keystonemiddleware/releasenotes/source/locale/en_GB/LC_MESSAGES/releasenotes.po

806 lines
34 KiB
Plaintext

# Andi Chandler <andi@gowling.com>, 2017. #zanata
# Andi Chandler <andi@gowling.com>, 2018. #zanata
# Andi Chandler <andi@gowling.com>, 2019. #zanata
# Andi Chandler <andi@gowling.com>, 2020. #zanata
# Andi Chandler <andi@gowling.com>, 2022. #zanata
msgid ""
msgstr ""
"Project-Id-Version: keystonemiddleware\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2022-08-26 17:13+0000\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"PO-Revision-Date: 2022-09-05 10:38+0000\n"
"Last-Translator: Andi Chandler <andi@gowling.com>\n"
"Language-Team: English (United Kingdom)\n"
"Language: en_GB\n"
"X-Generator: Zanata 4.3.3\n"
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
msgid "10.0.0"
msgstr "10.0.0"
msgid "10.0.0-3"
msgstr "10.0.0-3"
msgid "4.1.0"
msgstr "4.1.0"
msgid "4.12.0"
msgstr "4.12.0"
msgid "4.16.0"
msgstr "4.16.0"
msgid "4.17.1"
msgstr "4.17.1"
msgid "4.17.1-3"
msgstr "4.17.1-3"
msgid "4.18.0"
msgstr "4.18.0"
msgid "4.2.0"
msgstr "4.2.0"
msgid "4.20.0"
msgstr "4.20.0"
msgid "4.22.0"
msgstr "4.22.0"
msgid "4.22.0-2"
msgstr "4.22.0-2"
msgid "4.3.0"
msgstr "4.3.0"
msgid "4.5.0"
msgstr "4.5.0"
msgid "4.6.0"
msgstr "4.6.0"
msgid "5.0.0"
msgstr "5.0.0"
msgid "5.1.0"
msgstr "5.1.0"
msgid "5.2.0"
msgstr "5.2.0"
msgid "5.2.1"
msgstr "5.2.1"
msgid "5.2.2"
msgstr "5.2.2"
msgid "5.3.0"
msgstr "5.3.0"
msgid "6.0.0"
msgstr "6.0.0"
msgid "6.0.1"
msgstr "6.0.1"
msgid "6.1.0"
msgstr "6.1.0"
msgid "7.0.0"
msgstr "7.0.0"
msgid "8.0.0"
msgstr "8.0.0"
msgid "9.0.0"
msgstr "9.0.0"
msgid "9.1.0"
msgstr "9.1.0"
msgid "9.3.0"
msgstr "9.3.0"
msgid ""
"A new configuration option for the s3token middleware called auth_uri can be "
"used to set the URI to be used for authentication. This replaces auth_host, "
"auth_port, and auth_protocol."
msgstr ""
"A new configuration option for the s3token middleware called auth_uri can be "
"used to set the URI to be used for authentication. This replaces auth_host, "
"auth_port, and auth_protocol."
msgid "Add the `X_IS_ADMIN_PROJECT` header."
msgstr "Add the `X_IS_ADMIN_PROJECT` header."
msgid ""
"Added the `X_IS_ADMIN_PROJECT` header to authenticated headers. This has the "
"string value of 'True' or 'False' and can be used to enforce admin project "
"policies."
msgstr ""
"Added the `X_IS_ADMIN_PROJECT` header to authenticated headers. This has the "
"string value of 'True' or 'False' and can be used to enforce admin project "
"policies."
msgid ""
"AuthToken middleware will now allow fetching an expired token when a valid "
"service token is present. This service token must contain any one of the "
"roles specified in ``service_token_roles``."
msgstr ""
"AuthToken middleware will now allow fetching an expired token when a valid "
"service token is present. This service token must contain any one of the "
"roles specified in ``service_token_roles``."
msgid "Bug Fixes"
msgstr "Bug Fixes"
msgid "Current Series Release Notes"
msgstr "Current Series Release Notes"
msgid "Deprecation Notes"
msgstr "Deprecation Notes"
msgid ""
"Fetching expired tokens when using a valid service token is now allowed. "
"This will help with long running operations that must continue between "
"services longer than the original expiry of the token."
msgstr ""
"Fetching expired tokens when using a valid service token is now allowed. "
"This will help with long running operations that must continue between "
"services longer than the original expiry of the token."
msgid ""
"For backwards compatibility the ``service_token_roles_required`` option in "
"``[keystone_authtoken]`` was added. The option defaults to ``False`` and has "
"been immediately deprecated. This will allow the current behaviour that "
"service tokens are validated but not checked for roles to continue. The "
"option should be set to ``True`` as soon as possible. The option will "
"default to ``True`` in a future release."
msgstr ""
"For backwards compatibility the ``service_token_roles_required`` option in "
"``[keystone_authtoken]`` was added. The option defaults to ``False`` and has "
"been immediately deprecated. This will allow the current behaviour that "
"service tokens are validated but not checked for roles to continue. The "
"option should be set to ``True`` as soon as possible. The option will "
"default to ``True`` in a future release."
msgid ""
"It is recommended that the ``memcache_use_advanced_pool`` option is set to "
"``True`` in the ``keystone_authtoken`` configuration section of the various "
"services (e.g. nova, glance, ...) when memcached is used for token cache."
msgstr ""
"It is recommended that the ``memcache_use_advanced_pool`` option is set to "
"``True`` in the ``keystone_authtoken`` configuration section of the various "
"services (e.g. nova, glance, ...) when Memcached is used for token cache."
msgid "Mitaka Series Release Notes"
msgstr "Mitaka Series Release Notes"
msgid "New Features"
msgstr "New Features"
msgid "Newton Series Release Notes"
msgstr "Newton Series Release Notes"
msgid "Ocata Series Release Notes"
msgstr "Ocata Series Release Notes"
msgid "Other Notes"
msgstr "Other Notes"
msgid "Pike Series Release Notes"
msgstr "Pike Series Release Notes"
msgid "Prelude"
msgstr "Prelude"
msgid ""
"Python 2.7 support has been dropped. Last release of keystonemiddleware to "
"support python 2.7 is OpenStack Train. The minimum version of Python now "
"supported is Python 3.6."
msgstr ""
"Python 2.7 support has been dropped. Last release of keystonemiddleware to "
"support Python 2.7 is OpenStack Train. The minimum version of Python now "
"supported is Python 3.6."
msgid ""
"Python 3.6 & 3.7 support has been dropped. The minimum version of Python now "
"supported is Python 3.8."
msgstr ""
"Python 3.6 & 3.7 support has been dropped. The minimum version of Python now "
"supported is Python 3.8."
msgid "Queens Series Release Notes"
msgstr "Queens Series Release Notes"
msgid "Rocky Series Release Notes"
msgstr "Rocky Series Release Notes"
msgid "Security Issues"
msgstr "Security Issues"
msgid ""
"Service tokens are compared against a list of possible roles for validity. "
"This will ensure that only services are submitting tokens as an ``X-Service-"
"Token``. For backwards compatibility, if ``service_token_roles_required`` is "
"not set, a warning will be emitted. To enforce the check properly, set "
"``service_token_roles_required`` to ``True``. It currently defaults to "
"``False``"
msgstr ""
"Service tokens are compared against a list of possible roles for validity. "
"This will ensure that only services are submitting tokens as an ``X-Service-"
"Token``. For backwards compatibility, if ``service_token_roles_required`` is "
"not set, a warning will be emitted. To enforce the check properly, set "
"``service_token_roles_required`` to ``True``. It currently defaults to "
"``False``"
msgid ""
"Set the ``service_token_roles`` to a list of roles that services may have. "
"The likely list is ``service`` or ``admin``. Any ``service_token_roles`` may "
"apply to accept the service token. Ensure service users have one of these "
"roles so interservice communication continues to work correctly. When "
"verified, set the ``service_token_roles_required`` flag to ``True`` to "
"enforce this behaviour. This will become the default setting in future "
"releases."
msgstr ""
"Set the ``service_token_roles`` to a list of roles that services may have. "
"The likely list is ``service`` or ``admin``. Any ``service_token_roles`` may "
"apply to accept the service token. Ensure service users have one of these "
"roles so interservice communication continues to work correctly. When "
"verified, set the ``service_token_roles_required`` flag to ``True`` to "
"enforce this behaviour. This will become the default setting in future "
"releases."
msgid ""
"Since the removal of the Identity API v2 Keystone no longer has any special "
"functionality that requires using the admin endpoint for it. So this release "
"changes the default endpoint being used from ``admin`` to ``internal``, "
"allowing deployments to work without an admin endpoint."
msgstr ""
"Since the removal of the Identity API v2 Keystone no longer has any special "
"functionality that requires using the admin endpoint for it. So this release "
"changes the default endpoint being used from ``admin`` to ``internal``, "
"allowing deployments to work without an admin endpoint."
msgid "Stein Series Release Notes"
msgstr "Stein Series Release Notes"
msgid ""
"The ``kwargs_to_fetch_token`` setting was removed from the "
"``BaseAuthProtocol`` class. Implementations of auth_token now assume kwargs "
"will be passed to the ``fetch_token`` method."
msgstr ""
"The ``kwargs_to_fetch_token`` setting was removed from the "
"``BaseAuthProtocol`` class. Implementations of auth_token now assume kwargs "
"will be passed to the ``fetch_token`` method."
msgid ""
"The auth_host, auth_port, and auth_protocol configuration options to the "
"s3token middleware are now deprecated."
msgstr ""
"The auth_host, auth_port, and auth_protocol configuration options to the "
"s3token middleware are now deprecated."
msgid ""
"The auth_uri parameter of keystone_authtoken is deprecated in favor of "
"www_authenticate_uri. The auth_uri option was often confused with the "
"auth_url parameter of the keystoneauth plugin, which was also effectively "
"always required. The parameter refers to the WWW-Authenticate header that is "
"returned when the user needs to be redirected to the Identity service for "
"authentication."
msgstr ""
"The auth_uri parameter of keystone_authtoken is deprecated in favour of "
"www_authenticate_uri. The auth_uri option was often confused with the "
"auth_url parameter of the keystoneauth plugin, which was also effectively "
"always required. The parameter refers to the WWW-Authenticate header that is "
"returned when the user needs to be redirected to the Identity service for "
"authentication."
msgid ""
"The lower constraint for python-memcached must be raised to version 1.58 in "
"order to work with Python 3.4 and above."
msgstr ""
"The lower constraint for python-memcached must be raised to version 1.58 in "
"order to work with Python 3.4 and above."
msgid "Train Series Release Notes"
msgstr "Train Series Release Notes"
msgid "Upgrade Notes"
msgstr "Upgrade Notes"
msgid "Ussuri Series Release Notes"
msgstr "Ussuri Series Release Notes"
msgid "Victoria Series Release Notes"
msgstr "Victoria Series Release Notes"
msgid "Wallaby Series Release Notes"
msgstr "Wallaby Series Release Notes"
msgid ""
"We no longer recommend using the eventlet unsafe keystonemiddleware's "
"memcacheclientpool. This implementation may result in growing connections to "
"memcached."
msgstr ""
"We no longer recommend using the eventlet unsafe keystonemiddleware's "
"memcacheclientpool. This implementation may result in growing connections to "
"Memcached."
msgid ""
"When ``delay_auth_decision`` is enabled and a Keystone failure prevents a "
"final decision about whether a token is valid or invalid, it will be marked "
"invalid and the application will be responsible for a final auth decision. "
"This is similar to what happens when a token is confirmed *not* valid. This "
"allows a Keystone outage to only affect Keystone users in a multi-auth "
"system."
msgstr ""
"When ``delay_auth_decision`` is enabled and a Keystone failure prevents a "
"final decision about whether a token is valid or invalid, it will be marked "
"invalid and the application will be responsible for a final auth decision. "
"This is similar to what happens when a token is confirmed *not* valid. This "
"allows a Keystone outage to only affect Keystone users in a multi-auth "
"system."
msgid ""
"With the release of 4.2.0 of keystonemiddleware we no longer recommend using "
"the in-process token cache. In-process caching may result in inconsistent "
"validation, poor UX and race conditions. It is recommended that the "
"`memcached_servers` option is set in the `keystone_authtoken` configuration "
"section of the various services (e.g. nova, glance, ...) with the endpoint "
"of running memcached server(s). When the feature is removed, not setting the "
"`memcached_servers` option will cause keystone to validate tokens more "
"frequently, increasing load. In production, use of caching is highly "
"recommended. This feature is deprecated as of 4.2.0 and is targeted for "
"removal in keystonemiddleware 5.0.0 or in the `O` development cycle, "
"whichever is later."
msgstr ""
"With the release of 4.2.0 of keystonemiddleware we no longer recommend using "
"the in-process token cache. In-process caching may result in inconsistent "
"validation, poor UX and race conditions. It is recommended that the "
"`memcached_servers` option is set in the `keystone_authtoken` configuration "
"section of the various services (e.g. nova, glance, ...) with the endpoint "
"of running memcached server(s). When the feature is removed, not setting the "
"`memcached_servers` option will cause keystone to validate tokens more "
"frequently, increasing load. In production, use of caching is highly "
"recommended. This feature is deprecated as of 4.2.0 and is targeted for "
"removal in keystonemiddleware 5.0.0 or in the `O` development cycle, "
"whichever is later."
msgid "Xena Series Release Notes"
msgstr "Xena Series Release Notes"
msgid "Yoga Series Release Notes"
msgstr "Yoga Series Release Notes"
msgid ""
"[`blueprint oauth2-client-credentials-ext <https://blueprints.launchpad.net/"
"keystone/+spec/oauth2-client-credentials-ext>`_] The oauth2_token filter has "
"been added for accepting or denying incoming requests containing OAuth2.0 "
"client credentials access tokens passed via the Authorization headers as "
"bearer tokens."
msgstr ""
"[`blueprint oauth2-client-credentials-ext <https://blueprints.launchpad.net/"
"keystone/+spec/oauth2-client-credentials-ext>`_] The oauth2_token filter has "
"been added for accepting or denying incoming requests containing OAuth2.0 "
"client credentials access tokens passed via the Authorisation headers as "
"bearer tokens."
msgid ""
"[`bug 1333951 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1333951>`_] Add support for parsing AWS v4 for ec2."
msgstr ""
"[`bug 1333951 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1333951>`_] Add support for parsing AWS v4 for ec2."
msgid ""
"[`bug 1423973 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1423973>`_] Use oslo.config choices for config options."
msgstr ""
"[`bug 1423973 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1423973>`_] Use oslo.config choices for config options."
msgid ""
"[`bug 1490804 <https://bugs.launchpad.net/keystone/+bug/1490804>`_] The "
"auth_token middleware validates the token's audit IDs during offline token "
"validation if the Identity server includes audit IDs in the token revocation "
"list."
msgstr ""
"[`bug 1490804 <https://bugs.launchpad.net/keystone/+bug/1490804>`_] The "
"auth_token middleware validates the token's audit IDs during offline token "
"validation if the Identity server includes audit IDs in the token revocation "
"list."
msgid ""
"[`bug 1490804 <https://bugs.launchpad.net/keystone/+bug/1490804>`_] "
"[`CVE-2015-7546 <http://cve.mitre.org/cgi-bin/cvename.cgi?"
"name=CVE-2015-7546>`_] A bug is fixed where an attacker could avoid token "
"revocation when the PKI or PKIZ token provider is used. The complete "
"remediation for this vulnerability requires the corresponding fix in the "
"Identity (keystone) project."
msgstr ""
"[`bug 1490804 <https://bugs.launchpad.net/keystone/+bug/1490804>`_] "
"[`CVE-2015-7546 <http://cve.mitre.org/cgi-bin/cvename.cgi?"
"name=CVE-2015-7546>`_] A bug is fixed where an attacker could avoid token "
"revocation when the PKI or PKIZ token provider is used. The complete "
"remediation for this vulnerability requires the corresponding fix in the "
"Identity (Keystone) project."
msgid ""
"[`bug 1523311 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1523311>`_] Do not list deprecated opts in sample config."
msgstr ""
"[`bug 1523311 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1523311>`_] Do not list deprecated opts in sample config."
msgid ""
"[`bug 1540022 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1540022>`_] The auth_token middleware will now accept a conf setting "
"named ``oslo_config_config``. If this is set its value must be an existing "
"oslo_config `ConfigOpts`. ``olso_config_config`` takes precedence over "
"``oslo_config_project``. This feature is useful to applications that are "
"instantiating the auth_token middleware themselves and wish to use an "
"existing configuration."
msgstr ""
"[`bug 1540022 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1540022>`_] The auth_token middleware will now accept a conf setting "
"named ``oslo_config_config``. If this is set its value must be an existing "
"oslo_config `ConfigOpts`. ``olso_config_config`` takes precedence over "
"``oslo_config_project``. This feature is useful to applications that are "
"instantiating the auth_token middleware themselves and wish to use an "
"existing configuration."
msgid ""
"[`bug 1540115 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1540115>`_] Optional dependencies can now be installed using `extras`. "
"To install audit related libraries, use ``pip install "
"keystonemiddleware[audit_nofications]``. Refer to keystonemiddleware "
"documentation for further information."
msgstr ""
"[`bug 1540115 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1540115>`_] Optional dependencies can now be installed using `extras`. "
"To install audit related libraries, use ``pip install "
"keystonemiddleware[audit_nofications]``. Refer to keystonemiddleware "
"documentation for further information."
msgid ""
"[`bug 1544840 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1544840>`_] Adding audit middleware specific notification related "
"configuration to allow a different notification driver and transport for "
"audit if needed."
msgstr ""
"[`bug 1544840 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1544840>`_] Adding audit middleware specific notification related "
"configuration to allow a different notification driver and transport for "
"audit if needed."
msgid ""
"[`bug 1583690 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1583690>`_] For services such as Swift, which may not be utilizing "
"oslo_config, we need to be able to determine the project name from local "
"config. If project name is specified in both local config and oslo_config, "
"the one in local config will be used instead. In case project is "
"undetermined (i.e. not set), we use taxonomy.UNKNOWN as an indicator so "
"operators can take corrective actions."
msgstr ""
"[`bug 1583690 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1583690>`_] For services such as Swift, which may not be utilising "
"oslo_config, we need to be able to determine the project name from local "
"config. If project name is specified in both local config and oslo_config, "
"the one in local config will be used instead. In case project is "
"undetermined (i.e. not set), we use taxonomy.UNKNOWN as an indicator so "
"operators can take corrective actions."
msgid ""
"[`bug 1583699 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1583699>`_] Some service APIs (such as Swift list public containers) do "
"not require a token. Therefore, there will be no identity or service catalog "
"information available. In these cases, audit now fills in the default (i.e. "
"taxonomy.UNKNOWN) for both initiator and target instead of raising an "
"exception."
msgstr ""
"[`bug 1583699 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1583699>`_] Some service APIs (such as Swift list public containers) do "
"not require a token. Therefore, there will be no identity or service "
"catalogue information available. In these cases, audit now fills in the "
"default (i.e. taxonomy.UNKNOWN) for both initiator and target instead of "
"raising an exception."
msgid ""
"[`bug 1583702 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1583702>`_] Some services such as Swift does not use Oslo (global) "
"config. In that case, the options are conveyed via local config. This patch "
"utilized an established pattern in auth_token middleware, which is to first "
"look for the given option in local config, then Oslo global config."
msgstr ""
"[`bug 1583702 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1583702>`_] Some services such as Swift does not use Oslo (global) "
"config. In that case, the options are conveyed via local config. This patch "
"utilized an established pattern in auth_token middleware, which is to first "
"look for the given option in local config, then Oslo global config."
msgid ""
"[`bug 1649735 <https://bugs.launchpad.net/keystone/+bug/1649735>`_] The "
"auth_token middleware no longer attempts to retrieve the revocation list "
"from the Keystone server. The deprecated options "
"`check_revocations_for_cached` and `check_revocations_for_cached` have been "
"removed."
msgstr ""
"[`bug 1649735 <https://bugs.launchpad.net/keystone/+bug/1649735>`_] The "
"auth_token middleware no longer attempts to retrieve the revocation list "
"from the Keystone server. The deprecated options "
"`check_revocations_for_cached` and `check_revocations_for_cached` have been "
"removed."
msgid ""
"[`bug 1677308 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1677308>`_] Removes ``pycrypto`` dependency as the library is "
"unmaintained, and replaces it with the ``cryptography`` library."
msgstr ""
"[`bug 1677308 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1677308>`_] Removes ``pycrypto`` dependency as the library is "
"unmaintained, and replaces it with the ``cryptography`` library."
msgid ""
"[`bug 1677308 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1677308>`_] There is no upgrade impact when switching from ``pycrypto`` "
"to ``cryptography``. All data will be encrypted and decrypted using "
"identical blocksize, padding, algorithm (AES) and mode (CBC). Data "
"previously encrypted using ``pycrypto`` can be decrypted using both "
"``pycrypto`` and ``cryptography``. The same is true of data encrypted using "
"``cryptography``."
msgstr ""
"[`bug 1677308 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1677308>`_] There is no upgrade impact when switching from ``pycrypto`` "
"to ``cryptography``. All data will be encrypted and decrypted using "
"identical blocksize, padding, algorithm (AES) and mode (CBC). Data "
"previously encrypted using ``pycrypto`` can be decrypted using both "
"``pycrypto`` and ``cryptography``. The same is true of data encrypted using "
"``cryptography``."
msgid ""
"[`bug 1695038 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1695038>`_] The use_oslo_messaging configuration option is added for "
"services such as Swift, which need the audit middleware to use the local "
"logger instead of the oslo.messaging notifier regardless of whether the oslo."
"messaging package is present or not. Leave this option set to its default "
"True value to keep the previous behavior unchanged - the audit middleware "
"will use the oslo.messaging notifier if the oslo.messaging package is "
"present, and the local logger otherwise. Services that rely on the local "
"logger for audit notifications must set this option to False."
msgstr ""
"[`bug 1695038 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1695038>`_] The use_oslo_messaging configuration option is added for "
"services such as Swift, which need the audit middleware to use the local "
"logger instead of the oslo.messaging notifier regardless of whether the oslo."
"messaging package is present or not. Leave this option set to its default "
"True value to keep the previous behaviour unchanged - the audit middleware "
"will use the oslo.messaging notifier if the oslo.messaging package is "
"present, and the local logger otherwise. Services that rely on the local "
"logger for audit notifications must set this option to False."
msgid ""
"[`bug 1737115 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1737115>`_] Last release have accidentaly make python-memcached a hard "
"dependency, this have changed back to an optional one."
msgstr ""
"[`bug 1737115 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1737115>`_] Last release had accidentally made python-memcached a hard "
"dependency, this has changed it back to an optional one."
msgid ""
"[`bug 1737119 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1737119>`_] If the application was not using the global cfg.CONF "
"object, the configuration was not read from the configuration file. This "
"have been fixed."
msgstr ""
"[`bug 1737119 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1737119>`_] If the application was not using the global cfg.CONF "
"object, the configuration was not read from the configuration file. This "
"have been fixed."
msgid ""
"[`bug 1762362 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1762362>`_] The value of the header \"WWW-Authenticate\" in a 401 "
"(Unauthorized) response now is double quoted to follow the RFC requirement."
msgstr ""
"[`bug 1762362 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1762362>`_] The value of the header \"WWW-Authenticate\" in a 401 "
"(Unauthorised) response now is double quoted to follow the RFC requirement."
msgid ""
"[`bug 1766731 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1766731>`_] Keystonemiddleware now supports system scoped tokens. When "
"a system-scoped token is parsed by auth_token middleware, it will set the "
"``OpenStack-System-Scope`` header accordingly."
msgstr ""
"[`bug 1766731 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1766731>`_] Keystonemiddleware now supports system scoped tokens. When "
"a system-scoped token is parsed by auth_token middleware, it will set the "
"``OpenStack-System-Scope`` header accordingly."
msgid ""
"[`bug 1782404 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1782404>`_] Keystonemiddleware incorrectly implemented an abstraction "
"for the memcache client pool that utilized a `queue.Queue` `get` method "
"instead of the supplied `acquire()` context manager. The `acquire()` context "
"manager properly places the client connection back into the pool after "
"`__exit__`."
msgstr ""
"[`bug 1782404 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1782404>`_] Keystonemiddleware incorrectly implemented an abstraction "
"for the memcache client pool that utilized a `queue.Queue` `get` method "
"instead of the supplied `acquire()` context manager. The `acquire()` context "
"manager properly places the client connection back into the pool after "
"`__exit__`."
msgid ""
"[`bug 1789351 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1789351>`_] Fixed the bug that when initialize `AuthProtocol`, it'll "
"raise \"dictionary changed size during iteration\" error if the input `CONF` "
"object contains deprecated options."
msgstr ""
"[`bug 1789351 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1789351>`_] Fixed the bug that when initialize `AuthProtocol`, it'll "
"raise \"dictionary changed size during iteration\" error if the input `CONF` "
"object contains deprecated options."
msgid ""
"[`bug 1797584 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1797584>`_] Fixed a bug where the audit code would select the wrong "
"target service if the OpenStack service endpoints were not using unique TCP "
"ports."
msgstr ""
"[`bug 1797584 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1797584>`_] Fixed a bug where the audit code would select the wrong "
"target service if the OpenStack service endpoints were not using unique TCP "
"ports."
msgid ""
"[`bug 1800017 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1800017>`_] Fix audit middleware service catalog parsing for the "
"scenario where a service does not contain any endpoints. In that case, we "
"should just skip over that service."
msgstr ""
"[`bug 1800017 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1800017>`_] Fix audit middleware service catalog parsing for the "
"scenario where a service does not contain any endpoints. In that case, we "
"should just skip over that service."
msgid ""
"[`bug 1803940 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1803940>`_] Request ID and global request ID have been added to CADF "
"notifications."
msgstr ""
"[`bug 1803940 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1803940>`_] Request ID and global request ID have been added to CADF "
"notifications."
msgid ""
"[`bug 1809101 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1809101>`_] Fix req.context of Keystone audit middleware and Glance "
"conflict with each other issue. The audit middleware now stores the admin "
"context to req.environ['audit.context']."
msgstr ""
"[`bug 1809101 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1809101>`_] Fix req.context of Keystone audit middleware and Glance "
"conflict with each other issue. The audit middleware now stores the admin "
"context to req.environ['audit.context']."
msgid ""
"[`bug 1813739 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1813739>`_] When admin identity endpoint is not created yet, "
"keystonemiddleware emit EndpointNotFound exception. Even after admin "
"identity endpoint created, auth_token middleware could not be notified of "
"update since it does not invalidate existing auth. Add an invalidation step "
"so that endpoint updates can be detected."
msgstr ""
"[`bug 1813739 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1813739>`_] When admin identity endpoint is not created yet, "
"keystonemiddleware emit EndpointNotFound exception. Even after admin "
"identity endpoint created, auth_token middleware could not be notified of "
"update since it does not invalidate existing auth. Add an invalidation step "
"so that endpoint updates can be detected."
msgid ""
"[`bug 1830002 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1830002>`_] In order to allow an installation to work without deploying "
"an admin Identity endpoint, a new option `interface` has been added, "
"allowing select the Identity endpoint that is being used when verifying auth "
"tokens. It defaults to `admin` in order to replicate the old behaviour, but "
"may be set to `public` or `internal` as needed."
msgstr ""
"[`bug 1830002 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1830002>`_] In order to allow an installation to work without deploying "
"an admin Identity endpoint, a new option `interface` has been added, "
"allowing select the Identity endpoint that is being used when verifying auth "
"tokens. It defaults to `admin` in order to replicate the old behaviour, but "
"may be set to `public` or `internal` as needed."
msgid ""
"[`bug 1830002 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1830002>`_] The default Identity endpoint has been changed from "
"``admin`` to ``internal``."
msgstr ""
"[`bug 1830002 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1830002>`_] The default Identity endpoint has been changed from "
"``admin`` to ``internal``."
msgid ""
"[`bug 1845539 <https://bugs.launchpad.net/keystone/+bug/1845539>`_] The ec2 "
"'url' config option now defaults to https://localhost:5000/v3/ec2tokens with "
"the removal of ec2 v2.0 support. Keystonemiddleware no longer supports "
"ec2tokens using the v2.0 API."
msgstr ""
"[`bug 1845539 <https://bugs.launchpad.net/keystone/+bug/1845539>`_] The ec2 "
"'url' config option now defaults to https://localhost:5000/v3/ec2tokens with "
"the removal of ec2 v2.0 support. Keystonemiddleware no longer supports "
"ec2tokens using the v2.0 API."
msgid ""
"[`bug 1845539 <https://bugs.launchpad.net/keystone/+bug/1845539>`_] [`bug "
"1777177 <https://bugs.launchpad.net/keystone/+bug/1777177>`_] "
"keystonemiddleware no longer supports the keystone v2.0 api, all associated "
"functionality has been removed."
msgstr ""
"[`bug 1845539 <https://bugs.launchpad.net/keystone/+bug/1845539>`_] [`bug "
"1777177 <https://bugs.launchpad.net/keystone/+bug/1777177>`_] "
"keystonemiddleware no longer supports the Keystone v2.0 api, all associated "
"functionality has been removed."
msgid ""
"[`bug 1892852 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1892852>`_] [`bug 1888394 <https://bugs.launchpad.net/oslo.cache/"
"+bug/1888394>`_] [`bug 1883659 <https://bugs.launchpad.net/"
"keystonemiddleware/+bug/1883659>`_] Keystonemiddleware now using eventlet-"
"safe implementation of ``MemcacheClientPool`` from oslo.cache's library by "
"default. The ``keystonemiddleware`` implementation is now deprecated. For "
"backwards compatibility, the ``[keystone_authtoken] "
"memcache_use_advanced_pool`` option can be set to ``False`` config files of "
"the various services (e.g. nova, glance, ...) when memcached is used for "
"token cache."
msgstr ""
"[`bug 1892852 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1892852>`_] [`bug 1888394 <https://bugs.launchpad.net/oslo.cache/"
"+bug/1888394>`_] [`bug 1883659 <https://bugs.launchpad.net/"
"keystonemiddleware/+bug/1883659>`_] Keystonemiddleware now using eventlet-"
"safe implementation of ``MemcacheClientPool`` from oslo.cache's library by "
"default. The ``keystonemiddleware`` implementation is now deprecated. For "
"backwards compatibility, the ``[keystone_authtoken] "
"memcache_use_advanced_pool`` option can be set to ``False`` config files of "
"the various services (e.g. nova, glance, ...) when Memcached is used for "
"token cache."
msgid ""
"[`bug/1747655 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1747655>`_] When keystone is temporarily unavailable, "
"keystonemiddleware correctly sends a 503 response to the HTTP client but was "
"not identifying which service was down, leading to confusion on whether it "
"was keystone or the service using keystonemiddleware that was unavailable. "
"This change identifies keystone in the error response."
msgstr ""
"[`bug/1747655 <https://bugs.launchpad.net/keystonemiddleware/"
"+bug/1747655>`_] When keystone is temporarily unavailable, "
"keystonemiddleware correctly sends a 503 response to the HTTP client but was "
"not identifying which service was down, leading to confusion on whether it "
"was keystone or the service using keystonemiddleware that was unavailable. "
"This change identifies keystone in the error response."
msgid ""
"[`spec <http://specs.openstack.org/openstack/keystone-specs/specs/keystone/"
"train/capabilities-app-creds.html>`_] The auth_token middleware now has "
"support for accepting or denying incoming requests based on access rules "
"provided by users in their keystone application credentials."
msgstr ""
"[`spec <http://specs.openstack.org/openstack/keystone-specs/specs/keystone/"
"train/capabilities-app-creds.html>`_] The auth_token middleware now has "
"support for accepting or denying incoming requests based on access rules "
"provided by users in their Keystone application credentials."
msgid "keystonemiddleware Release Notes"
msgstr "keystonemiddleware Release Notes"