When creating the keystone client for an admin the user is checked
for the specific role of "admin" to determine if they are authorized
to use the admin URL. This patch changes this logic so that the
policy file is honored instead of a specific role.
Reviewed: https:/ /review. openstack. org/133032 /git.openstack. org/cgit/ openstack/ horizon/ commit/ ?id=45ae78ce85c 8ecc211c7c957c6 409955588f831a
Committed: https:/
Submitter: Jenkins
Branch: master
commit 45ae78ce85c8ecc 211c7c957c64099 55588f831a
Author: Justin Pomeroy <email address hidden>
Date: Thu Nov 6 07:30:38 2014 -0600
Honor keystone policy file when creating client
When creating the keystone client for an admin the user is checked
for the specific role of "admin" to determine if they are authorized
to use the admin URL. This patch changes this logic so that the
policy file is honored instead of a specific role.
Closes-Bug: #1336418 64f97cbcce67ff6 d3619142961
Change-Id: I600334dff17a55