magnum/doc/source
Feilong Wang d8df9d0c36 [fedora-atomic][k8s] Support default Keystone auth policy file
With the new config option `keystone_auth_default_policy`, cloud admin
can set a default keystone auth policy for k8s cluster when the
keystone auth is enabled. As a result, user can use their current
keystone user to access k8s cluster as long as they're assigned
correct roles, and they will get the pre-defined permissions
set by the cloud provider.

The default policy now is based on the v2 format recently introduced
in k8s-keystone-auth which is getting more useful now. For example,
in v1 it doesn't support a policy for user to access resources from
all namespaces but kube-system, but v2 can do that.

NOTE: Now we're using openstackmagnum dockerhub repo until CPO
team fixing their image release issue.

Task: 30069
Story: 1755770

Change-Id: I2425e957bd99edc92482b6f11ca0b1f91fe59ff6
2019-06-11 11:57:15 +12:00
..
admin Replace openstack.org git:// URLs with https:// 2019-03-24 20:34:05 +00:00
cli Add framework for magnum-status upgrade check 2019-01-27 04:26:30 +00:00
configuration Add sample policy configuration to doc 2017-10-23 11:30:12 +07:00
contributor functional: bump atomic version to latest 2018-12-08 22:16:42 -05:00
images Add Horizon and Native Clients to user guide 2016-09-21 19:32:53 +00:00
install functional: bump atomic version to latest 2018-12-08 22:16:42 -05:00
user [fedora-atomic][k8s] Support default Keystone auth policy file 2019-06-11 11:57:15 +12:00
conf.py Add sample policy configuration to doc 2017-10-23 11:30:12 +07:00
index.rst Add framework for magnum-status upgrade check 2019-01-27 04:26:30 +00:00