149d3ad219
It was originally envisaged that we would allow users to specify trust IDs in trust+*:// alarm action URLs, and only create trusts internally when none was specified. This made storage of trust IDs in the username field of the URL part of the API interface, and it made sense that the user would have access to the IDs both for trusts they had created themselves and those created internally. However, this proved to be a security hole that was closed by |
||
---|---|---|
aodh | ||
devstack | ||
doc | ||
playbooks/legacy | ||
rally-jobs | ||
releasenotes | ||
tools | ||
.coveragerc | ||
.gitignore | ||
.gitreview | ||
.mailmap | ||
.testr.conf | ||
.zuul.yaml | ||
CONTRIBUTING.rst | ||
HACKING.rst | ||
LICENSE | ||
MAINTAINERS | ||
README.rst | ||
babel.cfg | ||
bindep.txt | ||
requirements.txt | ||
run-functional-tests.sh | ||
run-tests.sh | ||
setup.cfg | ||
setup.py | ||
tox.ini |
README.rst
aodh
- Release notes can be read online at:
-
https://docs.openstack.org/aodh/latest/contributor/releasenotes/index.html
- Documentation for the project can be found at:
- The project home is at:
Bugs and feature requests are tracked on Launchpad at: