pycadf now has more strict validation for IDs, specifically, it tests to
make sure they are UUIDs. In a multi-domain configuration this fails
since the public ID that is generated by keystone is not an actual UUID.
Change-Id: I1fd13bd7a7fe037bd0e1b7d6fb0214460ff7c963
Closes-Bug: 1521844
Co-Authored-By: Steve Martinelli <email address hidden>
Reviewed: https:/ /review. openstack. org/252182 /git.openstack. org/cgit/ openstack/ keystone/ commit/ ?id=944bd0a2dca 60a5b144378587a 13220d33298051
Committed: https:/
Submitter: Jenkins
Branch: master
commit 944bd0a2dca60a5 b144378587a1322 0d33298051
Author: Ajaya Agrawal <email address hidden>
Date: Wed Jan 20 17:01:52 2016 +0000
Ensure pycadf initiator IDs are UUID
pycadf now has more strict validation for IDs, specifically, it tests to
make sure they are UUIDs. In a multi-domain configuration this fails
since the public ID that is generated by keystone is not an actual UUID.
Change-Id: I1fd13bd7a7fe03 7bd0e1b7d6fb021 4460ff7c963
Closes-Bug: 1521844
Co-Authored-By: Steve Martinelli <email address hidden>