Some good ideas here, Adam.  I would think that some of the real “diagnostic 
APIs” might only be available via keystone-manage, rather than an exposed API.

Henry
> On 24 Nov 2015, at 03:07, Adam Young <ayo...@redhat.com> wrote:
> 
> Figuring out what is or is not going to work when a user tries to perform an 
> operation in OpenStack can be frustrating.  I've had a few people ask me for 
> help specifically for configuring LDAP.  With Federation , things will get 
> better.  I mean Worse.
> 
> What kind of diagnostic tooling do we need?  I know the basics:
> 
> If I have a known good user in LDAP, can they .  This is the first thing, and 
> it can be done by asking for an unscoped token.
> 
> Once they have an unscoped token, can they get a scoped token?  Same as 
> before, but adding the project ID or domain name/project name to the token 
> request.
> 
> OK...what about if the users don't want to give you their password? With 
> LDAP, we can do OpenStack user show to see if the user is in the backend.  
> With Federation...not so much.
> 
> 
> Recently, I was trying to debug an issue where a server create failed due to 
> errors in the service to service communication; Neutron could not make the 
> call it needed to Nova due to the service user not having the Admin role.  
> The thing is, the service user was not an actual user, but rather a Service 
> principal authenticate via Kerberos.  I think this is an indicator of the 
> things to come.
> 
> 
> We need an API that will show, given as set of post-validated credentials, 
> communicated via Federation, what will the token validation response look 
> like.  We'll need user domain id, user id, project, roles, and service 
> catalog.
> 
> What else do we need diagnostically?  I know that setting up LDAP is 
> especially tricky, and multiple LDAP backends, added in live config, using 
> the Database backend, is going to be particularly painful to troubleshoot.  
> We need to be able to start with:
> 
> Is the LDAP account used to fetch users working properly?
> If not, what do  the Actual LDAP queries look like?  Ideally, something we 
> could pipe right into ldapsearch to confirm from the command line.
> 
> Then, take a real user, and act like they are trying to authenticate, list 
> the groups they should have, the roles they would be assigned, and the 
> service catalog.  We need this stuff piece by piece, to be able to 
> troubleshoot.
> 
> Is there anything I am missing here? We are not going to have the luxury of 
> cranking up logging and looking at data in a live running server;  My friend 
> Hippa Sarbanes-Oxley has told me point blank that is a no-go.
> 
> 
> __________________________________________________________________________
> OpenStack Development Mailing List (not for usage questions)
> Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to