<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/openstack/python-openstackclient.git/openstackclient/identity, branch 3.13.0</title>
<subtitle>opendev.org: openstack/python-openstackclient
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/'/>
<entry>
<title>Merge "Add support for endpoing filter commands"</title>
<updated>2017-12-13T02:18:43+00:00</updated>
<author>
<name>Zuul</name>
<email>zuul@review.openstack.org</email>
</author>
<published>2017-12-13T02:18:43+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=21b656ca4aa995530be474a8b9761b89f2ef93dd'/>
<id>21b656ca4aa995530be474a8b9761b89f2ef93dd</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for endpoing filter commands</title>
<updated>2017-11-21T06:58:48+00:00</updated>
<author>
<name>Jose Castro Leon</name>
<email>jose.castro.leon@cern.ch</email>
</author>
<published>2017-10-25T13:39:44+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=12ee1861085144f43e6e535f82ba5d9b5d9a5632'/>
<id>12ee1861085144f43e6e535f82ba5d9b5d9a5632</id>
<content type='text'>
Implements the commands that allow to link and endpoint to
a project for endpoint filter management.

Implements: blueprint keystone-endpoint-filter

Change-Id: Iecf61495664fb8413d35ef69f07ea929d190d002
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Implements the commands that allow to link and endpoint to
a project for endpoint filter management.

Implements: blueprint keystone-endpoint-filter

Change-Id: Iecf61495664fb8413d35ef69f07ea929d190d002
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix credentials in create, update and list.</title>
<updated>2017-11-17T03:39:15+00:00</updated>
<author>
<name>yangweiwei</name>
<email>yangweiwei@cmss.chinamobile.com</email>
</author>
<published>2017-11-17T03:39:15+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=0f749cacc2b0a76226a6a7ab7769ecf1475a160b'/>
<id>0f749cacc2b0a76226a6a7ab7769ecf1475a160b</id>
<content type='text'>
Now, keystone has supported serverl auth method, like 'totp'.
Before we use this method, we should create the credential first.
And we need create it with type 'totp'. But now we cannot create
credential with this method.

Also, I think the type should not have constrains. We can create
any type in keystone project. So, we should do these actions too.
The type would be more which We cannot control.

Change-Id: Ie0482da3133fb515e4bb8e45f8c54f509589cc5e
Closes-bug: #1731848
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Now, keystone has supported serverl auth method, like 'totp'.
Before we use this method, we should create the credential first.
And we need create it with type 'totp'. But now we cannot create
credential with this method.

Also, I think the type should not have constrains. We can create
any type in keystone project. So, we should do these actions too.
The type would be more which We cannot control.

Change-Id: Ie0482da3133fb515e4bb8e45f8c54f509589cc5e
Closes-bug: #1731848
</pre>
</div>
</content>
</entry>
<entry>
<title>Optimize getting endpoint list</title>
<updated>2017-09-26T21:31:07+00:00</updated>
<author>
<name>Anton Frolov</name>
<email>af9740@att.com</email>
</author>
<published>2017-09-25T19:31:24+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=f6f5ce03c5b8a03180db24a02dda5b30f40b4cee'/>
<id>f6f5ce03c5b8a03180db24a02dda5b30f40b4cee</id>
<content type='text'>
Currently ListEndpoint.take_action method unconditionally iterates
over all endpoints and issue GET /v3/services/&lt;ep.service_id&gt;
request for each endpoint. In case of HTTPS keystone endpoint this
can take significant amout of time, and it only getting worse in
case of multiple regions.

This commit change this logic to making just two GET requests: first
it gets endpoint list, then it gets service list, searching service
in the list instead of issuing GET /v3/services/&lt;id&gt; request.

Change-Id: I22b61c0b45b0205a2f5a4608c2473cb7814fe3cf
Closes-Bug: 1719413
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Currently ListEndpoint.take_action method unconditionally iterates
over all endpoints and issue GET /v3/services/&lt;ep.service_id&gt;
request for each endpoint. In case of HTTPS keystone endpoint this
can take significant amout of time, and it only getting worse in
case of multiple regions.

This commit change this logic to making just two GET requests: first
it gets endpoint list, then it gets service list, searching service
in the list instead of issuing GET /v3/services/&lt;id&gt; request.

Change-Id: I22b61c0b45b0205a2f5a4608c2473cb7814fe3cf
Closes-Bug: 1719413
</pre>
</div>
</content>
</entry>
<entry>
<title>Implied Roles</title>
<updated>2017-08-22T17:08:30+00:00</updated>
<author>
<name>Harry Rybacki</name>
<email>hrybacki@redhat.com</email>
</author>
<published>2017-07-19T13:07:34+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=8cd3e258c5029a8efedab40019d6cfd3eac379f5'/>
<id>8cd3e258c5029a8efedab40019d6cfd3eac379f5</id>
<content type='text'>
Allow the user to create an inference rule between
two roles. The first, called the prior role
is the role explicitly assigned to an individual.
The second, called the implied role, is one that
the user gets implicitly. For example:

Role B implies Role A.
User X is assigned Role B.
Therefore User X also assigned Role A.

The management and maintenance of the rules is
performed in the Keystone server.

Change-Id: If547c2f16e812bc7fffd742ec37e6a26011f3185
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Allow the user to create an inference rule between
two roles. The first, called the prior role
is the role explicitly assigned to an individual.
The second, called the implied role, is one that
the user gets implicitly. For example:

Role B implies Role A.
User X is assigned Role B.
Therefore User X also assigned Role A.

The management and maintenance of the rules is
performed in the Keystone server.

Change-Id: If547c2f16e812bc7fffd742ec37e6a26011f3185
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Use *_as_ids instead *_as_list"</title>
<updated>2017-07-26T03:58:57+00:00</updated>
<author>
<name>Jenkins</name>
<email>jenkins@review.openstack.org</email>
</author>
<published>2017-07-26T03:58:57+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=86bda369638e53a8e9683731e7a5d432640fa813'/>
<id>86bda369638e53a8e9683731e7a5d432640fa813</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add optional parameter "user_id" and "type" to list credentials</title>
<updated>2017-07-25T14:56:50+00:00</updated>
<author>
<name>zhanghongtao</name>
<email>zhanghongtao0826@126.com</email>
</author>
<published>2017-07-25T07:48:27+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=470a1f1acfe261357fc3125b2db3bc6ec10c654e'/>
<id>470a1f1acfe261357fc3125b2db3bc6ec10c654e</id>
<content type='text'>
In keystone version 3.5, "type" optional attribute has been added
to list credentials. This patch add "user_id" and "type" optional
parameter in openstack client.

Change-Id: Ia09ee7c39204fdff2dfd7b9b606d888d007caac5
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In keystone version 3.5, "type" optional attribute has been added
to list credentials. This patch add "user_id" and "type" optional
parameter in openstack client.

Change-Id: Ia09ee7c39204fdff2dfd7b9b606d888d007caac5
</pre>
</div>
</content>
</entry>
<entry>
<title>Add domain parameter to Identity Provider</title>
<updated>2017-07-21T15:28:57+00:00</updated>
<author>
<name>Kristi Nikolla</name>
<email>knikolla@bu.edu</email>
</author>
<published>2017-06-16T19:04:40+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=77ff011ced18260242224a7317aba92d53ff1455'/>
<id>77ff011ced18260242224a7317aba92d53ff1455</id>
<content type='text'>
Identity providers are now associated with domains. This change
allows a user to specify a domain by ID or by name when creating
an identity provider. [0]

This also adds the column for Domain ID in listing.
Updating a domain for an identity provider is not supported, so
that isn't changed.

[0]. Id18b8b2fe853b97631bc990df8188ed64a6e1275

Closes-Bug: 1698390

Change-Id: Icc408e2fe88f257d5863bd3df716a777d52befcc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Identity providers are now associated with domains. This change
allows a user to specify a domain by ID or by name when creating
an identity provider. [0]

This also adds the column for Domain ID in listing.
Updating a domain for an identity provider is not supported, so
that isn't changed.

[0]. Id18b8b2fe853b97631bc990df8188ed64a6e1275

Closes-Bug: 1698390

Change-Id: Icc408e2fe88f257d5863bd3df716a777d52befcc
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix 'domain' filter not work well in some commands</title>
<updated>2017-07-18T23:01:22+00:00</updated>
<author>
<name>jiangpch</name>
<email>jiangpengcheng@navercorp.com</email>
</author>
<published>2017-07-13T08:58:00+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=a01bf55d2065ec1a98f486109cc8d315def501cd'/>
<id>a01bf55d2065ec1a98f486109cc8d315def501cd</id>
<content type='text'>
The 'domain' filter not work well in commands 'project show',
'user show' and 'user set'.

Depends-On: I490900d6249f01654d4cba43bddd3e7af7928a84
Closes-Bug: #1704097
Change-Id: Ib4f47cbaba27eb56c4a41d187fee74a995e62dc7
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The 'domain' filter not work well in commands 'project show',
'user show' and 'user set'.

Depends-On: I490900d6249f01654d4cba43bddd3e7af7928a84
Closes-Bug: #1704097
Change-Id: Ib4f47cbaba27eb56c4a41d187fee74a995e62dc7
</pre>
</div>
</content>
</entry>
<entry>
<title>When creating a trust, send role_ids instead or role_names</title>
<updated>2017-06-22T17:08:01+00:00</updated>
<author>
<name>Kristi Nikolla</name>
<email>knikolla@bu.edu</email>
</author>
<published>2017-06-16T19:33:46+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=da53c2b33457f4f1e93bdda6c0c16172ea36bc78'/>
<id>da53c2b33457f4f1e93bdda6c0c16172ea36bc78</id>
<content type='text'>
This changes create a trust to use ids instead of names because of
the possibility of roles sharing a name. Even if the user
uniquely identified a role by inputting the id, the request sent
to the identity service would used the name, therefore the command
would fail in the case that two roles share a name.

This does not change how trusts are displayed during trust list or
trust show, a name will still be shown instead of an id.

Depends-On: I38e0ac35946ee6e53128babac3ea759a380572e0

Change-Id: I5bdf89f1e288954a7f5c2704231f270bc7d196f5
Closes-Bug: 1696111
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This changes create a trust to use ids instead of names because of
the possibility of roles sharing a name. Even if the user
uniquely identified a role by inputting the id, the request sent
to the identity service would used the name, therefore the command
would fail in the case that two roles share a name.

This does not change how trusts are displayed during trust list or
trust show, a name will still be shown instead of an id.

Depends-On: I38e0ac35946ee6e53128babac3ea759a380572e0

Change-Id: I5bdf89f1e288954a7f5c2704231f270bc7d196f5
Closes-Bug: 1696111
</pre>
</div>
</content>
</entry>
</feed>
