92182de328
It was originally envisaged that we would allow users to specify trust
IDs in trust+*:// alarm action URLs, and only create trusts internally
when none was specified. This made storage of trust IDs in the username
field of the URL part of the API interface, and it made sense that the
user would have access to the IDs both for trusts they had created
themselves and those created internally.
However, this proved to be a security hole that was closed by
|
||
---|---|---|
aodh | ||
devstack | ||
doc | ||
playbooks/legacy | ||
rally-jobs | ||
releasenotes | ||
tools | ||
.coveragerc | ||
.gitignore | ||
.gitreview | ||
.mailmap | ||
.testr.conf | ||
.zuul.yaml | ||
CONTRIBUTING.rst | ||
HACKING.rst | ||
LICENSE | ||
MAINTAINERS | ||
README.rst | ||
babel.cfg | ||
bindep.txt | ||
requirements.txt | ||
run-functional-tests.sh | ||
run-tests.sh | ||
setup.cfg | ||
setup.py | ||
tox.ini |
README.rst
aodh
- Release notes can be read online at:
-
https://docs.openstack.org/aodh/latest/contributor/releasenotes/index.html
- Documentation for the project can be found at:
- The project home is at:
Bugs and feature requests are tracked on Launchpad at: