Re: [openstack-dev] [all][tc][swift][designate] New language addition process has been approved

2017-02-08 Thread Coles, Alistair
> -Original Message- > From: Flavio Percoco [mailto:fla...@redhat.com] > Sent: 08 February 2017 13:49 > To: openstack-dev@lists.openstack.org > Subject: Re: [openstack-dev] [all][tc][swift][designate] New language addition > process has been approved > > On 19/01/17 11:59 +0100, Flavio

Re: [openstack-dev] [all][infra] Proposed changes to unit-test setup

2016-11-24 Thread Coles, Alistair
On 22 November 2016 18:56, John Dickinson wrote: > > On 22 Nov 2016, at 10:47, Andreas Jaeger wrote: > > > When we (infra) changed the unit test jobs to not set up databases by > > default, we created special python-db and tox-db jobs that set up both > > MySQL and PostgreSQL databases. And

Re: [openstack-dev] [swift][keystone] Using JSON as future ACL format

2016-06-10 Thread Coles, Alistair
Thai, (repeating some of what we have discussed in private for others' benefit) The Swift docs state "Be sure to use Keystone UUIDs rather than names in container ACLs" [1]. The guidance is re-iterated here [2] "...names must no longer be used in cross-tenant ACLs...". They then go on to

Re: [openstack-dev] [swift] Account ACL with keystone auth

2016-02-22 Thread Coles, Alistair
Account ACL in Swift is not supported with keystoneauth. It is not described in the keystone auth section of [1]. You can probably achieve similar by assigning the appropriate roles to users in keystone. [1] http://docs.openstack.org/developer/swift/overview_auth.html Alistair From: Sampath,

Re: [openstack-dev] V3 Authentication for swift store

2015-06-23 Thread Coles, Alistair
Jamie - thanks for the link to your blog. I remember the Paris discussion :) And also noted the Vancouver discussion re. SDK not necessarily being targeted at service-service interactions. I sense there is renewed desire to maintain improve swiftclient, and a few of us are interested in

Re: [openstack-dev] V3 Authentication for swift store

2015-06-18 Thread Coles, Alistair
-Original Message- From: Jamie Lennox [mailto:jamielen...@redhat.com] Sent: 18 June 2015 07:02 To: OpenStack Development Mailing List (not for usage questions) Subject: [openstack-dev] [glance] V3 Authentication for swift store Hey everyone, TL;DR: glance_store requires a way

[openstack-dev] [oslo] usage patterns for oslo.config

2014-08-08 Thread Coles, Alistair
I've been looking at the implications of applying oslo.config in Swift, and I have a question about the best pattern for registering options. Looking at how keystone uses oslo.config, the pattern seems to be to have all options declared and registered 'up-front' in a single place

Re: [openstack-dev] [Keystone] [Swift] Question re. keystone domains

2014-07-02 Thread Coles, Alistair
AM, Coles, Alistair alistair.co...@hp.commailto:alistair.co...@hp.com wrote: We have a change [1] under review in Swift to make access control lists compatible with migration to keystone v3 domains. The change makes two assumptions that I’d like to double-check with keystone folks: 1

[openstack-dev] [Keystone] [Swift] Question re. keystone domains

2014-07-01 Thread Coles, Alistair
We have a change [1] under review in Swift to make access control lists compatible with migration to keystone v3 domains. The change makes two assumptions that I'd like to double-check with keystone folks: 1. That a project can never move from one domain to another. 2. That the

Re: [openstack-dev] Facing an issue in swift

2014-04-02 Thread Coles, Alistair
In my experience 'Endpoint for object-store not found - have you specified a region?' can be returned by swift client if: (a) You have specified a region that isn't found among the service endpoints e.g. % swift --os-auth-url http://example:5000/v2.0 --os-password=testing stat

[openstack-dev] [Swift] container forwarding/cluster federation blueprint

2013-10-11 Thread Coles, Alistair
We've just committed a first set of patches to gerrit that address this blueprint: https://blueprints.launchpad.net/swift/+spec/cluster-federation Quoting from that page: The goal of this work is to enable account contents to be dispersed across multiple clusters, motivated by (a) accounts