Current Series Release Notes¶
22.0.0-14¶
New Features¶
Add new fields to specify the validity period of rating rules for modules
hashmap
andpyscripts
. These new fields also improve the audit mechanism for rating rules changes and deletion, allowing users to know when the rules were changed or removed (marked as deleted) and by whom.
A new module,
cloudkitty.wsgi
, has been added as a place to gather WSGIapplication
objects. This is intended to ease deployment by providing a consistent location for these objects. For example, if using uWSGI then instead of:[uwsgi] wsgi-file = /bin/cloudkitty-api
You can now use:
[uwsgi] module = cloudkitty.wsgi.api:application
This also simplifies deployment with other WSGI servers that expect module paths such as gunicorn.
Upgrade Notes¶
New rules for both
hashmap
andpyscript
modules will no longer be reprocessed for past periods, by default they are valid from the moment they were created on. To allow new rules to be valid for past periods, operators will need to specify astart_date
in the past and pass the query parameterforce=true
when creating the rating rule, then the rule will be valid and used since the defined start date. Update rating rules for bothhashmap
andpyscript
modules will no longer be allowed for rules where thestart_date
is in the past, to do so, you will need to delete and create a new rating rule with the desired values, the unique value you can update for rules that already started, is theend_date
.
Support for Python 3.9 has been removed. Now Python 3.10 is the minimum version supported.
The WSGI script
cloudkitty-api
has been removed. Deployment tooling should instead reference the Python module path for the wsgi module in CloudKitty,cloudkitty.wsgi.api:application
if their chosen WSGI server supports this (gunicorn, uWSGI, etc.) or implement a .wsgi script themselves if not (mod_wsgi).
22.0.0¶
New Features¶
The CloudKitty policies implemented the scope concept and new default roles (
admin
,member
, andreader
) provided by keystone.
Upgrade Notes¶
All the policies implement the
scope_type
and new defaults.Scope
Each policy is protected with
project
scope_type
.New Defaults (Admin, Member and Reader)
Policies are default to Admin, Member and Reader roles. Old roles are also supported. There is no change in the legacy admin access.