2025.2 Series Release Notes¶
23.0.0¶
New Features¶
Add new fields to specify the validity period of rating rules for modules
hashmapandpyscripts. These new fields also improve the audit mechanism for rating rules changes and deletion, allowing users to know when the rules were changed or removed (marked as deleted) and by whom.
A new module,
cloudkitty.wsgi, has been added as a place to gather WSGIapplicationobjects. This is intended to ease deployment by providing a consistent location for these objects. For example, if using uWSGI then instead of:[uwsgi] wsgi-file = /bin/cloudkitty-api
You can now use:
[uwsgi] module = cloudkitty.wsgi.api:application
This also simplifies deployment with other WSGI servers that expect module paths such as gunicorn.
Upgrade Notes¶
New rules for both
hashmapandpyscriptmodules will no longer be reprocessed for past periods, by default they are valid from the moment they were created on. To allow new rules to be valid for past periods, operators will need to specify astart_datein the past and pass the query parameterforce=truewhen creating the rating rule, then the rule will be valid and used since the defined start date. Update rating rules for bothhashmapandpyscriptmodules will no longer be allowed for rules where thestart_dateis in the past, to do so, you will need to delete and create a new rating rule with the desired values, the unique value you can update for rules that already started, is theend_date.
Support for Python 3.9 has been removed. Now Python 3.10 is the minimum version supported.
The WSGI script
cloudkitty-apihas been removed. Deployment tooling should instead reference the Python module path for the wsgi module in CloudKitty,cloudkitty.wsgi.api:applicationif their chosen WSGI server supports this (gunicorn, uWSGI, etc.) or implement a .wsgi script themselves if not (mod_wsgi).
Security Issues¶
Previously, cloudkitty-api recorded request token in plain text format when a request does not comply with policy rules or debug log is enabled. This has been fixed and now token is masked in logs.
22.0.0¶
New Features¶
The CloudKitty policies implemented the scope concept and new default roles (
admin,member, andreader) provided by keystone.
Upgrade Notes¶
All the policies implement the
scope_typeand new defaults.Scope
Each policy is protected with
projectscope_type.New Defaults (Admin, Member and Reader)
Policies are default to Admin, Member and Reader roles. Old roles are also supported. There is no change in the legacy admin access.