From b9e48df58c0028395808b8ca1737d1df4e7e0cf0 Mon Sep 17 00:00:00 2001 From: Simon Murray Date: Thu, 25 Apr 2024 16:10:35 +0100 Subject: [PATCH] Allow OpenStack Reauthentication Tokens expire, we should allow the client to transparently reauthenticate us rather than have the region service sitting punting out errors! --- pkg/providers/openstack/client.go | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pkg/providers/openstack/client.go b/pkg/providers/openstack/client.go index e9e1caf3..5b58cc94 100644 --- a/pkg/providers/openstack/client.go +++ b/pkg/providers/openstack/client.go @@ -68,6 +68,7 @@ func (p *ApplicationCredentialProvider) Client() (*gophercloud.ProviderClient, e IdentityEndpoint: p.endpoint, ApplicationCredentialID: p.id, ApplicationCredentialSecret: p.secret, + AllowReauth: true, } return authenticatedClient(options) @@ -102,6 +103,7 @@ func (p *PasswordProvider) Client() (*gophercloud.ProviderClient, error) { UserID: p.userID, Password: p.password, TenantID: p.projectID, + AllowReauth: true, } return authenticatedClient(options) @@ -138,6 +140,7 @@ func (p *DomainScopedPasswordProvider) Client() (*gophercloud.ProviderClient, er Scope: &gophercloud.AuthScope{ DomainID: p.domainID, }, + AllowReauth: true, } return authenticatedClient(options) @@ -169,6 +172,7 @@ func (p *TokenProvider) Client() (*gophercloud.ProviderClient, error) { options := gophercloud.AuthOptions{ IdentityEndpoint: p.endpoint, TokenID: p.token, + AllowReauth: true, } return authenticatedClient(options)