Changes between Version 2 and Version 3 of AaronHelsinger/GAPI_AM_API_DRAFT2/Archive


Ignore:
Timestamp:
04/04/12 11:12:52 (7 years ago)
Author:
Aaron Helsinger
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AaronHelsinger/GAPI_AM_API_DRAFT2/Archive

    v2 v3  
    106106For an alternative proposal, see: http://www.protogeni.net/trac/protogeni/wiki/AM_API_proposals
    107107
    108 The later proposal for allocation states (below) supersedes this. See [#ChangeSetF3:SliverAllocationStatesandmethods Change Set F3].
     108The later proposal for allocation states (below) supersedes this. See [wiki:AaronHelsinger/GAPI_AM_API_DRAFT2#ChangeSetF3:SliverAllocationStatesandmethods Change Set F3].
    109109
    110110== Motivation ==
     
    328328A later alternative proposal, see http://lists.geni.net/pipermail/dev/2012-March/000721.html
    329329
    330 At the GEC13 coding sprint, a variant on the above was approved. It is documented as [GAPI_AM_API_DRAFT2#ChangeSetF3:SliverAllocationStatesandmethods Change Set F3].
     330At the GEC13 coding sprint, a variant on the above was approved. It is documented as [wiki:AaronHelsinger/GAPI_AM_API_DRAFT2#ChangeSetF3:SliverAllocationStatesandmethods Change Set F3].
    331331
    332332A variant on the operational states proposal is defined as Change Set F4 and documented here: https://openflow.stanford.edu/display/FOAM/GENI+-+PerformOperationalAction
     
    403403  - over the slice (if any) on which they are operating
    404404   - ({{{target_gid}}} in the credential).
    405  - Other privileges may be present in the same or other credentials, and other non-SFA credentials may be used to authorize actions (per [#ChangeSetG:Credentialsaregeneralauthorizationtokens. Change Set G]).
     405 - Other privileges may be present in the same or other credentials, and other non-SFA credentials may be used to authorize actions (per [wiki:AaronHelsinger/GAPI_AM_API_DRAFT2#ChangeSetG:Credentialsaregeneralauthorizationtokens. Change Set G]).
    406406 - Local aggregate policy may grant or deny access to a particular method regardless of the presence of a valid credential granting the required privilege. This depends in part on federation policy governing aggregates.
    407407 - Some operations (e.g. !GetVersion) may either simply require a valid credential with no particular privilege, or have no {{{credentials}}} argument at all.