1. 14 Sep, 2022 2 commits
    • Thomas Goirand's avatar
      Now packaging 22.0.0_rc1 · e7cf4d98
      Thomas Goirand authored
      e7cf4d98
    • Thomas Goirand's avatar
      Merge tag '22.0.0_rc1' into debian/zed · 9bfdb183
      Thomas Goirand authored
      keystone 22.0.0.0rc1 release candidate
      
      meta:version: 22.0.0.0rc1
      meta:diff-start: -
      meta:series: zed
      meta:release-type: release candidate
      meta:pypi: no
      meta:first: no
      meta:release:Author: Elod Illes <elod.illes@est.tech>
      meta:release:Commit: Elod Illes <elod.illes@est.tech>
      meta:release:Change-Id: I4e30d400c08b7820e254241f67541d3f75d58104
      meta:release:Code-Review+1: Douglas Mendizábal <dmendiza@redhat.com>
      meta:release:Code-Review+2: Elod Illes <elod.illes@est.tech>
      meta:release:Code-Review+2: Hervé Beraud <herveberaud.pro@gmail.com>
      meta:release:Workflow+1: Hervé Beraud <herveberaud.pro@gmail.com>
      9bfdb183
  2. 08 Sep, 2022 1 commit
  3. 30 Aug, 2022 1 commit
    • Bence Romsics's avatar
      Fix host:port handling · 6c35b366
      Bence Romsics authored
      When we check the EC2 signature without the port part of the host value
      received, we should properly split host:port. Keep in mind the splitting
      should work for values like [fc00::]:123 too.
      
      Change-Id: I1d90dfcea3568e2a9b22069daa428ea6a2a38bd6
      Closes-Bug: #1988168
      6c35b366
  4. 26 Aug, 2022 1 commit
  5. 29 Jul, 2022 2 commits
  6. 25 Jul, 2022 2 commits
  7. 02 Jul, 2022 1 commit
  8. 01 Jul, 2022 1 commit
  9. 21 Jun, 2022 1 commit
    • Ade Lee's avatar
      Move fips job to centos-9 · 950dd5e5
      Ade Lee authored
      Move FIPS job to centos 9 and add new required nslookup_target variable.
      
      Change-Id: Ifef262cfca4ecb8ad1222da3c43e5749f40c1f24
      950dd5e5
  10. 20 Jun, 2022 3 commits
    • Stephen Finucane's avatar
      docs: Update docs to reflect migration to Alembic · d88439c6
      Stephen Finucane authored
      
      
      Change-Id: Iabc8cd0746871ea6ab81af9d3f0149644a489f3d
      Signed-off-by: default avatarStephen Finucane <stephenfin@redhat.com>
      d88439c6
    • Stephen Finucane's avatar
      sql: Integrate alembic · f174b4fa
      Stephen Finucane authored
      
      
      Switch to alembic for real by integrating it into the 'db sync' command
      flow. From a user-facing perspective, things should remain pretty much
      the same as before, with the key difference being that version
      information (i.e. what's shown by 'keystone-manage db_sync --check' or
      'keystone-manage db_version') will now take the form of a hash rather
      than an integer. There are a few differences for contributors however.
      The changes are described in the included release note and
      documentation.
      
      Note that there are a couple of important design decisions here that are
      worth examining:
      
      - We drop the idea of the 'data_migration' branch entirely and the
        'keystone-manage db_sync --migrate' command is now a no-op. Neutron
        doesn't do data migrations like we do and yet they manage just fine.
        Dropping this gets us closer to neutron's behavior, which is a good
        thing for users.
      
      - We haven't re-added the ability to specify a version when doing
        'db_sync'. Neutron has this, but the logic needed to get this working
        is complex and of questionable value. We've managed without the
        ability to sync to a version since Newton and can continue to do so
        until someone asks for it (and does the work).
      
      - sqlalchemy-migrate is not removed entirely. Instead, upon doing a
        'db_sync' we will apply all sqlalchemy-migrate migrations up to the
        final '079_expand_update_local_id_limit' migration and dummy apply the
        initial alembic migration, after which we will switch over to alembic.
        In a future release we can remove the sqlalchemy-migrate migrations
        and rely entirely on alembic. Until then, keeping this allows fast
        forward upgrades to continue as a thing.
      
      - Related to the above, we always apply *all* sqlalchemy-migrate
        migrations when calling 'db_sync', even if this command is called with
        e.g. '--expand' (meaning only apply the expand branch). This is
        because there is at most one "real" migration to apply, the Xena-era
        '079_expand_update_local_id_limit' migration, which is an expand-only
        migration. There is no risk to applying the empty "data_migration" and
        "contract" parts of this migration, and applying everything in one go
        results in *much* simpler logic.
      
      Future changes will update documentation and add developer tooling for
      (auto-)generating new migrations, a la 'neutron-db-manage revision'.
      
      Change-Id: Ia376cb87f5159a4e79e2cfbab8442b6bcead708f
      Signed-off-by: default avatarStephen Finucane <stephenfin@redhat.com>
      f174b4fa
    • Stephen Finucane's avatar
      tests: Don't monkeypatch functions · 0916df35
      Stephen Finucane authored
      
      
      We were inadvertently monkeypatching a variety of functions in
      'keystone.common.sql.upgrades'. We should be configuring mocks for these
      that we teardown at the end of the test. This has been an issue since we
      first added these tests way back in change
      I9f138fe0bcbf5ffbb98e6fcebd7d897329a301b7. Fix it now.
      
      Change-Id: I185420e6d16276e7d184146f6a38b098abc00b25
      Signed-off-by: default avatarStephen Finucane <sfinucan@redhat.com>
      Suggested-by: default avatarMike Bayer <mike_mp@zzzcomputing.com>
      0916df35
  11. 17 Jun, 2022 3 commits
  12. 14 Jun, 2022 1 commit
    • Yi Feng's avatar
      OAuth2.0 Client Credentials Grant Flow Support · b554576f
      Yi Feng authored
      The OAuth2.0 Access Token API is added, support to get an OAuth2.0
      access token from the keystone identity server with application
      credentials.
      
      Change-Id: I4c54649a51534637be831450afc32d3ef8644ee5
      b554576f
  13. 13 Jun, 2022 1 commit
  14. 03 Jun, 2022 2 commits
  15. 26 May, 2022 1 commit
  16. 22 May, 2022 1 commit
  17. 16 May, 2022 1 commit
  18. 11 May, 2022 1 commit
  19. 30 Apr, 2022 1 commit
  20. 29 Apr, 2022 1 commit
  21. 25 Apr, 2022 1 commit
    • Marcin Wilk's avatar
      Add service_type config info for access rules · 3856cbf1
      Marcin Wilk authored
      The service_type config param is crucial to successfully use
      application credentials with access rules.
      
      Closes-Bug: #1950464
      Change-Id: I98d1cfcbd229f2939d900861f453efa996466c32
      3856cbf1
  22. 22 Apr, 2022 4 commits
  23. 14 Apr, 2022 2 commits
  24. 07 Apr, 2022 1 commit
  25. 05 Apr, 2022 1 commit
  26. 30 Mar, 2022 1 commit
  27. 25 Mar, 2022 1 commit
  28. 18 Mar, 2022 1 commit