprecated_rule:
4170 check_str: rule:admin_required
4171+ deprecated_reason: The assignment API is now aware of system scope and default
4172+ roles.
4173+ deprecated_since: S
4174 name: identity:revoke_grant
4175- deprecated_since: null
4176 description: Revoke a role grant between a target and an actor. A target can be
4177 either a domain or a project. An actor can be either a user or a group. These
4178 terms also apply to the OS-INHERIT APIs, where grants on the target are inherited
4179@@ -994,11 +1031,12 @@
4180 - domain
4181 - project
4182 - check_str: rule:admin_required or (role:reader and system_scope:all)
4183- deprecated_reason: null
4184 deprecated_rule:
4185 check_str: rule:admin_required
4186+ deprecated_reason: The assignment API is now aware of system scope and default
4187+ roles.
4188+ deprecated_since: S
4189 name: identity:list_system_grants_for_user
4190- deprecated_since: null
4191 description: List all grants a specific user has on the system.
4192 name: identity:list_system_grants_for_user
4193 operations:
4194@@ -1010,11 +1048,12 @@
4195 - system
4196 - project
4197 - check_str: rule:admin_required or (role:reader and system_scope:all)
4198- deprecated_reason: null
4199 deprecated_rule:
4200 check_str: rule:admin_required
4201+ deprecated_reason: The assignment API is now aware of system scope and default
4202+ roles.
4203+ deprecated_since: S
4204 name: identity:check_system_grant_for_user
4205- deprecated_since: null
4206 description: Check if a user has a role on the system.
4207 name: identity:check_system_grant_for_user
4208 operations:
4209@@ -1026,11 +1065,12 @@
4210 - system
4211 - project
4212 - check_str: rule:admin_required
4213- deprecated_reason: null
4214 deprecated_rule:
4215 check_str: rule:admin_required
4216+ deprecated_reason: The assignment API is now aware of system scope and default
4217+ roles.
4218+ deprecated_since: S
4219 name: identity:create_system_grant_for_user
4220- deprecated_since: null
4221 description: Grant a user a role on the system.
4222 name: identity:create_system_grant_for_user
4223 operations:
4224@@ -1041,11 +1081,12 @@
4225 - system
4226 - project
4227 - check_str: rule:admin_required
4228- deprecated_reason: null
4229 deprecated_rule:
4230 check_str: rule:admin_required
4231+ deprecated_reason: The assignment API is now aware of system scope and default
4232+ roles.
4233+ deprecated_since: S
4234 name: identity:revoke_system_grant_for_user
4235- deprecated_since: null
4236 description: Remove a role from a user on the system.
4237 name: identity:revoke_system_grant_for_user
4238 operations:
4239@@ -1056,11 +1097,12 @@
4240 - system
4241 - project
4242 - check_str: rule:admin_required or (role:reader and system_scope:all)
4243- deprecated_reason: null
4244 deprecated_rule:
4245 check_str: rule:admin_required
4246+ deprecated_reason: The assignment API is now aware of system scope and default
4247+ roles.
4248+ deprecated_since: S
4249 name: identity:list_system_grants_for_group
4250- deprecated_since: null
4251 description: List all grants a specific group has on the system.
4252 name: identity:list_system_grants_for_group
4253 operations:
4254@@ -1072,11 +1114,12 @@
4255 - system
4256 - project
4257 - check_str: rule:admin_required or (role:reader and system_scope:all)
4258- deprecated_reason: null
4259 deprecated_rule:
4260 check_str: rule:admin_required
4261+ deprecated_reason: The assignment API is now aware of system scope and default
4262+ roles.
4263+ deprecated_since: S
4264 name: identity:check_system_grant_for_group
4265- deprecated_since: null
4266 description: Check if a group has a role on the system.
4267 name: identity:check_system_grant_for_group
4268 operations:
4269@@ -1088,11 +1131,12 @@
4270 - system
4271 - project
4272 - check_str: rule:admin_required
4273- deprecated_reason: null
4274 deprecated_rule:
4275 check_str: rule:admin_required
4276+ deprecated_reason: The assignment API is now aware of system scope and default
4277+ roles.
4278+ deprecated_since: S
4279 name: identity:create_system_grant_for_group
4280- deprecated_since: null
4281 description: Grant a group a role on the system.
4282 name: identity:create_system_grant_for_group
4283 operations:
4284@@ -1103,11 +1147,12 @@
4285 - system
4286 - project
4287 - check_str: rule:admin_required
4288- deprecated_reason: null
4289 deprecated_rule:
4290 check_str: rule:admin_required
4291+ deprecated_reason: The assignment API is now aware of system scope and default
4292+ roles.
4293+ deprecated_since: S
4294 name: identity:revoke_system_grant_for_group
4295- deprecated_since: null
4296 description: Remove a role from a group on the system.
4297 name: identity:revoke_system_grant_for_group
4298 operations:
4299@@ -1119,11 +1164,11 @@
4300 - project
4301 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4302 and domain_id:%(target.group.domain_id)s)
4303- deprecated_reason: null
4304 deprecated_rule:
4305 check_str: rule:admin_required
4306+ deprecated_reason: The group API is now aware of system scope and default roles.
4307+ deprecated_since: S
4308 name: identity:get_group
4309- deprecated_since: null
4310 description: Show group details.
4311 name: identity:get_group
4312 operations:
4313@@ -1137,11 +1182,11 @@
4314 - project
4315 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4316 and domain_id:%(target.group.domain_id)s)
4317- deprecated_reason: null
4318 deprecated_rule:
4319 check_str: rule:admin_required
4320+ deprecated_reason: The group API is now aware of system scope and default roles.
4321+ deprecated_since: S
4322 name: identity:list_groups
4323- deprecated_since: null
4324 description: List groups.
4325 name: identity:list_groups
4326 operations:
4327@@ -1155,11 +1200,11 @@
4328 - project
4329 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4330 and domain_id:%(target.user.domain_id)s) or user_id:%(user_id)s
4331- deprecated_reason: null
4332 deprecated_rule:
4333 check_str: rule:admin_or_owner
4334+ deprecated_reason: The group API is now aware of system scope and default roles.
4335+ deprecated_since: S
4336 name: identity:list_groups_for_user
4337- deprecated_since: null
4338 description: List groups to which a user belongs.
4339 name: identity:list_groups_for_user
4340 operations:
4341@@ -1172,11 +1217,11 @@
4342 - domain
4343 - project
4344 - check_str: rule:admin_required
4345- deprecated_reason: null
4346 deprecated_rule:
4347 check_str: rule:admin_required
4348+ deprecated_reason: The group API is now aware of system scope and default roles.
4349+ deprecated_since: S
4350 name: identity:create_group
4351- deprecated_since: null
4352 description: Create group.
4353 name: identity:create_group
4354 operations:
4355@@ -1187,11 +1232,11 @@
4356 - domain
4357 - project
4358 - check_str: rule:admin_required
4359- deprecated_reason: null
4360 deprecated_rule:
4361 check_str: rule:admin_required
4362+ deprecated_reason: The group API is now aware of system scope and default roles.
4363+ deprecated_since: S
4364 name: identity:update_group
4365- deprecated_since: null
4366 description: Update group.
4367 name: identity:update_group
4368 operations:
4369@@ -1202,11 +1247,11 @@
4370 - domain
4371 - project
4372 - check_str: rule:admin_required
4373- deprecated_reason: null
4374 deprecated_rule:
4375 check_str: rule:admin_required
4376+ deprecated_reason: The group API is now aware of system scope and default roles.
4377+ deprecated_since: S
4378 name: identity:delete_group
4379- deprecated_since: null
4380 description: Delete group.
4381 name: identity:delete_group
4382 operations:
4383@@ -1218,11 +1263,11 @@
4384 - project
4385 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4386 and domain_id:%(target.group.domain_id)s)
4387- deprecated_reason: null
4388 deprecated_rule:
4389 check_str: rule:admin_required
4390+ deprecated_reason: The group API is now aware of system scope and default roles.
4391+ deprecated_since: S
4392 name: identity:list_users_in_group
4393- deprecated_since: null
4394 description: List members of a specific group.
4395 name: identity:list_users_in_group
4396 operations:
4397@@ -1235,11 +1280,11 @@
4398 - domain
4399 - project
4400 - check_str: rule:admin_required
4401- deprecated_reason: null
4402 deprecated_rule:
4403 check_str: rule:admin_required
4404+ deprecated_reason: The group API is now aware of system scope and default roles.
4405+ deprecated_since: S
4406 name: identity:remove_user_from_group
4407- deprecated_since: null
4408 description: Remove user from group.
4409 name: identity:remove_user_from_group
4410 operations:
4411@@ -1251,11 +1296,11 @@
4412 - project
4413 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4414 and domain_id:%(target.group.domain_id)s and domain_id:%(target.user.domain_id)s)
4415- deprecated_reason: null
4416 deprecated_rule:
4417 check_str: rule:admin_required
4418+ deprecated_reason: The group API is now aware of system scope and default roles.
4419+ deprecated_since: S
4420 name: identity:check_user_in_group
4421- deprecated_since: null
4422 description: Check whether a user is a member of a group.
4423 name: identity:check_user_in_group
4424 operations:
4425@@ -1268,11 +1313,11 @@
4426 - domain
4427 - project
4428 - check_str: rule:admin_required
4429- deprecated_reason: null
4430 deprecated_rule:
4431 check_str: rule:admin_required
4432+ deprecated_reason: The group API is now aware of system scope and default roles.
4433+ deprecated_since: S
4434 name: identity:add_user_to_group
4435- deprecated_since: null
4436 description: Add user to group.
4437 name: identity:add_user_to_group
4438 operations:
4439@@ -1283,11 +1328,12 @@
4440 - domain
4441 - project
4442 - check_str: rule:admin_required
4443- deprecated_reason: null
4444 deprecated_rule:
4445 check_str: rule:admin_required
4446+ deprecated_reason: The identity provider API is now aware of system scope and
4447+ default roles.
4448+ deprecated_since: S
4449 name: identity:create_identity_provider
4450- deprecated_since: null
4451 description: Create identity provider.
4452 name: identity:create_identity_provider
4453 operations:
4454@@ -1297,11 +1343,12 @@
4455 - system
4456 - project
4457 - check_str: rule:admin_required or (role:reader and system_scope:all)
4458- deprecated_reason: null
4459 deprecated_rule:
4460 check_str: rule:admin_required
4461+ deprecated_reason: The identity provider API is now aware of system scope and
4462+ default roles.
4463+ deprecated_since: S
4464 name: identity:list_identity_providers
4465- deprecated_since: null
4466 description: List identity providers.
4467 name: identity:list_identity_providers
4468 operations:
4469@@ -1313,11 +1360,12 @@
4470 - system
4471 - project
4472 - check_str: rule:admin_required or (role:reader and system_scope:all)
4473- deprecated_reason: null
4474 deprecated_rule:
4475 check_str: rule:admin_required
4476+ deprecated_reason: The identity provider API is now aware of system scope and
4477+ default roles.
4478+ deprecated_since: S
4479 name: identity:get_identity_provider
4480- deprecated_since: null
4481 description: Get identity provider.
4482 name: identity:get_identity_provider
4483 operations:
4484@@ -1329,11 +1377,12 @@
4485 - system
4486 - project
4487 - check_str: rule:admin_required
4488- deprecated_reason: null
4489 deprecated_rule:
4490 check_str: rule:admin_required
4491+ deprecated_reason: The identity provider API is now aware of system scope and
4492+ default roles.
4493+ deprecated_since: S
4494 name: identity:update_identity_provider
4495- deprecated_since: null
4496 description: Update identity provider.
4497 name: identity:update_identity_provider
4498 operations:
4499@@ -1343,11 +1392,12 @@
4500 - system
4501 - project
4502 - check_str: rule:admin_required
4503- deprecated_reason: null
4504 deprecated_rule:
4505 check_str: rule:admin_required
4506+ deprecated_reason: The identity provider API is now aware of system scope and
4507+ default roles.
4508+ deprecated_since: S
4509 name: identity:delete_identity_provider
4510- deprecated_since: null
4511 description: Delete identity provider.
4512 name: identity:delete_identity_provider
4513 operations:
4514@@ -1357,11 +1407,12 @@
4515 - system
4516 - project
4517 - check_str: rule:admin_required or (role:reader and system_scope:all)
4518- deprecated_reason: null
4519 deprecated_rule:
4520 check_str: rule:admin_required
4521+ deprecated_reason: The implied role API is now aware of system scope and default
4522+ roles.
4523+ deprecated_since: T
4524 name: identity:get_implied_role
4525- deprecated_since: null
4526 description: Get information about an association between two roles. When a relationship
4527 exists between a prior role and an implied role and the prior role is assigned
4528 to a user, the user also assumes the implied role.
4529@@ -1373,11 +1424,12 @@
4530 - system
4531 - project
4532 - check_str: rule:admin_required or (role:reader and system_scope:all)
4533- deprecated_reason: null
4534 deprecated_rule:
4535 check_str: rule:admin_required
4536+ deprecated_reason: The implied role API is now aware of system scope and default
4537+ roles.
4538+ deprecated_since: T
4539 name: identity:list_implied_roles
4540- deprecated_since: null
4541 description: List associations between two roles. When a relationship exists between
4542 a prior role and an implied role and the prior role is assigned to a user, the
4543 user also assumes the implied role. This will return all the implied roles that
4544@@ -1392,11 +1444,12 @@
4545 - system
4546 - project
4547 - check_str: rule:admin_required
4548- deprecated_reason: null
4549 deprecated_rule:
4550 check_str: rule:admin_required
4551+ deprecated_reason: The implied role API is now aware of system scope and default
4552+ roles.
4553+ deprecated_since: T
4554 name: identity:create_implied_role
4555- deprecated_since: null
4556 description: Create an association between two roles. When a relationship exists
4557 between a prior role and an implied role and the prior role is assigned to a user,
4558 the user also assumes the implied role.
4559@@ -1408,11 +1461,12 @@
4560 - system
4561 - project
4562 - check_str: rule:admin_required
4563- deprecated_reason: null
4564 deprecated_rule:
4565 check_str: rule:admin_required
4566+ deprecated_reason: The implied role API is now aware of system scope and default
4567+ roles.
4568+ deprecated_since: T
4569 name: identity:delete_implied_role
4570- deprecated_since: null
4571 description: Delete the association between two roles. When a relationship exists
4572 between a prior role and an implied role and the prior role is assigned to a user,
4573 the user also assumes the implied role. Removing the association will cause that
4574@@ -1425,11 +1479,12 @@
4575 - system
4576 - project
4577 - check_str: rule:admin_required or (role:reader and system_scope:all)
4578- deprecated_reason: null
4579 deprecated_rule:
4580 check_str: rule:admin_required
4581+ deprecated_reason: The implied role API is now aware of system scope and default
4582+ roles.
4583+ deprecated_since: T
4584 name: identity:list_role_inference_rules
4585- deprecated_since: null
4586 description: List all associations between two roles in the system. When a relationship
4587 exists between a prior role and an implied role and the prior role is assigned
4588 to a user, the user also assumes the implied role.
4589@@ -1443,11 +1498,12 @@
4590 - system
4591 - project
4592 - check_str: rule:admin_required or (role:reader and system_scope:all)
4593- deprecated_reason: null
4594 deprecated_rule:
4595 check_str: rule:admin_required
4596+ deprecated_reason: The implied role API is now aware of system scope and default
4597+ roles.
4598+ deprecated_since: T
4599 name: identity:check_implied_role
4600- deprecated_since: null
4601 description: Check an association between two roles. When a relationship exists
4602 between a prior role and an implied role and the prior role is assigned to a user,
4603 the user also assumes the implied role.
4604@@ -1524,11 +1580,12 @@
4605 - system
4606 - project
4607 - check_str: rule:admin_required
4608- deprecated_reason: null
4609 deprecated_rule:
4610 check_str: rule:admin_required
4611+ deprecated_reason: The federated mapping API is now aware of system scope and
4612+ default roles.
4613+ deprecated_since: S
4614 name: identity:create_mapping
4615- deprecated_since: null
4616 description: Create a new federated mapping containing one or more sets of rules.
4617 name: identity:create_mapping
4618 operations:
4619@@ -1538,11 +1595,12 @@
4620 - system
4621 - project
4622 - check_str: rule:admin_required or (role:reader and system_scope:all)
4623- deprecated_reason: null
4624 deprecated_rule:
4625 check_str: rule:admin_required
4626+ deprecated_reason: The federated mapping API is now aware of system scope and
4627+ default roles.
4628+ deprecated_since: S
4629 name: identity:get_mapping
4630- deprecated_since: null
4631 description: Get a federated mapping.
4632 name: identity:get_mapping
4633 operations:
4634@@ -1554,11 +1612,12 @@
4635 - system
4636 - project
4637 - check_str: rule:admin_required or (role:reader and system_scope:all)
4638- deprecated_reason: null
4639 deprecated_rule:
4640 check_str: rule:admin_required
4641+ deprecated_reason: The federated mapping API is now aware of system scope and
4642+ default roles.
4643+ deprecated_since: S
4644 name: identity:list_mappings
4645- deprecated_since: null
4646 description: List federated mappings.
4647 name: identity:list_mappings
4648 operations:
4649@@ -1570,11 +1629,12 @@
4650 - system
4651 - project
4652 - check_str: rule:admin_required
4653- deprecated_reason: null
4654 deprecated_rule:
4655 check_str: rule:admin_required
4656+ deprecated_reason: The federated mapping API is now aware of system scope and
4657+ default roles.
4658+ deprecated_since: S
4659 name: identity:delete_mapping
4660- deprecated_since: null
4661 description: Delete a federated mapping.
4662 name: identity:delete_mapping
4663 operations:
4664@@ -1584,11 +1644,12 @@
4665 - system
4666 - project
4667 - check_str: rule:admin_required
4668- deprecated_reason: null
4669 deprecated_rule:
4670 check_str: rule:admin_required
4671+ deprecated_reason: The federated mapping API is now aware of system scope and
4672+ default roles.
4673+ deprecated_since: S
4674 name: identity:update_mapping
4675- deprecated_since: null
4676 description: Update a federated mapping.
4677 name: identity:update_mapping
4678 operations:
4679@@ -1598,11 +1659,11 @@
4680 - system
4681 - project
4682 - check_str: rule:admin_required or (role:reader and system_scope:all)
4683- deprecated_reason: null
4684 deprecated_rule:
4685 check_str: rule:admin_required
4686+ deprecated_reason: The policy API is now aware of system scope and default roles.
4687+ deprecated_since: T
4688 name: identity:get_policy
4689- deprecated_since: null
4690 description: Show policy details.
4691 name: identity:get_policy
4692 operations:
4693@@ -1612,11 +1673,11 @@
4694 - system
4695 - project
4696 - check_str: rule:admin_required or (role:reader and system_scope:all)
4697- deprecated_reason: null
4698 deprecated_rule:
4699 check_str: rule:admin_required
4700+ deprecated_reason: The policy API is now aware of system scope and default roles.
4701+ deprecated_since: T
4702 name: identity:list_policies
4703- deprecated_since: null
4704 description: List policies.
4705 name: identity:list_policies
4706 operations:
4707@@ -1626,11 +1687,11 @@
4708 - system
4709 - project
4710 - check_str: rule:admin_required
4711- deprecated_reason: null
4712 deprecated_rule:
4713 check_str: rule:admin_required
4714+ deprecated_reason: The policy API is now aware of system scope and default roles.
4715+ deprecated_since: T
4716 name: identity:create_policy
4717- deprecated_since: null
4718 description: Create policy.
4719 name: identity:create_policy
4720 operations:
4721@@ -1640,11 +1701,11 @@
4722 - system
4723 - project
4724 - check_str: rule:admin_required
4725- deprecated_reason: null
4726 deprecated_rule:
4727 check_str: rule:admin_required
4728+ deprecated_reason: The policy API is now aware of system scope and default roles.
4729+ deprecated_since: T
4730 name: identity:update_policy
4731- deprecated_since: null
4732 description: Update policy.
4733 name: identity:update_policy
4734 operations:
4735@@ -1654,11 +1715,11 @@
4736 - system
4737 - project
4738 - check_str: rule:admin_required
4739- deprecated_reason: null
4740 deprecated_rule:
4741 check_str: rule:admin_required
4742+ deprecated_reason: The policy API is now aware of system scope and default roles.
4743+ deprecated_since: T
4744 name: identity:delete_policy
4745- deprecated_since: null
4746 description: Delete policy.
4747 name: identity:delete_policy
4748 operations:
4749@@ -1668,11 +1729,12 @@
4750 - system
4751 - project
4752 - check_str: rule:admin_required
4753- deprecated_reason: null
4754 deprecated_rule:
4755 check_str: rule:admin_required
4756+ deprecated_reason: The policy association API is now aware of system scope and
4757+ default roles.
4758+ deprecated_since: T
4759 name: identity:create_policy_association_for_endpoint
4760- deprecated_since: null
4761 description: Associate a policy to a specific endpoint.
4762 name: identity:create_policy_association_for_endpoint
4763 operations:
4764@@ -1682,11 +1744,12 @@
4765 - system
4766 - project
4767 - check_str: rule:admin_required or (role:reader and system_scope:all)
4768- deprecated_reason: null
4769 deprecated_rule:
4770 check_str: rule:admin_required
4771+ deprecated_reason: The policy association API is now aware of system scope and
4772+ default roles.
4773+ deprecated_since: T
4774 name: identity:check_policy_association_for_endpoint
4775- deprecated_since: null
4776 description: Check policy association for endpoint.
4777 name: identity:check_policy_association_for_endpoint
4778 operations:
4779@@ -1698,11 +1761,12 @@
4780 - system
4781 - project
4782 - check_str: rule:admin_required
4783- deprecated_reason: null
4784 deprecated_rule:
4785 check_str: rule:admin_required
4786+ deprecated_reason: The policy association API is now aware of system scope and
4787+ default roles.
4788+ deprecated_since: T
4789 name: identity:delete_policy_association_for_endpoint
4790- deprecated_since: null
4791 description: Delete policy association for endpoint.
4792 name: identity:delete_policy_association_for_endpoint
4793 operations:
4794@@ -1712,11 +1776,12 @@
4795 - system
4796 - project
4797 - check_str: rule:admin_required
4798- deprecated_reason: null
4799 deprecated_rule:
4800 check_str: rule:admin_required
4801+ deprecated_reason: The policy association API is now aware of system scope and
4802+ default roles.
4803+ deprecated_since: T
4804 name: identity:create_policy_association_for_service
4805- deprecated_since: null
4806 description: Associate a policy to a specific service.
4807 name: identity:create_policy_association_for_service
4808 operations:
4809@@ -1726,11 +1791,12 @@
4810 - system
4811 - project
4812 - check_str: rule:admin_required or (role:reader and system_scope:all)
4813- deprecated_reason: null
4814 deprecated_rule:
4815 check_str: rule:admin_required
4816+ deprecated_reason: The policy association API is now aware of system scope and
4817+ default roles.
4818+ deprecated_since: T
4819 name: identity:check_policy_association_for_service
4820- deprecated_since: null
4821 description: Check policy association for service.
4822 name: identity:check_policy_association_for_service
4823 operations:
4824@@ -1742,11 +1808,12 @@
4825 - system
4826 - project
4827 - check_str: rule:admin_required
4828- deprecated_reason: null
4829 deprecated_rule:
4830 check_str: rule:admin_required
4831+ deprecated_reason: The policy association API is now aware of system scope and
4832+ default roles.
4833+ deprecated_since: T
4834 name: identity:delete_policy_association_for_service
4835- deprecated_since: null
4836 description: Delete policy association for service.
4837 name: identity:delete_policy_association_for_service
4838 operations:
4839@@ -1756,11 +1823,12 @@
4840 - system
4841 - project
4842 - check_str: rule:admin_required
4843- deprecated_reason: null
4844 deprecated_rule:
4845 check_str: rule:admin_required
4846+ deprecated_reason: The policy association API is now aware of system scope and
4847+ default roles.
4848+ deprecated_since: T
4849 name: identity:create_policy_association_for_region_and_service
4850- deprecated_since: null
4851 description: Associate a policy to a specific region and service combination.
4852 name: identity:create_policy_association_for_region_and_service
4853 operations:
4854@@ -1770,11 +1838,12 @@
4855 - system
4856 - project
4857 - check_str: rule:admin_required or (role:reader and system_scope:all)
4858- deprecated_reason: null
4859 deprecated_rule:
4860 check_str: rule:admin_required
4861+ deprecated_reason: The policy association API is now aware of system scope and
4862+ default roles.
4863+ deprecated_since: T
4864 name: identity:check_policy_association_for_region_and_service
4865- deprecated_since: null
4866 description: Check policy association for region and service.
4867 name: identity:check_policy_association_for_region_and_service
4868 operations:
4869@@ -1786,11 +1855,12 @@
4870 - system
4871 - project
4872 - check_str: rule:admin_required
4873- deprecated_reason: null
4874 deprecated_rule:
4875 check_str: rule:admin_required
4876+ deprecated_reason: The policy association API is now aware of system scope and
4877+ default roles.
4878+ deprecated_since: T
4879 name: identity:delete_policy_association_for_region_and_service
4880- deprecated_since: null
4881 description: Delete policy association for region and service.
4882 name: identity:delete_policy_association_for_region_and_service
4883 operations:
4884@@ -1800,11 +1870,12 @@
4885 - system
4886 - project
4887 - check_str: rule:admin_required or (role:reader and system_scope:all)
4888- deprecated_reason: null
4889 deprecated_rule:
4890 check_str: rule:admin_required
4891+ deprecated_reason: The policy association API is now aware of system scope and
4892+ default roles.
4893+ deprecated_since: T
4894 name: identity:get_policy_for_endpoint
4895- deprecated_since: null
4896 description: Get policy for endpoint.
4897 name: identity:get_policy_for_endpoint
4898 operations:
4899@@ -1816,11 +1887,12 @@
4900 - system
4901 - project
4902 - check_str: rule:admin_required or (role:reader and system_scope:all)
4903- deprecated_reason: null
4904 deprecated_rule:
4905 check_str: rule:admin_required
4906+ deprecated_reason: The policy association API is now aware of system scope and
4907+ default roles.
4908+ deprecated_since: T
4909 name: identity:list_endpoints_for_policy
4910- deprecated_since: null
4911 description: List endpoints for policy.
4912 name: identity:list_endpoints_for_policy
4913 operations:
4914@@ -1831,11 +1903,11 @@
4915 - project
4916 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4917 and domain_id:%(target.project.domain_id)s) or project_id:%(target.project.id)s
4918- deprecated_reason: null
4919 deprecated_rule:
4920 check_str: rule:admin_required or project_id:%(target.project.id)s
4921+ deprecated_reason: The project API is now aware of system scope and default roles.
4922+ deprecated_since: S
4923 name: identity:get_project
4924- deprecated_since: null
4925 description: Show project details.
4926 name: identity:get_project
4927 operations:
4928@@ -1847,11 +1919,11 @@
4929 - project
4930 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4931 and domain_id:%(target.domain_id)s)
4932- deprecated_reason: null
4933 deprecated_rule:
4934 check_str: rule:admin_required
4935+ deprecated_reason: The project API is now aware of system scope and default roles.
4936+ deprecated_since: S
4937 name: identity:list_projects
4938- deprecated_since: null
4939 description: List projects.
4940 name: identity:list_projects
4941 operations:
4942@@ -1863,11 +1935,11 @@
4943 - project
4944 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
4945 and domain_id:%(target.user.domain_id)s) or user_id:%(target.user.id)s
4946- deprecated_reason: null
4947 deprecated_rule:
4948 check_str: rule:admin_or_owner
4949+ deprecated_reason: The project API is now aware of system scope and default roles.
4950+ deprecated_since: S
4951 name: identity:list_user_projects
4952- deprecated_since: null
4953 description: List projects for user.
4954 name: identity:list_user_projects
4955 operations:
4956@@ -1878,11 +1950,11 @@
4957 - domain
4958 - project
4959 - check_str: rule:admin_required
4960- deprecated_reason: null
4961 deprecated_rule:
4962 check_str: rule:admin_required
4963+ deprecated_reason: The project API is now aware of system scope and default roles.
4964+ deprecated_since: S
4965 name: identity:create_project
4966- deprecated_since: null
4967 description: Create project.
4968 name: identity:create_project
4969 operations:
4970@@ -1893,11 +1965,11 @@
4971 - domain
4972 - project
4973 - check_str: rule:admin_required
4974- deprecated_reason: null
4975 deprecated_rule:
4976 check_str: rule:admin_required
4977+ deprecated_reason: The project API is now aware of system scope and default roles.
4978+ deprecated_since: S
4979 name: identity:update_project
4980- deprecated_since: null
4981 description: Update project.
4982 name: identity:update_project
4983 operations:
4984@@ -1908,11 +1980,11 @@
4985 - domain
4986 - project
4987 - check_str: rule:admin_required
4988- deprecated_reason: null
4989 deprecated_rule:
4990 check_str: rule:admin_required
4991+ deprecated_reason: The project API is now aware of system scope and default roles.
4992+ deprecated_since: S
4993 name: identity:delete_project
4994- deprecated_since: null
4995 description: Delete project.
4996 name: identity:delete_project
4997 operations:
4998@@ -1924,11 +1996,11 @@
4999 - project
5000 - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader
The diff has been truncated for viewing.

Subscribers

People subscribed via source and target branches