oslo.policy/setup.cfg
Adam Young f4c533b25f Add oslopolicy-checker command-line tool
Allows testing the access_data from a Keystone token against
all rules in a policy file.

Optionally can test a single rule. See

$ tox -e venv -- oslopolicy-checker --help

For more details

Co-Authored-By: Ian Cordasco <graffatcolmingov@gmail.com>
Implements-Blueprint: oslopolicy-cli
Change-Id: I8b2e8739c85077e856775f37e9868eb0a8babb3c
2016-01-12 15:44:03 -06:00

62 lines
1.3 KiB
INI

[metadata]
name = oslo.policy
summary = Oslo Policy library
description-file =
README.rst
author = OpenStack
author-email = openstack-dev@lists.openstack.org
home-page = http://launchpad.net/oslo.policy
classifier =
Environment :: OpenStack
Intended Audience :: Information Technology
Intended Audience :: System Administrators
License :: OSI Approved :: Apache Software License
Operating System :: POSIX :: Linux
Programming Language :: Python
Programming Language :: Python :: 2
Programming Language :: Python :: 2.7
Programming Language :: Python :: 3
Programming Language :: Python :: 3.4
[files]
packages =
oslo_policy
[pbr]
warnerrors = true
autodoc_tree_index_modules = True
[entry_points]
oslo.config.opts =
oslo.policy = oslo_policy.opts:list_opts
console_scripts =
oslopolicy-checker = oslo_policy.shell:main
[build_sphinx]
source-dir = doc/source
build-dir = doc/build
all_files = 1
[upload_sphinx]
upload-dir = doc/build/html
[compile_catalog]
directory = oslo.policy/locale
domain = oslo.policy
[update_catalog]
domain = oslo.policy
output_dir = oslo.policy/locale
input_file = oslo.policy/locale/oslo.policy.pot
[extract_messages]
keywords = _ gettext ngettext l_ lazy_gettext
mapping_file = babel.cfg
output_file = oslo.policy/locale/oslo.policy.pot
[wheel]
universal = true