<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/openstack/python-openstackclient.git/openstackclient/identity, branch feature/osc4</title>
<subtitle>opendev.org: openstack/python-openstackclient
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/'/>
<entry>
<title>Merge remote-tracking branch 'origin/master' into f4-merge-branch</title>
<updated>2017-09-14T16:16:11+00:00</updated>
<author>
<name>Dean Troyer</name>
<email>dtroyer@gmail.com</email>
</author>
<published>2017-09-14T16:06:51+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=5309bf5f873aba4e994c9011a893987c40d56eda'/>
<id>5309bf5f873aba4e994c9011a893987c40d56eda</id>
<content type='text'>
Change-Id: Ie6c321e67aa9338334e4649879e60847a5d1eb56
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Change-Id: Ie6c321e67aa9338334e4649879e60847a5d1eb56
</pre>
</div>
</content>
</entry>
<entry>
<title>Implied Roles</title>
<updated>2017-08-22T17:08:30+00:00</updated>
<author>
<name>Harry Rybacki</name>
<email>hrybacki@redhat.com</email>
</author>
<published>2017-07-19T13:07:34+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=8cd3e258c5029a8efedab40019d6cfd3eac379f5'/>
<id>8cd3e258c5029a8efedab40019d6cfd3eac379f5</id>
<content type='text'>
Allow the user to create an inference rule between
two roles. The first, called the prior role
is the role explicitly assigned to an individual.
The second, called the implied role, is one that
the user gets implicitly. For example:

Role B implies Role A.
User X is assigned Role B.
Therefore User X also assigned Role A.

The management and maintenance of the rules is
performed in the Keystone server.

Change-Id: If547c2f16e812bc7fffd742ec37e6a26011f3185
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Allow the user to create an inference rule between
two roles. The first, called the prior role
is the role explicitly assigned to an individual.
The second, called the implied role, is one that
the user gets implicitly. For example:

Role B implies Role A.
User X is assigned Role B.
Therefore User X also assigned Role A.

The management and maintenance of the rules is
performed in the Keystone server.

Change-Id: If547c2f16e812bc7fffd742ec37e6a26011f3185
</pre>
</div>
</content>
</entry>
<entry>
<title>Use cliff formattable columns in identity commands</title>
<updated>2017-08-16T21:28:27+00:00</updated>
<author>
<name>Akihiro Motoki</name>
<email>amotoki@gmail.com</email>
</author>
<published>2017-05-15T04:00:32+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=6364b7b81f362f8f4bde85d973b2c36c70bc4db2'/>
<id>6364b7b81f362f8f4bde85d973b2c36c70bc4db2</id>
<content type='text'>
Partial-Bug: #1687955
Partially implement blueprint osc-formattable-columns
Change-Id: I3f85129460ebeb177f5fdb30995bc1dcdf28c774
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Partial-Bug: #1687955
Partially implement blueprint osc-formattable-columns
Change-Id: I3f85129460ebeb177f5fdb30995bc1dcdf28c774
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Use *_as_ids instead *_as_list"</title>
<updated>2017-07-26T03:58:57+00:00</updated>
<author>
<name>Jenkins</name>
<email>jenkins@review.openstack.org</email>
</author>
<published>2017-07-26T03:58:57+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=86bda369638e53a8e9683731e7a5d432640fa813'/>
<id>86bda369638e53a8e9683731e7a5d432640fa813</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add optional parameter "user_id" and "type" to list credentials</title>
<updated>2017-07-25T14:56:50+00:00</updated>
<author>
<name>zhanghongtao</name>
<email>zhanghongtao0826@126.com</email>
</author>
<published>2017-07-25T07:48:27+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=470a1f1acfe261357fc3125b2db3bc6ec10c654e'/>
<id>470a1f1acfe261357fc3125b2db3bc6ec10c654e</id>
<content type='text'>
In keystone version 3.5, "type" optional attribute has been added
to list credentials. This patch add "user_id" and "type" optional
parameter in openstack client.

Change-Id: Ia09ee7c39204fdff2dfd7b9b606d888d007caac5
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In keystone version 3.5, "type" optional attribute has been added
to list credentials. This patch add "user_id" and "type" optional
parameter in openstack client.

Change-Id: Ia09ee7c39204fdff2dfd7b9b606d888d007caac5
</pre>
</div>
</content>
</entry>
<entry>
<title>Add domain parameter to Identity Provider</title>
<updated>2017-07-21T15:28:57+00:00</updated>
<author>
<name>Kristi Nikolla</name>
<email>knikolla@bu.edu</email>
</author>
<published>2017-06-16T19:04:40+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=77ff011ced18260242224a7317aba92d53ff1455'/>
<id>77ff011ced18260242224a7317aba92d53ff1455</id>
<content type='text'>
Identity providers are now associated with domains. This change
allows a user to specify a domain by ID or by name when creating
an identity provider. [0]

This also adds the column for Domain ID in listing.
Updating a domain for an identity provider is not supported, so
that isn't changed.

[0]. Id18b8b2fe853b97631bc990df8188ed64a6e1275

Closes-Bug: 1698390

Change-Id: Icc408e2fe88f257d5863bd3df716a777d52befcc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Identity providers are now associated with domains. This change
allows a user to specify a domain by ID or by name when creating
an identity provider. [0]

This also adds the column for Domain ID in listing.
Updating a domain for an identity provider is not supported, so
that isn't changed.

[0]. Id18b8b2fe853b97631bc990df8188ed64a6e1275

Closes-Bug: 1698390

Change-Id: Icc408e2fe88f257d5863bd3df716a777d52befcc
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix 'domain' filter not work well in some commands</title>
<updated>2017-07-18T23:01:22+00:00</updated>
<author>
<name>jiangpch</name>
<email>jiangpengcheng@navercorp.com</email>
</author>
<published>2017-07-13T08:58:00+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=a01bf55d2065ec1a98f486109cc8d315def501cd'/>
<id>a01bf55d2065ec1a98f486109cc8d315def501cd</id>
<content type='text'>
The 'domain' filter not work well in commands 'project show',
'user show' and 'user set'.

Depends-On: I490900d6249f01654d4cba43bddd3e7af7928a84
Closes-Bug: #1704097
Change-Id: Ib4f47cbaba27eb56c4a41d187fee74a995e62dc7
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The 'domain' filter not work well in commands 'project show',
'user show' and 'user set'.

Depends-On: I490900d6249f01654d4cba43bddd3e7af7928a84
Closes-Bug: #1704097
Change-Id: Ib4f47cbaba27eb56c4a41d187fee74a995e62dc7
</pre>
</div>
</content>
</entry>
<entry>
<title>When creating a trust, send role_ids instead or role_names</title>
<updated>2017-06-22T17:08:01+00:00</updated>
<author>
<name>Kristi Nikolla</name>
<email>knikolla@bu.edu</email>
</author>
<published>2017-06-16T19:33:46+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=da53c2b33457f4f1e93bdda6c0c16172ea36bc78'/>
<id>da53c2b33457f4f1e93bdda6c0c16172ea36bc78</id>
<content type='text'>
This changes create a trust to use ids instead of names because of
the possibility of roles sharing a name. Even if the user
uniquely identified a role by inputting the id, the request sent
to the identity service would used the name, therefore the command
would fail in the case that two roles share a name.

This does not change how trusts are displayed during trust list or
trust show, a name will still be shown instead of an id.

Depends-On: I38e0ac35946ee6e53128babac3ea759a380572e0

Change-Id: I5bdf89f1e288954a7f5c2704231f270bc7d196f5
Closes-Bug: 1696111
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This changes create a trust to use ids instead of names because of
the possibility of roles sharing a name. Even if the user
uniquely identified a role by inputting the id, the request sent
to the identity service would used the name, therefore the command
would fail in the case that two roles share a name.

This does not change how trusts are displayed during trust list or
trust show, a name will still be shown instead of an id.

Depends-On: I38e0ac35946ee6e53128babac3ea759a380572e0

Change-Id: I5bdf89f1e288954a7f5c2704231f270bc7d196f5
Closes-Bug: 1696111
</pre>
</div>
</content>
</entry>
<entry>
<title>Use _get_token_resource in role assignment list</title>
<updated>2017-05-23T15:16:41+00:00</updated>
<author>
<name>David Rabel</name>
<email>rabel@b1-systems.de</email>
</author>
<published>2017-05-15T16:11:37+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=0ad6b6b2e0b26ebc93a99730bcc414bf8e091759'/>
<id>0ad6b6b2e0b26ebc93a99730bcc414bf8e091759</id>
<content type='text'>
If project matches the project from access token,
we do not have to send an API request to /projects?name=...,
because the project ID is already known.
This API request may require additional permissions, so
we want to avoid it, if possible.

Change-Id: Ice1af8686bceea6b67229dcab7cf82eef821163e
Closes-Bug: #1658189
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If project matches the project from access token,
we do not have to send an API request to /projects?name=...,
because the project ID is already known.
This API request may require additional permissions, so
we want to avoid it, if possible.

Change-Id: Ice1af8686bceea6b67229dcab7cf82eef821163e
Closes-Bug: #1658189
</pre>
</div>
</content>
</entry>
<entry>
<title>Support to add/remove multi users for "group add/remove user"</title>
<updated>2017-03-21T02:39:42+00:00</updated>
<author>
<name>Huanxuan Ao</name>
<email>huanxuan.ao@easystack.cn</email>
</author>
<published>2017-03-17T05:28:49+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=ef5a7caf85bd6169701371da67029457abdaf47f'/>
<id>ef5a7caf85bd6169701371da67029457abdaf47f</id>
<content type='text'>
Similar delete commands in OSC, we can also support add/remove
multi users for one specified group, this review implement it.

Change-Id: I8ccf99d4ee83a18778fa3ff5c0a42bc7c6ff21fb
Implements: bp support-multi-add-remove
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Similar delete commands in OSC, we can also support add/remove
multi users for one specified group, this review implement it.

Change-Id: I8ccf99d4ee83a18778fa3ff5c0a42bc7c6ff21fb
Implements: bp support-multi-add-remove
</pre>
</div>
</content>
</entry>
</feed>
