Public bug reported:
When a user that isn't allowed to create a keypair tries to create one
through the Horizon dashboard, a back trace is displayed instead of the
usual nice error message.
Details:
Environment:
Request Method: GET
Request URL:
http://localhost:8080/project/access_and_securit
I read again Jamie Lennox's article about Sessions:
http://www.jamielennox.net/blog/2014/02/24/client-session-objects/
As well as Python requests module doc:
http://docs.python-requests.org/en/latest/user/advanced/
FWIU, keystoneclient.session.Session and requests.Session objetcs are
not meant to
Public bug reported:
With `OPENSTACK_KEYSTONE_MULTIDOMAIN_SUPPORT = True`, when trying to
login on a domain different than 'Default', I get an `Unauthorized at
/project` error message (even though the user has the `Member` role on a
project in this new domain) :
How to reproduce the bug:
* Updat
Public bug reported:
When trying and running tox on Nova, tests are failing because of
missing oslo.config package.
Although oslo.config is specified in the requirements.txt file and pip
seems to be successfull in installing oslo.config, the directory where
it should be isn't created.
I'm using
** Also affects: glance
Importance: Undecided
Status: New
** Changed in: glance
Assignee: (unassigned) => Florent Flament (florent-flament-ext)
** Also affects: neutron
Importance: Undecided
Status: New
** Changed in: neutron
Assignee: (unassigned) => F
ators should be allowed to manage roles on any
project in their own domain.
** Affects: keystone
Importance: Undecided
Assignee: Florent Flament (florent-flament-ext)
Status: In Progress
** Changed in: keystone
Assignee: (unassigned) => Florent Flament (florent-fla
Public bug reported:
When getting an unscoped token, by authenticating against Keystone
without a scope, one should be able to perform scope independant
operations (when allowed to do so). For instance, an administrator
should be able to manage domains, roles and possibly users, without
needing to
7 matches
Mail list logo