| Commit message (Collapse) | Author | Age | Files | Lines |
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Rackspace puts neutron in the service catalog but it does not work (404s
the endpoint) While it's easy enough to try/except around network calls,
it's also a known fact and can be communicated clearly. Allow things
that want to short-circuit read the value from the config and react
accordingly.
Note: This is not a value going in to the defaults, because the fact
that this is happening at all is highly strange and hopefully something
that can be solved by collaborating on future iterations of DefCore.
However, communicating clearly that it's a known issue is helpful for a
class of users.
Change-Id: I506f4dd397608f2feb6fbda48d297d283312a169
|
|/
|
|
| |
Change-Id: Idf3df94ea039f07fa958a3afadf3388221ffa2ff
|
|
|
|
|
|
|
|
|
| |
IPv6 support is detectable, so rather than having a user opt-in to it,
provide a flag that can be provided to tell it that detected IPv6
support is lying. This should have to be set for far fewer people and
should result in transparent opt-in to IPv6 where available.
Change-Id: Ib0c4c4e8b3b7b4bcee5fa3414719969274929b9a
|
|
|
|
|
|
|
| |
When using the defaults values from outside, we get a not so
right API version.
Change-Id: I8159dd4a26b65ad242d5ba75c4a5e0dc161704fc
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
If you're using os-client-config and ansible and python-openstackclient,
the envvar override support can get tricky if you've set OS_CLOUD to
select a cloud for python-openstackclient, leading you to have an empty
cloud called envvars when you were not actually trying to create one.
Special-case pull both out, treating OS_CLOUD as a default value for
get_one_cloud() and only creating an envvars cloud if OS_REGION_NAME is
not the only env var provided.
Change-Id: I2a5235c18f9be1e5dfc019888a0c187ef40074bc
|
|
|
|
|
| |
Signed-off-by: Simon Leinen <simon.leinen@gmail.com>
Change-Id: Iae386787ee2b3feecb78e3f69c7ed4e279e5acce
|
|\ |
|
| |
| |
| |
| |
| |
| |
| | |
This adds Catalyst IT's public cloud to the list of vendors,
https://catalyst.net.nz/catalyst-cloud
Change-Id: I2d886bfc4fc94c534a55f6bad1120e474654524f
|
| |
| |
| |
| |
| |
| |
| |
| | |
Navigating to https://pypi.python.org/pypi/os-client-config results
in seeing the raw RST content of the readme file. This is likely
caused by minor RST warnings, but pypi gives up and shows it raw.
Change-Id: Ia2d6202ade5282d9aeae9bb948175aae2aa264cd
|
|\ \
| |/
|/| |
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Ironic has a mode where it does not use auth, but we still funnel that
through the ksa admin_token type for consistency of code. The hack we
had to do that went too far and caused validate_auth to strip the fake
token we were adding.
Change-Id: Id5275ac7db1a6052db02c2286cbf88862cb1ff70
|
| |
| |
| |
| |
| |
| | |
Needed for coverage 4.0
Change-Id: I033aaed4afa9037017190bc0b5aba7216840627d
|
|\ \
| |/
|/| |
|
| |
| |
| |
| | |
Change-Id: Ic14365b1daec9a3f51d6a59db38604edb60865d4
|
| |
| |
| |
| |
| |
| |
| | |
Bad logic fallthrough causes us to die when trying to process an option
that does not have a deprecated option.
Change-Id: I613466c6146a94b66a0a6d9955cdc4a6556f44ed
|
|\ \ |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
For things not on keystoneauth yet, we need to move things into
the auth dict using keystoneclient.
Change-Id: Ia4500cc270b775f189048ccf667d5bfdc5dfcd14
|
|/ /
| |
| |
| | |
Change-Id: If8dee92917d1f5c1e349f02eba7661c39dbe7d0b
|
| |
| |
| |
| |
| |
| |
| |
| | |
We only need the plugin loader if we're going to create an auth
plugin. Doing this when validate=False is clearly not a workable
solution, because we'll wind up validating unknown plugins.
Change-Id: Ieed44aa3ef41a14edd7529ca599a01967d517207
|
|\ \ |
|
| |/
| |
| |
| |
| |
| |
| | |
When passing in kwargs to _get_one_cloud we do not dive into the auth
dict to convert '-' to '_'.
Change-Id: I8ce12370b5fd4444ba17d724e7f8036a7b0d2784
|
|/
|
|
|
|
|
|
|
|
| |
Prior to this any arg that started with 'os' had the 'os' prefix chomped
including the next character. This meant that any arg like 'osmosis'
would've been replaced with 'osis' which is clearly wrong. Instead we
want to treat the OpenStack prefix of 'os-' or 'os_' as the special
thing so check the next character is correct before chomping.
Change-Id: Id12a92adf63d896f7aa5c0e391abd299c4ce3331
|
|\ |
|
| |
| |
| |
| | |
Change-Id: I4c98b72f039fd97a2c55ecbfa546fb908d1fe539
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
In the most common case, a use has one and only one domain id that they
care about, and it's associated with their user and project. Instead of
making them set it for both user_domain_id and project_domain_id, allow
for domain_{id, name} and then fill in any missing values for
{user,project}_domain_{id,name} with the given value.
This is mainly because I wind up with config files looking like this:
user_domain_id: d0919bd5e8d74e49adf0e145807ffc38
project_domain_id: d0919bd5e8d74e49adf0e145807ffc38
Which offends my tender sensibilities.
Change-Id: I12342dfa9f1b539a3fea5dd8874c42d027c59739
|
| |
| |
| |
| | |
Change-Id: I9f35c26fc633b07442141443574ea9b7582036be
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
keystoneauth plugin loading has parameter validation itself. Rather
than us doing it, let ksa do it.
This bubbles up a ksa exception- but I think I'm ok with that as an
interface.
Change-Id: I3e7741a1b623b133f24f321e97539883dc6cd153
|
|\ \
| |/
|/| |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
We know all of the things that we need to know to return an appropriate
auth plugin from keystoneauth based on the auth parameters. This also
introduces a hard-depend on keystoneauth, which should be fine since
keystoneauth itself has a very low dependency count.
We'll also use ksa to help validate auth parameters when we're doing
the config processing.
Change-Id: Ia1a1a4adb4dcefed5d7607082e026ca7361f394d
|
| |
| |
| |
| | |
Change-Id: I3a7f31a205b9a49e8c93f71e2a9dacacee6e2f91
|
| |
| |
| |
| | |
Change-Id: Iac2a51f2351e6b46469508abadd63942829663f0
|
| |
| |
| |
| | |
Change-Id: Ic5b5ee307b9d1eb338839a7feeeab50469316cf5
|
| |
| |
| |
| | |
Change-Id: I78e9191073e68a9d3f78ba11b47aa0b1ff816430
|
| |
| |
| |
| | |
Change-Id: I67973f89e2da4ef550e46c32ad63a4c8e043b4d0
|
| |
| |
| |
| |
| |
| |
| | |
It turns out it's more common than v1. Also, ovh was inappropriately
listing glance v1.
Change-Id: Icb534bf98fd3fa1c900ed9e4dd09ea0643176ff9
|
| |
| |
| |
| |
| |
| | |
Also, turns out auro is running Glance v2.
Change-Id: Iccc2e09f45192ac21001c346dab048c77a0f7813
|
| |
| |
| |
| |
| |
| | |
Nice job with keystone v3 support.
Change-Id: Ib2b54feef5055b04740a63a3a1d4e0b967018864
|
| |
| |
| |
| | |
Change-Id: I007802ac08a8708fbbbfa8ee8c7d79e4e2bb55f7
|
|/
|
|
|
|
| |
Heat only has v1.
Change-Id: I31b40b7cfec0685105b8066d1cb385befae00f90
|
|\ |
|
| |
| |
| |
| |
| |
| |
| | |
If defaults.yaml is empty, a TypeError is thrown
because the result of yaml.load is not iterable.
Change-Id: Ic3283ebaf9dd325e4f430e70bce08c6d716f60bc
|
|/
|
|
|
|
|
| |
OVH has two regions now. Also, be clear that OVH does not use floating
ips.
Change-Id: Iabd84748cccec7da6e083b647511cba48d57bc20
|
|
|
|
|
|
| |
There are clouds where doing this is not working.
Change-Id: I1d2e71b2a6ad22eb5070b92448779f2e9df71e4a
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Name the auth type needed for using an admin token "admin_token". This
hack can be removed with keystoneclient and/or keystoneauth make a
release with the admin_token entrypoint defined.
Naming it admin_token further reduces the conflict with OSC, which
should make the patch to work around OSC having different arguments
unnecessary.
This reverts commit 0e3117cb01d201f403be72cbb1218b9eec69a541.
Change-Id: I079c7c61b2637ded73542876cb1378a0731f8631
|
|\ \
| |/ |
|
| |
| |
| |
| |
| |
| |
| |
| | |
This reverts commit dfef01a7cbb9d68ad443d182e548ec58143a3a1f.
This broke the world.
Change-Id: I65d820b0da807a161eae814ea4b5413f245d7bf0
|
|\ \
| |/ |
|
| |
| |
| |
| |
| |
| |
| | |
Use ksc_auth.token_endpoint.Token as Keystone authentication plugin if
auth_type is token_endpoint.
Change-Id: I1a6d6dfe731527d7040cfbc2404fd5cf86ba5893
|