Project

General

Profile

Actions

Feature #9493

closed

Ability to disable keystone revocation polling when using UUID keystone provider

Added by Kyle Bader over 9 years ago. Updated almost 7 years ago.

Status:
Resolved
Priority:
High
Assignee:
Target version:
-
% Done:

0%

Source:
other
Tags:
Backport:
jewel, kraken
Reviewed:
Affected Versions:
Pull request ID:

Description

When using a UUID keystone provider revocation is handled by deleting the token from the persistence backend (ie. no revocation lists). If rgw is using keystone authentication rgw_keystone_revocation_interval can be set to an arbitrary period, but it does not seem to have a means of disabling revocation entirely. Ideally there should be another tunable, or rgw_keystone_revocation_interval should allow being set to 0 or -1 to disable revocation polling.

https://bugzilla.redhat.com/show_bug.cgi?id=1142424


Related issues 3 (1 open2 closed)

Related to rgw - Feature #19499: rgw: implement support for OS-REVOKE extension of OpenStack Identity API v3New04/05/2017

Actions
Copied to rgw - Backport #19777: kraken: rgw: implement support for OS-REVOKE extension of OpenStack Identity API v3ResolvedNathan CutlerActions
Copied to rgw - Backport #19772: jewel: rgw: swift: disable revocation thread under certain circumstancesResolvedMarcus WattsActions
Actions

Also available in: Atom PDF