Enable keystone token caching by OSC
SDK uses python keyring library to enable token caching. Normally this
is requiring a proper desktop (interactive) session, but there are some
backend plugins working in non-interactive mode. Store cache in an
unencrypted file on FS (this is not worse than storing passwords in
plaintext).
Change-Id: I42d698f15db5918443073fff8f27b926126d1d0f
diff --git a/functions-common b/functions-common
index c57c4cc..03d7c96 100644
--- a/functions-common
+++ b/functions-common
@@ -1047,6 +1047,8 @@
--description="$3" \
-f value -c id
)
+ # Drop cached token to invalidate catalog info in the token
+ remove_token_cache
echo $service_id
}
@@ -1064,7 +1066,6 @@
endpoint_id=$(openstack --os-cloud devstack-system-admin endpoint create \
$1 $2 $3 --region $4 -f value -c id)
fi
-
echo $endpoint_id
}
@@ -1088,6 +1089,8 @@
if [[ -n "$5" ]]; then
_get_or_create_endpoint_with_interface $1 internal $5 $2
fi
+ # Drop cached token to invalidate catalog info in the token
+ remove_token_cache
# return the public id to indicate success, and this is the endpoint most likely wanted
echo $public_id
}
@@ -2517,6 +2520,11 @@
[ "$fips" == "1" ]
}
+function remove_token_cache {
+ # Remove Keyring cache file
+ rm ~/.local/share/python_keyring/keyring_pass.cfg
+}
+
# Restore xtrace
$_XTRACE_FUNCTIONS_COMMON