deb-heat/heat/db/sqlalchemy
tengqm 0d9af5c683 Check if encoded user credential may get truncated
In some deployments, user passwords are generated by other
authentication infrastructures where the length of the Base64 encoded
credentials is longer than the DB limit.

This patch checks if the encoded credential might be truncated when
it is generated and fail early during stack creation, or else it will
cause troubles later on when operating the stack.

Change-Id: I901b9e39dd0d394991520fea1f527e250c2c9680
Partial-Bug: 1386213
2014-12-09 20:37:34 +08:00
..
migrate_repo Pickup the region name passed in from heatclient 2014-11-28 14:46:25 +08:00
__init__.py Stub out the database access API 2012-03-29 18:02:16 +02:00
api.py Check if encoded user credential may get truncated 2014-12-09 20:37:34 +08:00
filters.py replace dict.iteritems() with six.iteritems(dict) 2014-08-06 10:56:09 +08:00
migration.py Migrate to oslo.db 2014-07-15 10:14:56 +02:00
models.py Pickup the region name passed in from heatclient 2014-11-28 14:46:25 +08:00
mutable.py Remove vim header from files. 2014-03-04 08:51:56 -06:00
types.py Fix [H302] errors in heat/db 2014-11-24 15:01:28 +03:00