That policy.json is about keystone/keystone-client project
On Wed, Feb 27, 2013 at 3:21 AM, Zach Antonas zanto...@gmail.com wrote:
Hi Kevin,
Is there any Swift documentation for this? I can't find any example
policy.json parameters for Swift.
Thanks,
Zach
On 26/02/2013 18:43, Kevin
Hi all,
In auth_token (at keystoneclient middleware), if we config like below:
auth_uri = http://localhost:5000/
(without auth_protocal setting which default https)
or like below
auth_uri = http://localhost:5000/
auth_protocal = http
Which one SHOULD works?
The first one is brief but doesn't
-compute/admin/content/certificates-for-pki.html
Anne
On Sat, Feb 23, 2013 at 12:27 PM, Kun Huang academicgar...@gmail.comwrote:
Hi, all
My token generated by curling http://localhost:35357/v2.0/tokens is too
long...
Nearly 4000 chars in this token. I have change the max_token_size
.
The admin role is the configuration of keysoneauth.
[filter:keystoneauth]
use = egg:swift#keystoneauth
operator_roles = admin, swiftoperator
2013/2/23 Kun Huang academicgar...@gmail.com
Back to my first question, should I create admin_user, admin_password,
admin_tenant_name by keystone command
Back to my first question, should I create admin_user, admin_password,
admin_tenant_name by keystone command myself?
On Fri, Feb 22, 2013 at 9:02 AM, Kun Huang academicgar...@gmail.com wrote:
Dolph, thanks your advice, but in my environment, both below two case
1. setting admin_token
the admin_user,
admin_password, and admin_tenant_name values by specifying a static token.
I'd recommend removing it and using the auth credentials you've already
provided.
-Dolph
On Thu, Feb 21, 2013 at 3:10 AM, Kun Huang academicgar...@gmail.comwrote:
Following another question:
In document
the admin_user,
admin_password, and admin_tenant_name values by specifying a static token.
I'd recommend removing it and using the auth credentials you've already
provided.
-Dolph
On Thu, Feb 21, 2013 at 3:10 AM, Kun Huang academicgar...@gmail.comwrote:
Following another question:
In document
but no success: return error (ie
return None, None, None)
Got 507 from a server: skip that server for this an subsequent requests
(ie error_limit) and carry on
--John
On Feb 12, 2013, at 4:11 AM, Kun Huang academicgar...@gmail.com wrote:
Hi, Chmouel and Darrell
I know you're working on /swift
Hi, Chmouel and Darrell
I know you're working on /swift/proxy/controllers/base.py for this bug:
https://review.openstack.org/#/c/21563/
I didn't know the
https://github.com/openstack/swift/blob/master/swift/proxy/controllers/base.py#L371
to
#372. Could you show me a simple understanding?
Hi, swift developers
I found the script /usr/local/bin/swift is:
#!/usr/bin/python -u
# EASY-INSTALL-DEV-SCRIPT: 'python-swiftclient==1.3.0.4.gb5f222b','swift'
__requires__ = 'python-swiftclient==1.3.0.4.gb5f222b'
from pkg_resources import require;
please press star 1 to join the conference or .
what is star 1? I try 1 and * 1 but failed .
On Wed, Jan 16, 2013 at 12:30 AM, Nicolae Paladi n.pal...@gmail.com wrote:
Hi,
Unfortunately I might not be able to attend the meetup tonight (evening in
Sweden), but would be glad to
go
Hi,all
I build a swift server with default tempauth accourding to
http://docs.openstack.org/developer/swift/development_saio.html. And my
problem is about accounts.
In the conf, here are first four accounts:
use = egg:swift#tempauth
user_admin_admin = admin .admin .reseller_admin
Thanks, Adrian! I have no questions any more.
On Mon, Jan 14, 2013 at 12:36 AM, Adrian Smith adr...@17od.com wrote:
Hi Kun,
I got user_login1_login2 = password privileges from
http://www.stephenbroeker.com/2012/03/28/openstack-swift-tempauth-module/,
but what's different from login1
Hi, all:
In this wiki, http://wiki.openstack.org/Nova/Rootwrap, the part of
security model results in This chain ensures that the nova user itself
is not in control of the configuration or modules used by the nova-rootwrap
executable. I understand that chain but I`m confused with this conclusion.
Thanks, Thierry Carrez. Your explanation is easy to understand. I have got
why we need such a mechanism.
BTW, is root-wrap a general or popular way to keep security? I have no
experience on security, but I have heard the *root *should be banned
because of security. Ideally, should we ban *root
15 matches
Mail list logo