The default behavior should be that an invalid service token
makes the request invalid even though we have not checked the
X-Auth-Token yet.
This is not required but should reflect the same behavior as other
keystonemiddleware implemented services have.
Signed-off-by: Tobias Urdin <tobias.urdin@binero.com>
if (!allow_expired) {
ldpp_dout(dpp, 0) << "service token user does not hold a matching role; required roles: "
<< g_conf()->rgw_keystone_service_token_accepted_roles << dendl;
+ return result_t::deny(-EPERM);
}
}
}