django.utils.translation.ugettext(), ugettext_lazy(), ugettext_noop(),
ungettext(), and ungettext_lazy() are deprecated in favor of the
functions that they’re aliases for: django.utils.translation.gettext(),
gettext_lazy(), gettext_noop(), ngettext(), and ngettext_lazy().
https://docs.djangoproject.com/en/4.0/releases/3.0/#id3
Change-Id: I77878f84e9d10cf6a136dada81eabf4e18676250
Currently, "Set Domain Context" and "Clear Domain Context" doesn't do
PRG, so page reload after these actions produce browser popup about form
re-submission. Proposed patch fixes it
Change-Id: I80d11cbdd42224456ee3a354ebad556a318ba03a
All strings are considered as unicode strings in python 3,
so we no longer need "u" prefix (u'...').
Co-Authored-By: Akihiro Motoki <amotoki@gmail.com>
Change-Id: I796d2fcdca066475bbf29d25cbf2aa67b2b2178b
This commit mainly covers settings
in openstack_dashboard/dashboards/identity/.
Part of blueprint ini-based-configuration
Change-Id: Ibb174f62d0047a10b2832dd2ff350f5f32955b08
(In Django 2.0) The django.core.urlresolvers module is removed
in favor of its new location, django.urls.
It was depreacted in Django 1.10:
https://docs.djangoproject.com/en/2.0/releases/1.10/#id3
blueprint django2-support
Change-Id: I46ab5c325491274b8eaffbf848e5d80f83c2fd26
DeleteInstance action inherits from tables.DeleteAction.
The parent class has the attribute 'name = "delete"' so
we can remove the unused codes.
Change-Id: I9f312ceafbf84a79b7b7941f255a16632931d5d0
This patch fixes a typo when referencing exception message handle
function, the correct function should use the Horizon exceptions
module instead of keystoneclient.
Change-Id: Iaeabf3630351f13f6881b4df489c709fa3ef092f
Closes-Bug: #1701782
Adds a word-break class that can be added to tables to prevent large
column values breaking the table shape.
Change-Id: Icca10d9c29254d176dc7f8b7c039bc19c3f52c72
Related-Bug: 1565724
Closes-Bug: 1584785
This patch supports using domain scoped tokens against keystone v3.
Use Cases:
Cloud Admin - view and manage identity resources across domains
Domain Admin - view and manage identity resources in the domain logged in
User - view identity project in the domain logged in
Regression:
Supports keystone v2 through local_settings.py configuration
Supports keystone v3 with multidomain = False
Supports keystone v3 with mulitdomain = True
Relates to https://review.openstack.org/#/c/141153/
Background on how to test is here
https://wiki.openstack.org/wiki/Horizon/DomainWorkFlow
Co-Authored-By: Brad Pokorny <Brad_Pokorny@symantec.com>
Co-Authored-By: Brian Tully <brian.tully@hp.com>
Co-Authored-By: Michael Hagedorn <mike.hagedorn@hp.com>
Co-Authored-By: woomatt <matt.wood@hp.com>
Partially Implements: blueprint domain-scoped-tokens
Closes-Bug: #1413851
Change-Id: Iaa19bfef9b0c70304ff81d083c62b218b2d02479
Buttons added to the Domains table which enable and
disable selected domains from the table. Buttons to
execute as BatchAction action.
Change-Id: I1c42382d1e36c362021e60998ba12f8b110150df
Closes-Bug: #1365359
Most boolean columes are displayed through yesno_filter
and capfirst_filter, but the changed field were not.
In addition, by using yesno_filter, the corresponding colums
are displayed with translated strings and it fixes I18N bug
at the same time.
The following columes are updated by this patch.
Identity -> Domains (enabled)
Identity -> Users (enabled)
Identity -> Groups (enabled)
Firewall -> Rules (enabled, audited)
Change-Id: I35eeed6addc8f58faa34bc990c758523e4830960
Closes-Bug: #1422074
Change "Modify Users" to "Manage Members" in the Project, Group and
Domain Panels in-row Actions. This allows us to be consistent with the
tab headings in both panels.
Change-Id: I7f99624efe623d3cb7fe5861c9cd8ceab8ca3661
Closes-bug: #1398224
Added Domain User step in the Domain Update workflow for managing
domain-role assignment to User.
Change-Id: I629449c635319e3a4292a4e2be35c5d9fc8a7cf9
Implements: blueprint user-domain-role-assignment
Moving identity panels to their own dashboard.
RBAC is now used to determine the data to load in the identity
dashboard. Using the default policy file, a user with role member
will now be able to see their project list.
Also, adding a policy check mechanism at the panel and dashboard
level to determine which panels and dashboards the user can access.
Implements blueprint separate-identity-dash
Change-Id: I7ebfec2bf6e44899bec79d3b23c90d56a976200f