s3token: Enable secret caching by default
Now that we need to pass the service creds to keystone, we might as well default secret caching by default now that they need to be provided. This patch also adds the required s3token configuration to CI so we can use the swift service creds to fetch s3api secrets. As well as also configuring keystone users for cross-compatibility tests. Change-Id: Ief0a29c4300edf2e0d52c041960d756ecc8a2677 Signed-off-by: Tim Burke <tburke@nvidia.com>
This commit is contained in:
Tim Burke
committed by
Matthew Oliver
parent
b147eae95d
commit
5f89d14ebb
4 changed files with 107 additions and 1 deletions
@@ -793,6 +793,12 @@ http_timeout = 10.0
# You can override the default log routing for this filter here:
# log_name = s3token
# Secrets may be cached to reduce latency for the client and load on Keystone.
# This configures the duration that secrets may be cached; set to zero to
# disable caching and prevent Swift from retrieving secrets from Keystone.
# secret_cache_duration = 60
# Note that caching is required to enable signed aws-chunked transfers.
# Recent Keystone deployments require credentials similar to the authtoken
# middleware; these credentials require access to the s3tokens endpoint.
# Additionally, if secret caching is enabled, the credentials should have
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.