- 15 Aug, 2022 1 commit
-
-
Thomas Goirand authored
(Closes: #1017288).
-
- 28 Jul, 2022 1 commit
-
-
Thomas Goirand authored
test_site_branding_tag().
-
- 05 Jul, 2022 1 commit
-
-
Thomas Goirand authored
-
- 03 Jul, 2022 1 commit
-
-
Thomas Goirand authored
-
- 29 Jun, 2022 4 commits
-
-
Thomas Goirand authored
-
Thomas Goirand authored
-
Thomas Goirand authored
-
Thomas Goirand authored
-
- 29 Mar, 2022 2 commits
-
-
Thomas Goirand authored
-
Thomas Goirand authored
horizon 22.1.0 release meta:version: 22.1.0 meta:diff-start: - meta:series: yoga meta:release-type: release meta:pypi: no meta:first: no meta:release:Author: manchandavishal <manchandavishal143@gmail.com> meta:release:Commit: manchandavishal <manchandavishal143@gmail.com> meta:release:Change-Id: I1b67d5b258bc0642f4d75db0e6db29bab38a0cec meta:release:Code-Review+2: Elod Illes <elod.illes@est.tech> meta:release:Code-Review+2: Thierry Carrez <thierry@openstack.org> meta:release:Workflow+1: Thierry Carrez <thierry@openstack.org>
-
- 27 Mar, 2022 1 commit
-
-
Thomas Goirand authored
-
- 25 Mar, 2022 5 commits
-
-
Akihiro Motoki authored
keystone does not distinguish public and admin endpoints since Train [1], so there is no need to use a separate endpoint for keystone admin operations. admin endpoint still can be configured but there is no functional difference anymore from other endpoints. We do not need to require admin endpoint and can use an endpoint specified by OPENSTACK_ENDPOINT_TYPE for all API operations. This commit reverts commit f9bab3fe as we no longer need the workaround. [1] https://review.opendev.org/c/openstack/keystone/+/664246 Closes-Bug: #1950659 Change-Id: I2660fd2df8081e1d2d9c84626037f94bd9d137a5
-
Thomas Goirand authored
applied upstream.
-
Thomas Goirand authored
-
Thomas Goirand authored
-
Thomas Goirand authored
horizon 22.0.0 release meta:version: 22.0.0 meta:diff-start: - meta:series: yoga meta:release-type: release meta:pypi: no meta:first: no meta:release:Author: manchandavishal <manchandavishal143@gmail.com> meta:release:Commit: Vishal Manchanda <manchandavishal143@gmail.com> meta:release:Change-Id: I1a1d899649c62c36eb8293d2466cbb74b5bfd5e5 meta:release:Code-Review+2: Elod Illes <elod.illes@est.tech> meta:release:Code-Review+2: Hervé Beraud <herveberaud.pro@gmail.com> meta:release:Workflow+1: Hervé Beraud <herveberaud.pro@gmail.com>
-
- 24 Mar, 2022 1 commit
-
-
Radomir Dopieralski authored
Since not all services are ready to use the system scope token, we need a way to disable and enable the use of system scope token on a per-service basis. This setting let us configure which services should use the system scope token. By default the list is empty and system scope token is not used at all. Change-Id: I5e0cdc7288221571f183a37b800c19dc4cff5707 (cherry picked from commit 6c814b24)
-
- 23 Mar, 2022 2 commits
-
-
OpenStack Release Bot authored
Update the URL to the upper-constraints file to point to the redirect rule on releases.openstack.org so that anyone working on this branch will switch to the correct upper-constraints list automatically when the requirements repository branches. Until the requirements repository has as stable/yoga branch, tests will continue to use the upper-constraints list on master. Change-Id: Ibc72b044a3d0788e3515c7ea1a02899206381010
-
OpenStack Release Bot authored
Change-Id: I712cb15d54255256f918acf46123332bf82334eb
-
- 21 Mar, 2022 1 commit
-
-
manchandavishal authored
This patch updates default policy-in-code rules in horizon based on nova/neutron/keystone/glance/cinder RC deliverables. It also bumps a few packages versions in lower-constraints.txt and requirements.txt to fix the failed lower-constraints job after updating policy rules. Change-Id: I168bb171076e3442b29670461a29d12c9988df52
-
- 12 Mar, 2022 3 commits
- 10 Mar, 2022 2 commits
- 09 Mar, 2022 1 commit
-
-
Akihiro Motoki authored
https://review.opendev.org/c/openstack/horizon/+/830630 dropped mock_server_get.return_value by mistake. This commit recovers it. Change-Id: Icedb1d206aca1c8eeac51e76b3c92c26b40f0806
-
- 08 Mar, 2022 2 commits
- 07 Mar, 2022 1 commit
-
-
Zuul authored
-
- 04 Mar, 2022 2 commits
-
-
Akihiro Motoki authored
commit d269b164 fixes the bug on the resize server form, but it introduced an extra flavor_get call even when we retrieve the list of flavors. This commit recovers the previous behavior that we first looks up the list of flavors. Related-Bug: #1940834 Change-Id: I891aa6b8652f330326535732d0886362dfabb989
-
Keigo Noha authored
Previously, ToggleSuspend class checked 'os-rescue' policy for resuming an instance. To align to resume operation, this fix changes to 'os-suspend-server:resume'. Closes-Bug: #1963652 Change-Id: If6386ecdb81fb1f0d88dab447ee81c251b9857b7
-
- 03 Mar, 2022 2 commits
- 28 Feb, 2022 5 commits
-
-
Hugo Brito authored
The Multiple Simultaneous Logins Control is a feature designed for securing Horizon dashboard sessions. The default Horizon configuration allows the same user to login several times (e.g. different browsers) simultaneously, that is, the same user can have more than one active session for Horizon dashboard. When there is the need to control the active sessions that one user can have simultaneously, it will be possible to configure the Horizon dashboard to disallow more than one active session per user. When multiple simultaneously sessions are disabled, the most recent authenticated session will be considered the valid one and the previous session will be invalidated. The following manual tests encompass both simulteaneous session control configuration: 'allow' and 'disconnect' and were verified with this code change before submitting it: Test Plan: PASS: Verify that a user is able to login to Horizon dashboard (when configuration is 'disconnect') PASS: Verify that a user is able to start a second Horizon dashboard session and the first session is finished (when configuration is 'disconnect') Failure Path: PASS: Verify that when a user fails to authenticate a second Horizon dashboard session the first session stills active (when configuration is 'disconnect') Regression: PASS: Verify that a user is able to login to Horizon dashboard (when configuration is default: 'allow') PASS: Verify that a user is able to start multiple simultaneous Horizon dashboard sessions (when configuration is default: 'allow') Implements: blueprint handle-multiple-login-sessions-from-same-user-in-horizon Signed-off-by:
Hugo Brito <hugo.brito@windriver.com> Co-authored-by:
Thales Elero Cervi <thaleselero.cervi@windriver.com> Change-Id: I8462aa98398dd8f27fe24d911c9bfaa7f303eb93
-
Thomas Goirand authored
-
Thomas Goirand authored
-
Thomas Goirand authored
horizon 21.0.0 release meta:version: 21.0.0 meta:diff-start: - meta:series: yoga meta:release-type: release meta:pypi: no meta:first: no meta:release:Author: manchandavishal <manchandavishal143@gmail.com> meta:release:Commit: manchandavishal <manchandavishal143@gmail.com> meta:release:Change-Id: If0e5f0b1314f99c0e6bc6f6a841651345a19e158 meta:release:Code-Review+2: Hervé Beraud <herveberaud.pro@gmail.com> meta:release:Code-Review+2: Elod Illes <elod.illes@est.tech> meta:release:Workflow+1: Elod Illes <elod.illes@est.tech>
-
Zuul authored
-
- 25 Feb, 2022 2 commits