Re-use SSL-related options from passed in Session

Bug #1736135 reported by Pavlo Shchelokovskyy
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
python-swiftclient
New
Undecided
Unassigned

Bug Description

Currently swiftclient already accepts keystoneauth Session object on instantiation.

However it is used only to fetch the token from Keystone, and further connection to Swift itself does not use this Session object.

Thus the SSL-related options that are present in the Session object (like cacert, verify etc) are ignored when establishing the connection to Swift, which effectively requires them to be passed explicitly even when they are already part of the Session object (example of a workaround [0]).

Ideally swiftclient should implement a ksa.Adpater-based Session client, but that would be a much biiger change.

The minimal change would be to use SSL-related options from Session object as defaults if Session has been specified during client instantiation.

[0] https://review.openstack.org/#/c/476173

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.