Uploaded image for project: 'Couchbase Python Client Library'
  1. Couchbase Python Client Library
  2. PYCBC-1030

user roles list returning many Nones as role type

    XMLWordPrintable

Details

    • Bug
    • Status: Resolved
    • Critical
    • Resolution: Fixed
    • 3.0.5
    • 3.0.7
    • library
    • 1
    • SDK38: Txnβ-ready/Docs, SDK48: FTS Score/Incl, Docs.

    Description

      Some of the collections perf tests will grab user roles using python sdk 3:

       

      def create_user_manager(self):
          self.user_manager = self.cluster.users()
      def get_roles(self):
          return self.user_manager.get_roles()
      

      The call to get_roles() return a list of possible roles for the cluster. The returned list looks like the following:

      [
      RawRoleAndDescription(role='admin', display_name='Full Admin', description='Can manage all cluster features (including security). This user can access the web console. This user can read and write all data.', ce=True, bucket_name=None),
      RawRoleAndDescription(role='ro_admin', display_name='Read-Only Admin', description='Can view all cluster statistics. This user can access the web console. This user can read some data.', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='security_admin', display_name='Security Admin', description='Can view all cluster statistics and manage user roles, but not grant Full Admin or Security Admin roles to other users or alter their own role. This user can access the web console. This user cannot read data.', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='cluster_admin', display_name='Cluster Admin', description='Can manage all cluster features except security. This user can access the web console. This user cannot read data.', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='bucket_admin', display_name='Bucket Admin', description='Can manage ALL bucket features for a given bucket (including start/stop XDCR). This user can access the web console. This user cannot read data.', ce=True, bucket_name='*'), 
      RawRoleAndDescription(role='bucket_full_access', display_name='Application Access', description='Full access to bucket data. This user cannot access the web console and is intended only for application access. This user can read and write data.', ce=True, bucket_name='*'), 
      RawRoleAndDescription(role='views_admin', display_name='Views Admin', description='Can create and manage views of a given bucket. This user can access the web console. This user can read some data.', ce=True, bucket_name='*'), 
      RawRoleAndDescription(role='views_reader', display_name='Views Reader', description='Can read data from the views of a given bucket. This user cannot access the web console and is intended only for application access. This user can read some data.', ce=True, bucket_name='*'), 
      RawRoleAndDescription(role='replication_admin', display_name='XDCR Admin', description='Can administer XDCR features to create cluster references and replication streams out of this cluster. This user can access the web console. This user can read some data.', ce=True, bucket_name=None), 
      None, 
      None, 
      None, 
      RawRoleAndDescription(role='data_backup', display_name='Data Backup & Restore', description='Can backup and restore a given bucket\x19s data. This user cannot access the web console and is intended only for application access. This user can read data.', ce=True, bucket_name='*'), 
      None, 
      RawRoleAndDescription(role='fts_admin', display_name='Search Admin', description='Can administer all Full Text Search features. This user can access the web console. This user can read some data.', ce=True, bucket_name='*'),
      None, 
      None, 
      None, 
      None, 
      None, 
      None, 
      RawRoleAndDescription(role='query_system_catalog', display_name='Query System Catalog', description='Can look up system catalog information via N1QL. This user can access the web console, but cannot read user data.', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='query_external_access', display_name='Query CURL Access', description='Can execute the CURL statement from within N1QL. This user can access the web console, but cannot read data (within Couchbase).', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='query_manage_global_functions', display_name='Manage Global Functions', description='Can manage global n1ql functions', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='query_execute_global_functions', display_name='Execute Global Functions', description='Can execute global n1ql functions', ce=True, bucket_name=None), 
      None, 
      None, 
      RawRoleAndDescription(role='query_manage_global_external_functions', display_name='Manage Global External Functions', description='Can manage global external language functions', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='query_execute_global_external_functions', display_name='Execute Global External Functions', description='Can execute global external language functions', ce=True, bucket_name=None), 
      None, 
      None, 
      RawRoleAndDescription(role='replication_target', display_name='XDCR Inbound', description='Can create XDCR streams into a given bucket. This user cannot access the web console or read any data.', ce=True, bucket_name='*'),
      RawRoleAndDescription(role='analytics_manager', display_name='Analytics Manager', description='Can manage Analytics local links. Can manage datasets on a given bucket. Can query datasets created on this bucket. This user can access the web console and read some data.', ce=True, bucket_name='*'), 
      RawRoleAndDescription(role='analytics_reader', display_name='Analytics Reader', description='Can query datasets. This is a global role as datasets may be created on different buckets. This user can access the web console and read some data.', ce=True, bucket_name=None), 
      None, 
      RawRoleAndDescription(role='analytics_admin', display_name='Analytics Admin', description='Can manage dataverses. Can manage all Analytics links. Can manage all datasets. This user can access the web console but cannot read data.', ce=True, bucket_name=None), 
      RawRoleAndDescription(role='mobile_sync_gateway', display_name='Sync Gateway', description='Full access to bucket data as required by Sync Gateway. This user cannot access the web console and is intended only for use by Sync Gateway. This user can read and write data, manage indexes and views, and read some cluster information.', ce=True, bucket_name='*')]
      

      You can see that of the 37 roles returned, 15 just say "None".

      Seen on 3090, but not the first build with this issue.

       

      Attachments

        No reviews matched the request. Check your Options in the drop-down menu of this sections header.

        Activity

          david.kelly David Kelly added a comment -

          This had a syntax issue, but seems like it isn't actually completely done. Moving to backlog.

          david.kelly David Kelly added a comment - This had a syntax issue, but seems like it isn't actually completely done. Moving to backlog.

          reopening as its marked as resolved but there is no fix yet.

          korrigan.clark Korrigan Clark (Inactive) added a comment - reopening as its marked as resolved but there is no fix yet.
          david.kelly David Kelly added a comment -

          This is fixed in the upcoming 3.0.7 release. Hitting a 7.0 server, I get:

          [RawRoleAndDescription(role='admin', display_name='Full Admin', description='Can manage all cluster features (including security). This user can access the web console. This user can read and write all data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='ro_admin', display_name='Read-Only Admin', description='Can view all cluster statistics. This user can access the web console. This user can read some data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='security_admin', display_name='Security Admin', description='Can view all cluster statistics and manage user roles, but not grant Full Admin or Security Admin roles to other users or alter their own role. This user can access the web console. This user cannot read data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='cluster_admin', display_name='Cluster Admin', description='Can manage all cluster features except security. This user can access the web console. This user cannot read data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='bucket_admin', display_name='Bucket Admin', description='Can manage ALL bucket features for a given bucket (including start/stop XDCR). This user can access the web console. This user cannot read data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='scope_admin', display_name='Manage Collections in Scope', description='Can create/delete collections within a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='bucket_full_access', display_name='Application Access', description='Full access to bucket data. This user cannot access the web console and is intended only for application access. This user can read and write data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='views_admin', display_name='Views Admin', description='Can create and manage views of a given bucket. This user can access the web console. This user can read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='views_reader', display_name='Views Reader', description='Can read data from the views of a given bucket. This user cannot access the web console and is intended only for application access. This user can read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='replication_admin', display_name='XDCR Admin', description='Can administer XDCR features to create cluster references and replication streams out of this cluster. This user can access the web console. This user can read some data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='data_reader', display_name='Data Reader', description='Can read data from a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user can read data, but cannot write it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='data_writer', display_name='Data Writer', description='Can write data to a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user can write data, but cannot read it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='data_dcp_reader', display_name='Data DCP Reader', description='Can initiate DCP streams for a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user can read data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='data_backup', display_name='Data Backup & Restore', description='Can backup and restore a given bucket\x19s data. This user cannot access the web console and is intended only for application access. This user can read data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='data_monitoring', display_name='Data Monitor', description='Can read statistics for a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user cannot read data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='fts_admin', display_name='Search Admin', description='Can administer all Full Text Search features. This user can access the web console. This user can read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='fts_searcher', display_name='Search Reader', description='Can query Full Text Search indexes for a given bucket, scope or collection. This user can access the web console. This user can read some data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_select', display_name='Query Select', description='Can execute a SELECT statement on a given bucket, scope or collection to retrieve data. This user can access the web console and can read data, but not write it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_update', display_name='Query Update', description='Can execute an UPDATE statement on a given bucket, scope or collection to update data. This user can access the web console and write data, but cannot read it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_insert', display_name='Query Insert', description='Can execute an INSERT statement on a given bucket, scope or collection to add data. This user can access the web console and insert data, but cannot read it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_delete', display_name='Query Delete', description='Can execute a DELETE statement on a given bucket, scope or collection to delete data. This user can access the web console, but cannot read data. This user can delete data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_manage_index', display_name='Query Manage Index', description='Can manage indexes for a given bucket, scope or collection. This user can access the web console, but cannot read data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_system_catalog', display_name='Query System Catalog', description='Can look up system catalog information via N1QL. This user can access the web console, but cannot read user data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_external_access', display_name='Query CURL Access', description='Can execute the CURL statement from within N1QL. This user can access the web console, but cannot read data (within Couchbase).', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_manage_global_functions', display_name='Manage Global Functions', description='Can manage global n1ql functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_execute_global_functions', display_name='Execute Global Functions', description='Can execute global n1ql functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_manage_functions', display_name='Manage Scope Functions', description='Can manage n1ql functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='query_execute_functions', display_name='Execute Scope Functions', description='Can execute n1ql functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='query_manage_global_external_functions', display_name='Manage Global External Functions', description='Can manage global external language functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_execute_global_external_functions', display_name='Execute Global External Functions', description='Can execute global external language functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_manage_external_functions', display_name='Manage Scope External Functions', description='Can manage external language functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='query_execute_external_functions', display_name='Execute Scope External Functions', description='Can execute external language functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='replication_target', display_name='XDCR Inbound', description='Can create XDCR streams into a given bucket. This user cannot access the web console or read any data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='analytics_manager', display_name='Analytics Manager', description='Can manage Analytics local links. Can manage datasets on a given bucket. Can query datasets created on this bucket. This user can access the web console and read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='analytics_reader', display_name='Analytics Reader', description='Can query datasets. This is a global role as datasets may be created on different buckets. This user can access the web console and read some data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='analytics_select', display_name='Analytics Select', description='Can query datasets on a given bucket, scope or collection. This user can access the web console and read some data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='analytics_admin', display_name='Analytics Admin', description='Can manage dataverses. Can manage all Analytics links. Can manage all datasets. This user can access the web console but cannot read data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='mobile_sync_gateway', display_name='Sync Gateway', description='Full access to bucket data as required by Sync Gateway. This user cannot access the web console and is intended only for use by Sync Gateway. This user can read and write data, manage indexes and views, and read some cluster information.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='external_stats_reader', display_name='External Stats Reader', description='Access to /metrics endpoint for Prometheus integration. Can read all stats for all services. This user cannot access the web console', ce=True, bucket_name=None, scope_name=None, collection_name=None)]
          

          david.kelly David Kelly added a comment - This is fixed in the upcoming 3.0.7 release. Hitting a 7.0 server, I get: [RawRoleAndDescription(role='admin', display_name='Full Admin', description='Can manage all cluster features (including security). This user can access the web console. This user can read and write all data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='ro_admin', display_name='Read-Only Admin', description='Can view all cluster statistics. This user can access the web console. This user can read some data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='security_admin', display_name='Security Admin', description='Can view all cluster statistics and manage user roles, but not grant Full Admin or Security Admin roles to other users or alter their own role. This user can access the web console. This user cannot read data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='cluster_admin', display_name='Cluster Admin', description='Can manage all cluster features except security. This user can access the web console. This user cannot read data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='bucket_admin', display_name='Bucket Admin', description='Can manage ALL bucket features for a given bucket (including start/stop XDCR). This user can access the web console. This user cannot read data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='scope_admin', display_name='Manage Collections in Scope', description='Can create/delete collections within a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='bucket_full_access', display_name='Application Access', description='Full access to bucket data. This user cannot access the web console and is intended only for application access. This user can read and write data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='views_admin', display_name='Views Admin', description='Can create and manage views of a given bucket. This user can access the web console. This user can read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='views_reader', display_name='Views Reader', description='Can read data from the views of a given bucket. This user cannot access the web console and is intended only for application access. This user can read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='replication_admin', display_name='XDCR Admin', description='Can administer XDCR features to create cluster references and replication streams out of this cluster. This user can access the web console. This user can read some data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='data_reader', display_name='Data Reader', description='Can read data from a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user can read data, but cannot write it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='data_writer', display_name='Data Writer', description='Can write data to a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user can write data, but cannot read it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='data_dcp_reader', display_name='Data DCP Reader', description='Can initiate DCP streams for a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user can read data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='data_backup', display_name='Data Backup & Restore', description='Can backup and restore a given bucket\x19s data. This user cannot access the web console and is intended only for application access. This user can read data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='data_monitoring', display_name='Data Monitor', description='Can read statistics for a given bucket, scope or collection. This user cannot access the web console and is intended only for application access. This user cannot read data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='fts_admin', display_name='Search Admin', description='Can administer all Full Text Search features. This user can access the web console. This user can read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='fts_searcher', display_name='Search Reader', description='Can query Full Text Search indexes for a given bucket, scope or collection. This user can access the web console. This user can read some data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_select', display_name='Query Select', description='Can execute a SELECT statement on a given bucket, scope or collection to retrieve data. This user can access the web console and can read data, but not write it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_update', display_name='Query Update', description='Can execute an UPDATE statement on a given bucket, scope or collection to update data. This user can access the web console and write data, but cannot read it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_insert', display_name='Query Insert', description='Can execute an INSERT statement on a given bucket, scope or collection to add data. This user can access the web console and insert data, but cannot read it.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_delete', display_name='Query Delete', description='Can execute a DELETE statement on a given bucket, scope or collection to delete data. This user can access the web console, but cannot read data. This user can delete data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_manage_index', display_name='Query Manage Index', description='Can manage indexes for a given bucket, scope or collection. This user can access the web console, but cannot read data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='query_system_catalog', display_name='Query System Catalog', description='Can look up system catalog information via N1QL. This user can access the web console, but cannot read user data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_external_access', display_name='Query CURL Access', description='Can execute the CURL statement from within N1QL. This user can access the web console, but cannot read data (within Couchbase).', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_manage_global_functions', display_name='Manage Global Functions', description='Can manage global n1ql functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_execute_global_functions', display_name='Execute Global Functions', description='Can execute global n1ql functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_manage_functions', display_name='Manage Scope Functions', description='Can manage n1ql functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='query_execute_functions', display_name='Execute Scope Functions', description='Can execute n1ql functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='query_manage_global_external_functions', display_name='Manage Global External Functions', description='Can manage global external language functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_execute_global_external_functions', display_name='Execute Global External Functions', description='Can execute global external language functions', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='query_manage_external_functions', display_name='Manage Scope External Functions', description='Can manage external language functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='query_execute_external_functions', display_name='Execute Scope External Functions', description='Can execute external language functions for a given scope', ce=True, bucket_name='*', scope_name='*', collection_name=None), RawRoleAndDescription(role='replication_target', display_name='XDCR Inbound', description='Can create XDCR streams into a given bucket. This user cannot access the web console or read any data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='analytics_manager', display_name='Analytics Manager', description='Can manage Analytics local links. Can manage datasets on a given bucket. Can query datasets created on this bucket. This user can access the web console and read some data.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='analytics_reader', display_name='Analytics Reader', description='Can query datasets. This is a global role as datasets may be created on different buckets. This user can access the web console and read some data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='analytics_select', display_name='Analytics Select', description='Can query datasets on a given bucket, scope or collection. This user can access the web console and read some data.', ce=True, bucket_name='*', scope_name='*', collection_name='*'), RawRoleAndDescription(role='analytics_admin', display_name='Analytics Admin', description='Can manage dataverses. Can manage all Analytics links. Can manage all datasets. This user can access the web console but cannot read data.', ce=True, bucket_name=None, scope_name=None, collection_name=None), RawRoleAndDescription(role='mobile_sync_gateway', display_name='Sync Gateway', description='Full access to bucket data as required by Sync Gateway. This user cannot access the web console and is intended only for use by Sync Gateway. This user can read and write data, manage indexes and views, and read some cluster information.', ce=True, bucket_name='*', scope_name=None, collection_name=None), RawRoleAndDescription(role='external_stats_reader', display_name='External Stats Reader', description='Access to /metrics endpoint for Prometheus integration. Can read all stats for all services. This user cannot access the web console', ce=True, bucket_name=None, scope_name=None, collection_name=None)]

          David Kelly is there a patch set I can use to verify this? 

          korrigan.clark Korrigan Clark (Inactive) added a comment - David Kelly  is there a patch set I can use to verify this? 
          david.kelly David Kelly added a comment - - edited

          Korrigan Clark It is in the latest python client – we released 3.0.7 last week. I used that to verify above. Also I'm using latest 7.0 server – 3938.

          david.kelly David Kelly added a comment - - edited Korrigan Clark It is in the latest python client – we released 3.0.7 last week. I used that to verify above. Also I'm using latest 7.0 server – 3938.

          People

            david.kelly David Kelly
            korrigan.clark Korrigan Clark (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Gerrit Reviews

                There are no open Gerrit changes

                PagerDuty