openstack adds new security group on list if project filter provided
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
python-openstackclient |
New
|
Undecided
|
Unassigned |
Bug Description
version: python-
command: openstack security group list --project nonexistingproject
When using a mulit-domain config domain-admin user, the openstack client tries to do a project show then a list to find the id. It gets an auth error on the list and a 404 when looking up the nonexistingproject. The openstack client then continues to query neutron with something like the following:
curl -g -i -X GET "http://
This results in neutron creating a new security group due the nature of how neutron handles thing.
https:/
According to the bug report above, neutron expects the project uuid to be validated before the security-group query. I would expect python-