keystone/keystone/contrib
Steve Martinelli 3b43bca897 OAuth authorizing user should propose roles to delegate
Currently in the oauth1 extension the consumer specifies roles
instead of delegator. This is a design fault that should be fixed
by having the authorizing user provide a set of roles (ids)
during the authorize request token phase.

fixes bug: #1216408

Change-Id: I13e155cf04dd478d575c8d66216d0fde08875ba2
2013-09-04 16:40:41 -05:00
..
access Merge "Remove unused import" 2013-08-16 01:28:19 +00:00
admin_crud Register Extensions 2013-07-12 17:34:42 -04:00
ec2 Migrating ec2 credentials to credential. 2013-08-22 10:19:31 -07:00
endpoint_filter Implement API protection on target entities 2013-08-28 13:57:03 +01:00
example extension migrations 2013-08-06 20:21:52 -04:00
oauth1 OAuth authorizing user should propose roles to delegate 2013-09-04 16:40:41 -05:00
s3 Migrating ec2 credentials to credential. 2013-08-22 10:19:31 -07:00
stats Refactor Keystone to use unified logging from Oslo 2013-08-15 12:28:57 -05:00
user_crud Refactor Keystone to use unified logging from Oslo 2013-08-15 12:28:57 -05:00
__init__.py establish basic structure 2012-01-18 20:06:27 -08:00