On 11/24/2015 10:50 AM, Henry Nash wrote:
Some good ideas here, Adam.  I would think that some of the real “diagnostic 
APIs” might only be available via keystone-manage, rather than an exposed API.


I'd like to get away from the assumption that you have physical access to the machines to do operations like these. The "config in the database" approach means that this stuff is going to be far more dispersed. So, while and Admin-only API might be appropriate, it should still be remotely accessable.


Henry
On 24 Nov 2015, at 03:07, Adam Young <ayo...@redhat.com> wrote:

Figuring out what is or is not going to work when a user tries to perform an 
operation in OpenStack can be frustrating.  I've had a few people ask me for 
help specifically for configuring LDAP.  With Federation , things will get 
better.  I mean Worse.

What kind of diagnostic tooling do we need?  I know the basics:

If I have a known good user in LDAP, can they

Looks like I over edited here. Should have read "can they authenticate using that account."


  .  This is the first thing, and it can be done by asking for an unscoped 
token.

Once they have an unscoped token, can they get a scoped token?  Same as before, 
but adding the project ID or domain name/project name to the token request.

OK...what about if the users don't want to give you their password? With LDAP, 
we can do OpenStack user show to see if the user is in the backend.  With 
Federation...not so much.


Recently, I was trying to debug an issue where a server create failed due to 
errors in the service to service communication; Neutron could not make the call 
it needed to Nova due to the service user not having the Admin role.  The thing 
is, the service user was not an actual user, but rather a Service principal 
authenticate via Kerberos.  I think this is an indicator of the things to come.


We need an API that will show, given as set of post-validated credentials, 
communicated via Federation, what will the token validation response look like. 
 We'll need user domain id, user id, project, roles, and service catalog.

What else do we need diagnostically?  I know that setting up LDAP is especially 
tricky, and multiple LDAP backends, added in live config, using the Database 
backend, is going to be particularly painful to troubleshoot.  We need to be 
able to start with:

Is the LDAP account used to fetch users working properly?
If not, what do  the Actual LDAP queries look like?  Ideally, something we 
could pipe right into ldapsearch to confirm from the command line.

Then, take a real user, and act like they are trying to authenticate, list the 
groups they should have, the roles they would be assigned, and the service 
catalog.  We need this stuff piece by piece, to be able to troubleshoot.

Is there anything I am missing here? We are not going to have the luxury of 
cranking up logging and looking at data in a live running server;  My friend 
Hippa Sarbanes-Oxley has told me point blank that is a no-go.


__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to