Users created without the member role with keystone API V2

Bug #1492177 reported by eon on 2015-09-04
This bug affects 2 people
Affects Status Importance Assigned to Milestone

Bug Description

Even if keystone V2 is deprecated we have some environmement using it.

When running rally on them the users that are created don't have the member role. That makes all the scenarios to fail.

Andrey Kurilin (andreykurilin) wrote :

This is not a bug, this is feature:) Different deployments have different default roles. For example, it can be "Member" or "_member_".

If you need to specify role to users, created by rally, you can use RoleContext -

Your scenario should looks like -

Changed in rally:
status: New → Invalid
eon (eon-5) wrote :

Ok I didn't know about the role context. But a similar patch was made for keystone V3:

In this case I think it's better to be able to run directly sample scenarios than to have to patch every task to add the Member role with the role context.

eon (eon-5) wrote :

Any second thougts ?

Chris St. Pierre (stpierre) wrote :

The Keystone V3 behavior seems wrong to me. IMO that commit should be reverted -- adding this seems wrong. I've added an agenda item to the next meeting to discuss this:

narasimha18sv (narasimha18sv) wrote :

According to the kilo release document member role has been changed as user.
According to this adding member role to the newly created user by rally is not possible as there wont be member in the environment.

Create the user role:

$ openstack role create user
| Field | Value |
| id | 9fe2ff9ee4384b1894a90878d3e92bab |
| name | user |

Changed in rally:
status: Invalid → New
assignee: nobody → narasimha18sv (narasimha18sv)
Changed in rally:
assignee: narasimha18sv (narasimha18sv) → nobody
Andrey Kurilin (andreykurilin) wrote :

sorry for outdated response. we merged a patch which allows to setup name of "member" role -

Changed in rally:
status: New → Fix Released

Change abandoned by Boris Pavlovic (<email address hidden>) on branch: master
Reason: Fixed by another patch

To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers