magnum/magnum/tests
Feilong Wang d8df9d0c36 [fedora-atomic][k8s] Support default Keystone auth policy file
With the new config option `keystone_auth_default_policy`, cloud admin
can set a default keystone auth policy for k8s cluster when the
keystone auth is enabled. As a result, user can use their current
keystone user to access k8s cluster as long as they're assigned
correct roles, and they will get the pre-defined permissions
set by the cloud provider.

The default policy now is based on the v2 format recently introduced
in k8s-keystone-auth which is getting more useful now. For example,
in v1 it doesn't support a policy for user to access resources from
all namespaces but kube-system, but v2 can do that.

NOTE: Now we're using openstackmagnum dockerhub repo until CPO
team fixing their image release issue.

Task: 30069
Story: 1755770

Change-Id: I2425e957bd99edc92482b6f11ca0b1f91fe59ff6
2019-06-11 11:57:15 +12:00
..
contrib Replace openstack.org git:// URLs with https:// 2019-03-24 20:34:05 +00:00
functional Use oslo_serialization instead of the json module directly 2019-01-21 16:28:03 -08:00
unit [fedora-atomic][k8s] Support default Keystone auth policy file 2019-06-11 11:57:15 +12:00
__init__.py Remove redundant FunctionalTest class 2015-07-15 03:39:11 +08:00
base.py Set is_admin flag correctly in RequestContext 2017-03-03 03:37:08 +00:00
conf_fixture.py Centralize config option: trust section 2016-09-22 05:57:46 +00:00
fake_notifier.py Emit notifications when bay operations get executed 2016-05-19 15:29:56 +08:00
fakes.py FakeLoopingCall raises IOError 2019-02-28 10:01:17 +00:00
policy_fixture.py Register default magnum service and stat policies in code 2017-10-23 02:57:29 +00:00
utils.py Remove redundant code from magnum.test.utils 2015-07-20 21:53:12 +08:00