<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/openstack/python-openstackclient.git/openstackclient/tests/common, branch newton-eol</title>
<subtitle>opendev.org: openstack/python-openstackclient
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/'/>
<entry>
<title>Allow setting quotas for server groups and server group members</title>
<updated>2016-07-27T10:04:36+00:00</updated>
<author>
<name>Elena Ezhova</name>
<email>eezhova@mirantis.com</email>
</author>
<published>2016-07-12T11:38:48+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=b50c2b6a8847219ec6d3916f429dec77cf2ba180'/>
<id>b50c2b6a8847219ec6d3916f429dec77cf2ba180</id>
<content type='text'>
Adds support of --server-groups and --server-group-members options
to the "quota set" command.

Change-Id: I178d1e267d010be7e908adefcf3b15abdafd9da4
Closes-Bug: #1602223
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Adds support of --server-groups and --server-group-members options
to the "quota set" command.

Change-Id: I178d1e267d010be7e908adefcf3b15abdafd9da4
Closes-Bug: #1602223
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Use assertEqual() instead of assertDictEqual()"</title>
<updated>2016-07-26T12:51:06+00:00</updated>
<author>
<name>Jenkins</name>
<email>jenkins@review.openstack.org</email>
</author>
<published>2016-07-26T12:51:06+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=01817092224888698095749b7fbfffc7d424b56a'/>
<id>01817092224888698095749b7fbfffc7d424b56a</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Standardize import format"</title>
<updated>2016-07-26T07:22:27+00:00</updated>
<author>
<name>Jenkins</name>
<email>jenkins@review.openstack.org</email>
</author>
<published>2016-07-26T07:22:27+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=566b8566c00447b8ee8519debde56ddf0e7bf4cf'/>
<id>566b8566c00447b8ee8519debde56ddf0e7bf4cf</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Use assertEqual() instead of assertDictEqual()</title>
<updated>2016-07-25T07:09:49+00:00</updated>
<author>
<name>Tang Chen</name>
<email>chen.tang@easystack.cn</email>
</author>
<published>2016-07-25T07:09:49+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=bcaa5c2e0ea7d2f6390aba1debbe026c1599a0b2'/>
<id>bcaa5c2e0ea7d2f6390aba1debbe026c1599a0b2</id>
<content type='text'>
In unittest2, assertDictEqual() is implemented by
using != operator to compare two dicts. So is
assertEqual() in testtools. assertEqual() in
testtools is able to handle dict, list, set and
so on. So we just call assertEqual() to make the
unit tests simpler.

Change-Id: Ice343b2ce468acae39d2ad79f7121503e3627656
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In unittest2, assertDictEqual() is implemented by
using != operator to compare two dicts. So is
assertEqual() in testtools. assertEqual() in
testtools is able to handle dict, list, set and
so on. So we just call assertEqual() to make the
unit tests simpler.

Change-Id: Ice343b2ce468acae39d2ad79f7121503e3627656
</pre>
</div>
</content>
</entry>
<entry>
<title>Rework clientmanager</title>
<updated>2016-07-22T20:49:18+00:00</updated>
<author>
<name>Dean Troyer</name>
<email>dtroyer@gmail.com</email>
</author>
<published>2016-05-13T21:53:44+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=f38c51c1b90576e6b13ac6086386884c09f5813a'/>
<id>f38c51c1b90576e6b13ac6086386884c09f5813a</id>
<content type='text'>
* Add compatibility for plugin v2 interface removed from osc-lib
* ClientManager.is_network_endpoint_enabled() is wrapper for
  new is_service_available()

Change-Id: I6f26ce9e4d0702f50c7949bacfbeeb0f98cddb5d
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Add compatibility for plugin v2 interface removed from osc-lib
* ClientManager.is_network_endpoint_enabled() is wrapper for
  new is_service_available()

Change-Id: I6f26ce9e4d0702f50c7949bacfbeeb0f98cddb5d
</pre>
</div>
</content>
</entry>
<entry>
<title>Standardize import format</title>
<updated>2016-07-22T11:24:02+00:00</updated>
<author>
<name>shizhihui</name>
<email>zhihui.shi@easystack.cn</email>
</author>
<published>2016-07-21T04:14:45+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=f996138a0d0c1ea16a1c3e90e63eedcf8fa53148'/>
<id>f996138a0d0c1ea16a1c3e90e63eedcf8fa53148</id>
<content type='text'>
According to the rule in
http://docs.openstack.org/developer/hacking/#imports
I modify some irregular import format.

Change-Id: Ibf29ccaf3ddec4a956334cc3368ebee7a66e282c
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
According to the rule in
http://docs.openstack.org/developer/hacking/#imports
I modify some irregular import format.

Change-Id: Ibf29ccaf3ddec4a956334cc3368ebee7a66e282c
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "osc-lib: api.auth"</title>
<updated>2016-07-07T19:49:06+00:00</updated>
<author>
<name>Jenkins</name>
<email>jenkins@review.openstack.org</email>
</author>
<published>2016-07-07T19:49:06+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=2adeac2bc2421a96273dfbc2b39a43cc06e542e6'/>
<id>2adeac2bc2421a96273dfbc2b39a43cc06e542e6</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>osc-lib: api.auth</title>
<updated>2016-06-30T13:57:59+00:00</updated>
<author>
<name>Dean Troyer</name>
<email>dtroyer@gmail.com</email>
</author>
<published>2016-06-23T20:39:48+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=d324530532d5361e85e784c3df2f0d40a128b149'/>
<id>d324530532d5361e85e784c3df2f0d40a128b149</id>
<content type='text'>
Move auth plugin checking to osc-lib.

Change-Id: I673d9c2d6e8bbf724c3000459a729e831d747814
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Move auth plugin checking to osc-lib.

Change-Id: I673d9c2d6e8bbf724c3000459a729e831d747814
</pre>
</div>
</content>
</entry>
<entry>
<title>Improve masking of secrets in configuration show</title>
<updated>2016-06-21T06:56:23+00:00</updated>
<author>
<name>Alvaro Lopez Garcia</name>
<email>aloga@ifca.unican.es</email>
</author>
<published>2016-06-20T10:37:22+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=1de4c66009485b6e42791ac84684da7b5a1f0736'/>
<id>1de4c66009485b6e42791ac84684da7b5a1f0736</id>
<content type='text'>
The command "configuration show" tries to redact some of the secrets
that are shown on the screen. However, this failed redacting options
that were marked as secrete by the auth plugins (if any) and it redacted
other options that were not redacted at all. For example, when using
the OpenID Connect plugins, it redacted the "access_token_endpoint" as
the word "token" appears there, but it failed to redact "client_secret"
even when this option is marked as secret in the corresponding plugin.

Change-Id: Idfad4fbbe5ddcff5e729e1dcd756d0379ad31dee
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The command "configuration show" tries to redact some of the secrets
that are shown on the screen. However, this failed redacting options
that were marked as secrete by the auth plugins (if any) and it redacted
other options that were not redacted at all. For example, when using
the OpenID Connect plugins, it redacted the "access_token_endpoint" as
the word "token" appears there, but it failed to redact "client_secret"
even when this option is marked as secret in the corresponding plugin.

Change-Id: Idfad4fbbe5ddcff5e729e1dcd756d0379ad31dee
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not prompt for scope options with default scoped tokens</title>
<updated>2016-06-17T16:37:15+00:00</updated>
<author>
<name>Dolph Mathews</name>
<email>dolph.mathews@gmail.com</email>
</author>
<published>2016-06-15T16:26:35+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-openstackclient.git/commit/?id=fe0c8e955be0331aef9cc6847c9bddc43ce66d92'/>
<id>fe0c8e955be0331aef9cc6847c9bddc43ce66d92</id>
<content type='text'>
This changes the scope validation to occur after a token has already
been created.

Previous flow:

1. Validate authentication options.
2. Validate authorization options if the command requires a scope.
3. Create a token (using authentication + authorization options)
4. Run command.

This means that scope was being checked, even if a default scope was
applied in step 3 by Keystone.

New flow:

1. Validate authentication options.
2. Create token (using authentication + authorization options)
3  Validate authorization options if the command requires a scope and
   the token is not scoped.
4. Run command.

Change-Id: Idae368a11249f425b14b891fc68b4176e2b3e981
Closes-Bug: 1592062
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This changes the scope validation to occur after a token has already
been created.

Previous flow:

1. Validate authentication options.
2. Validate authorization options if the command requires a scope.
3. Create a token (using authentication + authorization options)
4. Run command.

This means that scope was being checked, even if a default scope was
applied in step 3 by Keystone.

New flow:

1. Validate authentication options.
2. Create token (using authentication + authorization options)
3  Validate authorization options if the command requires a scope and
   the token is not scoped.
4. Run command.

Change-Id: Idae368a11249f425b14b891fc68b4176e2b3e981
Closes-Bug: 1592062
</pre>
</div>
</content>
</entry>
</feed>
