Skip to content
Snippets Groups Projects
  1. Nov 30, 2018
  2. Nov 28, 2018
    • Rafal Ramocki's avatar
      Fixed path after moving wsgi/django.wsgi to wsgi.py · bf78afb6
      Rafal Ramocki authored
      Change-Id: Ia6b1c99c277c4cd5b19deae5212c7806b4b06a23
      Closes-Bug: 1791043
      (cherry picked from commit 71be92dd)
      bf78afb6
    • Mohammed Naser's avatar
      Remove "Change Password" from users table for non-admin users · d1042fda
      Mohammed Naser authored
      If you're a user without administrative permissions, you will
      not be able to edit a password using the table inside the identity
      section due to the fact that it uses a different edit API which
      is not meant to be used for the user-side of things.
      
      This patch adds a policy change in order to hide the change password
      link for normal users, while keeping the functionality inside
      the Settings panel still intact.
      
      This change was first broken by I76eb9f95c7112bcbad75ee151f363f892298d081
      
      Partial-Bug: 1788384
      Change-Id: I7a64257ac274c9dac5705ba72a85833f8e7a1591
      (cherry picked from commit 0630be63)
      d1042fda
  3. Nov 23, 2018
  4. Nov 21, 2018
  5. Nov 20, 2018
    • zhubx007's avatar
      Fix bug of updating metadata for images · a231b24b
      zhubx007 authored
      Glance project has a blueprint hidden-images. The commit can be
      seen from https://review.openstack.org/#/c/578755/
      The os_hidden is added into image metadata as bool type. From
      horizon, the string value of os_hidden is passed to glanceclient.
      https://github.com/openstack/python-glanceclient/blob/master/glanceclient/v2/images.py#L341
      But type is not correspond so raise exception to horizon from
      glanceclient.
      
      Here to change the type of os_hidden before passing it to glanceclient.
      
      Closes-Bug: #1789172
      Change-Id: I0d4edaa4b661d2da79cdb45e4afa97d826aeb65d
      (cherry picked from commit 47ba614f)
      a231b24b
    • Mathieu Gagné's avatar
      Fix django.contrib.auth.middleware monkey patching · 8851866a
      Mathieu Gagné authored
      The "request" attribute is not available in
      openstack_auth.backend.KeystoneBackend.get_user when session data is restored
      and it's the first request to happen after a server restart.
      
      As stated by the function document, the "request" attribute needs to be
      monkey-patched by openstack_auth.utils.patch_middleware_get_user
      for this function to work properly.
      
      This should happen in openstack_auth.urls at import time. But there is nowhere
      in Horizon where this module is imported at startup. It's only introspected
      by openstack_dashboard.urls due to AUTHENTICATION_URLS setting.
      
      Without this monkey-patching, the whole authentication mechanism falls back
      to "AnonymousUser" and you will get redirected to the login page due
      to horizon.exceptions.NotAuthenticated being raised by
      horizon.decorators.require_auth as request.user.is_authenticated will be False.
      
      But if a user requests a page under auth/, it will have the side-effect of
      monkey-patching django.contrib.auth.middleware as expected. This means that
      once this request is completed, all following requests to pages other than
      the ones under auth/ will have there sessions properly restored and
      you will be properly authenticated.
      
      Therefore this change introduces a dummy middleware which sole purpose is
      to perform this monkey-patching as early as possible.
      
      There is also some cleanup to get rid of the previous attempts at
      monkeypatching.
      
      Closes-bug: #1764622
      
      Conflicts:
      	openstack_dashboard/settings.py
      	openstack_dashboard/test/helpers.py
      
      Change-Id: Ib9912090a87b716e7f5710f6f360b0df168ec2e3
      (cherry picked from commit 0d163613)
      8851866a
  6. Nov 10, 2018
  7. Nov 08, 2018
  8. Oct 31, 2018
  9. Oct 30, 2018
  10. Oct 29, 2018
    • Guang Yee's avatar
      support WEBSSO_KEYSTONE_URL · ac7f6e4d
      Guang Yee authored
      Add a new optional WEBSSO_KEYSTONE_URL property to facilitate WEBSSO
      deployments where network segmentation is used per security requirement.
      In this case, the controllers are not reachable from public network.
      Therefore, user's browser will not be able to reach OPENSTACK_KEYSTONE_URL
      if it is set to the internal endpoint.
      
      If WEBSSO_KEYSTONE_URL is set, it will be used instead of
      OPENSTACK_KEYSTONE_URL.
      
      Change-Id: I05ea4227aa4c2cb0a73015ed7fd29cf1a96e696a
      Closes-bug: #1544703
      (cherry picked from commit a53f012f)
      ac7f6e4d
  11. Oct 18, 2018
  12. Sep 27, 2018
  13. Sep 14, 2018
  14. Sep 13, 2018
  15. Sep 10, 2018
  16. Sep 09, 2018
  17. Sep 05, 2018
  18. Sep 01, 2018
  19. Aug 28, 2018
  20. Aug 25, 2018
  21. Aug 21, 2018
  22. Aug 20, 2018
  23. Aug 17, 2018
  24. Aug 16, 2018
Loading