Keystone v2.0 documentation shows unsupported "versionId", "versionList", "versionInfo" fields
Bug #1273831 reported by
Shri Javadekar
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Identity (keystone) |
Invalid
|
Low
|
Dolph Mathews | ||
openstack-api-site |
Fix Released
|
Low
|
Diane Fleming | ||
python-keystoneclient |
Invalid
|
Low
|
Dolph Mathews |
Bug Description
The documentation of Openstack Keystone v2.0 [1] shows that when a user is authenticated, the return values will have a "versionId", "versionInfo", "versionStatus", etc.
However, based on the discussion I had on the #openstack-dev irc channel, it turns out that Keystone does not support these.
There are other auth implementation which try to be compatible with Keystone. They implement their auth schemes based on this documentation. Incorrect documentation causes these to break.
description: | updated |
Changed in keystone: | |
importance: | Undecided → Low |
status: | New → Triaged |
Changed in openstack-api-site: | |
status: | New → Confirmed |
Changed in python-keystoneclient: | |
importance: | Undecided → Low |
status: | New → In Progress |
assignee: | nobody → Dolph Mathews (dolph) |
Changed in openstack-api-site: | |
assignee: | nobody → Dolph Mathews (dolph) |
Changed in openstack-api-site: | |
status: | Confirmed → In Progress |
Changed in openstack-api-site: | |
importance: | Undecided → Low |
Changed in openstack-api-site: | |
status: | In Progress → Confirmed |
Changed in openstack-api-site: | |
assignee: | Dolph Mathews (dolph) → Diane Fleming (diane-fleming) |
milestone: | none → mitaka |
To post a comment you must log in.
If someone has a client that is breaking because it sees one of these "version" fields in the Tenant info section, then that client is being far to strict. Following the Robustness (i.e. Postals) law: "Be liberal in what you accept, be conservative in what you send." - the clients should be ignoring information that they don't need/want/like and not fail just because it's there, especially if it is documented.
3rd party auth systems are not wrong for following the keystone spec as it is currently documented. If that doc is incorrect, then it should be cleaned up. On the other hand, perhaps keystone SHOULD support these values. Is the bug in keystone or the documentation?