Glance policy restrictions cause tempest failures
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack-Ansible |
Invalid
|
High
|
Hugh Saunders | ||
Icehouse |
Fix Released
|
High
|
Hugh Saunders | ||
Juno |
Fix Released
|
High
|
Kevin Carter | ||
Trunk |
Invalid
|
High
|
Hugh Saunders |
Bug Description
The following glance policies have been added to prevent users from extracting files from the glance container using set location. However this had the side effect of preventing non-admin users from creating images with remote locations. This is done by the setup class of the tempest list images test, so that test fails.
=======
"delete_
"get_
"set_
=======
For example:
=======
FAIL: setUpClass (tempest.
-------
Traceback (most recent call last):
_StringException: Traceback (most recent call last):
File "/opt/tempest_
cls.
File "/opt/tempest_
img1 = cls._create_
File "/opt/tempest_
location=
File "/opt/tempest_
disk_format, **kwargs)
File "/opt/tempest_
resp, body = self.post(
File "/opt/tempest_
return self.request(
File "/opt/tempest_
resp, resp_body)
File "/opt/tempest_
raise exceptions.
Unauthorized: Unauthorized
Details: 403 Forbidden
Access was denied to this resource.
=======
Changed in openstack-ansible: | |
assignee: | nobody → Hugh Saunders (hughsaunders) |
tags: | added: juno-backport-potential |
Changed in openstack-ansible: | |
importance: | Undecided → High |
tags: | removed: juno-backport-potential |
Fix proposed to branch: master /review. openstack. org/147813
Review: https:/