`keystone-manage bootstrap` doesn't handle system role assignments
Bug #1749268 reported by
Lance Bragstad
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Identity (keystone) |
Fix Released
|
High
|
Lance Bragstad | ||
Queens |
Fix Committed
|
High
|
Lance Bragstad |
Bug Description
The whole purpose of the `keystone-manage bootstrap` command is to help operators establish an admin account they can use to administer the rest of the deployment. It does this by granting the admin user in the bootstrap command an admin role on a project [0].
A system role assignment should also be created so that operators don't lock themselves out of APIs if they set enabled_scope=True in configuration but don't actually have a user with any system role assignments.
Changed in keystone: | |
milestone: | none → queens-rc2 |
importance: | Undecided → High |
status: | New → Triaged |
Changed in keystone: | |
assignee: | nobody → Lance Bragstad (lbragstad) |
status: | Triaged → In Progress |
tags: | added: queens-backport-potential |
Changed in keystone: | |
milestone: | queens-rc2 → rocky-1 |
To post a comment you must log in.
Fix proposed to branch: stable/queens /review. openstack. org/544097
Review: https:/