keystone/keystone/assignment
Sean Perry 47d4d08ecb Give domain admin rights to domain specific implied roles
Currently this is not working because of our default
policy.v3cloudsample.json file. Add a new rule to check that the prior
role's domain ID matches the domain ID of the user.

Co-Authored-By: David Stanek <dstanek@dstanek.com>
Change-Id: Id1f5ccac3c639a44b33780b001e401bab195d8b3
Closes-Bug: #1593813
2016-09-15 11:04:53 -07:00
..
V8_backends Replace keystone.common.config with keystone.conf package 2016-06-24 17:02:15 +00:00
V8_role_backends Move the assignment abstract base class out of core 2016-05-11 17:14:04 +00:00
backends Replace keystone.common.config with keystone.conf package 2016-06-24 17:02:15 +00:00
role_backends Remove unused LOG 2016-07-05 15:05:24 +08:00
__init__.py Remove exposure of routers at package level 2015-12-03 15:06:56 -03:00
controllers.py Give domain admin rights to domain specific implied roles 2016-09-15 11:04:53 -07:00
core.py TrivialFix: Merge imports in code 2016-09-12 18:05:07 +07:00
routers.py Fix nits related to the new keystone.conf package 2016-06-24 20:12:14 +00:00
schema.py Add schema validation to create role 2016-07-22 09:37:25 -05:00