Allow Keystone Trusts in API request headers

Registered by Tomek Adamczewski

Heat uses Keystone Trusts to support autoscaling. But trust cannot be provided through API call - either a "not-trust-scoped" auth token or user credentials have to be specified in request headers. If client applications could provide trusts directly in requests, they could manage user stacks automatically, without knowing user credentials.

Blueprint information

Status:
Complete
Approver:
Steve Baker
Priority:
Undefined
Drafter:
None
Direction:
Needs approval
Assignee:
Steven Hardy
Definition:
Obsolete
Series goal:
None
Implementation:
Not started
Milestone target:
milestone icon next
Completed by
Angus Salkeld

Related branches

Whiteboard

(shardy) So, it's not as simple as just providing a trust directly in the request, because you still need to authenticate the API call, which you want to do as the user owning the stack, not the proxy-service holding the trust. This use-case was discussed at the summit in the keystone delegation session, and the outcome was that keystone would need to add support for chained delegation via trusts:

https://etherpad.openstack.org/p/icehouse-delegation
https://gist.github.com/dolph/7366031
https://blueprints.launchpad.net/keystone/+spec/trusts-chained-delegation

If keystone gains that functionality, I think Heat can support this use-case with little or no work.

(asalkeld) if you want to give this another go, please post a spec.

(?)

Work Items

Dependency tree

* Blueprints in grey have been implemented.

This blueprint contains Public information 
Everyone can see this information.