Skip to content
This repository has been archived by the owner on Apr 27, 2022. It is now read-only.

Keystone: admins needn't be in the db #646

Merged
merged 1 commit into from
Aug 23, 2016

Conversation

zenhack
Copy link
Contributor

@zenhack zenhack commented Aug 21, 2016

...otherwise bootstrapping is hard.

Per our discussion on #615.

//cc @henn, @gsilvis, @knikolla

@zenhack
Copy link
Contributor Author

zenhack commented Aug 22, 2016

Just realized a fairly glaring error in my test; will fix when I get back to my machine.

Openstack projects.
Openstack projects. This is true even for projects not that do not exist
within HaaS; such projects will not be able to own resources (such as
nodes networks, etc), but may preform admin-only operations (such as
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

preform=perform

@henn
Copy link
Contributor

henn commented Aug 22, 2016

Looks good with the anticipated test change.

In addition to a positive test checking that a different project-admin can access stuff, would it be possible to add a negative test too that ensures a regular user with authorization to a non-HIL project can't access anything?

...otherwise bootstrapping is hard.
@zenhack zenhack force-pushed the keystone-admin-bootstrapping branch from 9ec1a2f to 6f1b88f Compare August 23, 2016 02:12
@zenhack
Copy link
Contributor Author

zenhack commented Aug 23, 2016

@henn, just fixed the typo and the test, and pushed. Tests pass on my local machine, just waiting on travis.

re: the test you propose, I believe this is what test_anyone_call_unknown_project does. Let me know if I've misunderstood what you're asking for.

@gsilvis
Copy link
Contributor

gsilvis commented Aug 23, 2016

Looks good. +1

@knikolla
Copy link
Contributor

+1, merging.

@knikolla knikolla merged commit 1015ba6 into CCI-MOC:master Aug 23, 2016
@zenhack zenhack deleted the keystone-admin-bootstrapping branch May 23, 2017 22:06
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants