api.keystone.is_cloud_admin/is_domain_admin do not work with the latest policy from keystone repo
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Dashboard (Horizon) |
Fix Released
|
Critical
|
Radomir Dopieralski | ||
django-openstack-auth |
New
|
Undecided
|
Vladislav Kuzmin |
Bug Description
openstack_
During the policy-in-code work, keystone drops "default" policy (which was "rule:admin_
is_cloud_admin() and is_domain_admin() refer to "cloud_admin" and "admin_
Previously a policy check fallbacks to "default" rule (i.e., "admin_required") and as a result both Is_cloud_admin() and is_domain_admin() checks "admin_required".
Now the keystone default policy has no "default" rule. As a result is_cloud_admin() and is_doman_admin() always returns False. This means some admin-ness panels do not work.
IIUC, the horizon policy framework intend to work with the default policies from back-end services.
The current situation should be fixed until Queens release.
Changed in horizon: | |
importance: | Undecided → Critical |
milestone: | none → queens-3 |
Changed in horizon: | |
status: | Incomplete → New |
Changed in horizon: | |
assignee: | nobody → Radomir Dopieralski (deshipu) |
Changed in django-openstack-auth: | |
assignee: | nobody → Vladislav Kuzmin (vkuzmin-u) |
There were some discussions around this in the team meeting last week [1][2]. eavesdrop. openstack. org/meetings/ horizon/ 2017/horizon. 2017-12- 13-20.00. log.html# l-157 eavesdrop. openstack. org/irclogs/ %23openstack- horizon/ %23openstack- horizon. 2017-12- 13.log. html#t2017- 12-13T21: 00:58
[1] http://
[2] http://