
Since not all services are ready to use the system scope token, we need a way to disable and enable the use of system scope token on a per-service basis. This setting let us configure which services should use the system scope token. By default the list is empty and system scope token is not used at all. Change-Id: I5e0cdc7288221571f183a37b800c19dc4cff5707
35 lines
1.1 KiB
Python
35 lines
1.1 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import logging
|
|
|
|
from django.conf import settings
|
|
from django.utils.translation import gettext_lazy as _
|
|
|
|
import horizon
|
|
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class Aggregates(horizon.Panel):
|
|
name = _("Host Aggregates")
|
|
slug = 'aggregates'
|
|
policy_rules = (("compute", "compute_extension:aggregates"),)
|
|
permissions = ('openstack.services.compute',)
|
|
|
|
def allowed(self, context):
|
|
if (('compute' in settings.SYSTEM_SCOPE_SERVICES) !=
|
|
bool(context['request'].user.system_scoped)):
|
|
return False
|
|
return super().allowed(context)
|