Reviewed: https://review.openstack.org/621022 Committed: https://git.openstack.org/cgit/openstack/keystone/commit/?id=1d4e40252884f054d692e82e170d3f69228ef7ee Submitter: Zuul Branch: master
commit 1d4e40252884f054d692e82e170d3f69228ef7ee Author: Lance Bragstad <lbrags...@gmail.com> Date: Thu Nov 29 21:01:52 2018 +0000 Update limit policies for system admin This change makes the policy definitions for admin limit operations consistent with the other limit policies. Subsequent patches will incorporate: - domain user test coverage - project user test coverage Change-Id: Id3f6159af505fbe81ff83cfaa346f2178f2d8e77 Closes-Bug: 1805372 Related-Bug: 1805880 ** Changed in: keystone Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1805372 Title: Limit and registered limit API don't use default roles Status in OpenStack Identity (keystone): Fix Released Bug description: In Rocky, keystone implemented support to ensure at least three default roles were available [0]. The limits and registered limits API don't incorporate these defaults into its default policies [1], but they should. [0] http://specs.openstack.org/openstack/keystone-specs/specs/keystone/rocky/define-default-roles.html [1] http://git.openstack.org/cgit/openstack/keystone/tree/keystone/common/policies/limit.py?id=fb73912d87b61c419a86c0a9415ebdcf1e186927 To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1805372/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp