106 lines
3.7 KiB
INI
Raw Normal View History

[metadata]
name = masakari
summary = Virtual Machine High Availability (VMHA) service for OpenStack
description-file =
README.rst
author = OpenStack
author-email = openstack-discuss@lists.openstack.org
home-page = https://docs.openstack.org/masakari/latest/
classifier =
Environment :: OpenStack
Intended Audience :: Information Technology
Intended Audience :: System Administrators
License :: OSI Approved :: Apache Software License
Operating System :: POSIX :: Linux
Programming Language :: Python
Programming Language :: Python :: 2
Programming Language :: Python :: 2.7
Programming Language :: Python :: 3
Programming Language :: Python :: 3.5
[files]
data_files =
etc/masakari =
etc/masakari/api-paste.ini
etc/masakari/masakari-custom-recovery-methods.conf
packages =
masakari
[entry_points]
oslo.config.opts =
masakari.conf = masakari.conf.opts:list_opts
customized_recovery_flow_opts = masakari.conf.opts:list_recovery_workflow_opts
oslo.config.opts.defaults =
masakari.api = masakari.common.config:set_middleware_defaults
Register and Document policy in code Adds below things for the implementation of framework for registering and using default policy rules. * Policy-in-code The framework for registering and using default policy rules. Rules should be defined and returned from a module in masakari/policies/, and then added to the list in masakari/policies/__init__.py. A new context.can() method has been added for policy enforcement of registered rules. It has the same parameters as the enforce() method currently being used. * Add policy sample generation The entry point and config file necessary for using the oslo.policy sample generation script. It also adds a tox target to simplify the usage of it. * Add policy documentation and sample file Documentation and sample file for default policy in code feature. * Hacking check for policy registration It ensures that policy registration happens in the centralized masakari/policies/ directory. * Hacking check for _ENFORCER.enforce() Hacking check in order to ensure that only registered policies are used for authorization checks _ENFORCER.authorize should be used rather than _ENFORCER.enforce. * Add entry_point for oslo policy scripts There are two helper scripts in oslo.policy to help deployers understand their policy configuration better. With the setup.cfg entry these can be called directly from oslo.policy. Changes done here are with the reference of [1] at NOVA side which is contributed by Andrew Laski and Claudiu Belu [1] https://review.openstack.org/#/q/topic:bp/policy-in-code+project:openstack/nova+status:merged Change-Id: If885a66d92c31be440d27d6780635800a0b12e3e
2018-04-24 15:50:03 +05:30
oslo.policy.enforcer =
masakari = masakari.policy:get_enforcer
oslo.policy.policies =
# The sample policies will be ordered by entry point and then by list
# returned from that entry point. If more control is desired split out each
# list_rules method into a separate entry point rather than using the
# aggregate method.
masakari = masakari.policies:list_rules
console_scripts =
masakari-api = masakari.cmd.api:main
masakari-engine = masakari.cmd.engine:main
masakari-manage = masakari.cmd.manage:main
masakari-status = masakari.cmd.status:main
wsgi_scripts =
masakari-wsgi = masakari.cmd.api:initialize_application
masakari.database.migration_backend =
sqlalchemy = oslo_db.sqlalchemy.migration
masakari.api.v1.extensions =
versions = masakari.api.openstack.ha.versionsV1:Versions
extension_info = masakari.api.openstack.ha.extension_info:ExtensionInfo
segments = masakari.api.openstack.ha.segments:Segments
hosts = masakari.api.openstack.ha.hosts:Hosts
notifications = masakari.api.openstack.ha.notifications:Notifications
masakari.driver =
taskflow_driver = masakari.engine.drivers.taskflow:TaskFlowDriver
masakari.task_flow.tasks =
disable_compute_service_task = masakari.engine.drivers.taskflow.host_failure:DisableComputeServiceTask
prepare_HA_enabled_instances_task = masakari.engine.drivers.taskflow.host_failure:PrepareHAEnabledInstancesTask
evacuate_instances_task = masakari.engine.drivers.taskflow.host_failure:EvacuateInstancesTask
stop_instance_task = masakari.engine.drivers.taskflow.instance_failure:StopInstanceTask
start_instance_task = masakari.engine.drivers.taskflow.instance_failure:StartInstanceTask
confirm_instance_active_task = masakari.engine.drivers.taskflow.instance_failure:ConfirmInstanceActiveTask
disable_compute_node_task = masakari.engine.drivers.taskflow.process_failure:DisableComputeNodeTask
confirm_compute_node_disabled_task = masakari.engine.drivers.taskflow.process_failure:ConfirmComputeNodeDisabledTask
no_op = masakari.engine.drivers.taskflow.no_op:Noop
[build_sphinx]
source-dir = doc/source
build-dir = doc/build
all_files = 1
[upload_sphinx]
upload-dir = doc/build/html
[compile_catalog]
directory = masakari/locale
domain = masakari
[update_catalog]
domain = masakari
output_dir = masakari/locale
input_file = masakari/locale/masakari.pot
[extract_messages]
keywords = _ gettext ngettext l_ lazy_gettext
mapping_file = babel.cfg
output_file = masakari/locale/masakari.pot
[build_releasenotes]
all_files = 1
build-dir = releasenotes/build
source-dir = releasenotes/source