Comment 4 for bug 1447784

Revision history for this message
Jirayut Nimsaeng (winggundamth) wrote :

This bug impacts me also. It seems like openstackclient didn't respect --insecure. I have to use python-keystoneclient for work around for now

root@openstack-keystone:/# export OS_TENANT_NAME=admin
root@openstack-keystone:/# export OS_PROJECT_NAME=admin
root@openstack-keystone:/# export OS_USERNAME=admin
root@openstack-keystone:/# export OS_PASSWORD=adminpass
root@openstack-keystone:/# export OS_AUTH_URL=http://identity.example.com/v2.0

root@openstack-keystone:/# openstack --insecure user list
WARNING: keystoneclient.auth.identity.generic.base Discovering versions from the identity service failed when creating the password plugin. Attempting to determine version from URL.
WARNING: openstackclient.shell Possible error authenticating: SSL exception connecting to https://identity.example.com/v2.0/tokens
ERROR: openstack SSL exception connecting to https://identity.example.com/v2.0/tokens

root@openstack-keystone:/# keystone user-list
Authorization Failed: SSL exception connecting to https://identity.example.com/v2.0/tokens

root@openstack-keystone:/# keystone --insecure user-list
+----------------------------------+-------+---------+---------------------------+
| id | name | enabled | email |
+----------------------------------+-------+---------+---------------------------+
| 4e72838934e84002923439542b0b3e8e | admin | True | <email address hidden> |
+----------------------------------+-------+---------+---------------------------+