| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Change-Id: I3c4e455a10deae0d719fdc8534049abf8faba954
|
|
|
|
|
|
|
|
|
|
| |
Fix new warning that are introduced with hacking 0.10.x.
The failure messages fixed are:
H238 old style class declaration, use new style (inherit from `object`)
H105 Don't use author tags
H501 Do not use self.__dict__ for string formatting
Change-Id: Ia070d60754dfd85966178eadbf82a4d98b64407a
|
|
|
|
|
|
|
|
|
|
| |
auth_token middleware in python-keystoneclient is deprecated and has
been moved to the keystonemiddleware repo.
This patch updates Ironic to use the new keystonemiddleware package.
Change-Id: Ifb48996867f9f51c4dbedde0e0d9476c2d2818b4
Closes-Bug: #1342274
|
|
|
|
|
|
|
|
|
|
| |
This patch designed for receiving url of any
openstack service from keystone service catalog.
Examples: Ironic conductor and api are on different
hosts, conductor needs api url for deploy image,
get Glance service api for Ironic.
Change-Id: I3dc7475e10c7a464541be64d69ce97c41be7a650
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Policy file contained malformed content so the policy
engine failed to parse it. That was the reason of rejecting
all requests, if authentication was enabled.
This patch also updates policies to get rid of unused policies
and use GenericCheck to check for admin API.
After changes mentioned above some unused code appeared in
ironic.common.policy and so it was cleaned up.
Closes-bug: #1236371
Change-Id: Ie1dbda11561a9e7068d240a19f9fb98eae121c94
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Some parts of the API should be available without
supplying an authentication token, e.g., / - the root
and /v1 - the specification of the API v1.
This patch allows to specify public routes in the
Pecan application configuration file and specifies the
mentioned routes as public ones.
Fixes: bug #1221263
Change-Id: Ie106f0767158d30fd89a72f011748537435ddeef
|
|
|
|
|
|
|
|
|
| |
Enabled ACL and implemented a hook for configuring
request context.
Implemented a hook that rejects all non-admin requests.
Change-Id: Ie436d4b41ef9fb54b33f5a7dad77c3e46a26385a
|
|
|