On 2015-05-27 19:04, Morgan Fainberg wrote:
Hi Hans,

Thanks for the heads up on this. Let me take a closer look and make sure we 
have this addressed
(and tested for) in the upstream code base.

I think I know where this came from. I'll check to make sure we don't already 
have a bug on this
and/or if you have an open bug in launchpad. If this is still outstanding I'll 
make sure we

https://bugs.launchpad.net/keystone/+bug/1459412

Please let me know if you want more logs or want me to try a patch.

Thanks,
Hans


prioritize getting this cleaned up appropriately. Having Fernet (non-persistent 
tokens) as a
solid option for Keystone deployment is really important to us (the upstream 
team) since it
solves a major scaling issue with Keystone.

--Morgan

Sent via mobile

On May 27, 2015, at 05:46, Hans Feldt <hans.fe...@ericsson.com> wrote:

Hi,

When playing with some keystone deployment alternatives I stumble on a keystone 
issue:

2015-05-27 12:11:52.946 57 DEBUG keystone.common.ldap.core [-] LDAP search:
base=ou=Groups,dc=acme,dc=org scope=1
filterstr=(&(&(objectClass=groupOfNames)(member=uid=john,ou=Users,dc=acme,dc=org))(objectClass=groupOfNames))
attrs=['ou', 'cn', 'description'] attrsonly=0 search_s
/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py:931 2015-05-27 
12:11:52.946 57
DEBUG keystone.common.ldap.core [-] LDAP unbind unbind_s
/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py:904 2015-05-27 
12:11:52.946 57
DEBUG keystone.identity.core [-] ID Mapping - Domain ID: default, Default 
Driver: True,
Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping
/usr/lib/python2.7/dist-packages/keystone/identity/core.py:492 2015-05-27 
12:11:52.955 57
ERROR keystone.token.providers.fernet.token_formatters [-] john 2015-05-27 
12:11:52.955 57
ERROR keystone.common.wsgi [-] badly formed hexadecimal UUID string 2015-05-27 
12:11:52.955
57 TRACE keystone.common.wsgi Traceback (most recent call last): 2015-05-27 
12:11:52.955 57
TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/dist-packages/keystone/common/wsgi.py",
line 239, in __call__ 2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi     
result =
method(context, **params) 2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi 
  File
"/usr/lib/python2.7/dist-packages/keystone/auth/controllers.py", line 397, in
authenticate_for_token 2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi
parent_audit_id=token_audit_id) 2015-05-27 12:11:52.955 57 TRACE 
keystone.common.wsgi   File
"/usr/lib/python2.7/dist-packages/keystone/token/provider.py", line 344, in 
issue_v3_token
2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi     parent_audit_id) 
2015-05-27
12:11:52.955 57 TRACE keystone.common.wsgi   File
"/usr/lib/python2.7/dist-packages/keystone/token/providers/fernet/core.py", 
line 198, in
issue_v3_token 2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi
federated_info=federated_dict) 2015-05-27 12:11:52.955 57 TRACE 
keystone.common.wsgi   File
"/usr/lib/python2.7/dist-packages/keystone/token/providers/fernet/token_formatters.py",
 line
133, in create_token 2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi     
audit_ids)
2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi   File
"/usr/lib/python2.7/dist-packages/keystone/token/providers/fernet/token_formatters.py",
 line
416, in assemble 2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi     
b_user_id =
cls.convert_uuid_hex_to_bytes(user_id) 2015-05-27 12:11:52.955 57 TRACE 
keystone.common.wsgi
File 
"/usr/lib/python2.7/dist-packages/keystone/token/providers/fernet/token_formatters.py",
line 239, in convert_uuid_hex_to_bytes 2015-05-27 12:11:52.955 57 TRACE 
keystone.common.wsgi
uuid_obj = uuid.UUID(uuid_string) 2015-05-27 12:11:52.955 57 TRACE 
keystone.common.wsgi
File "/usr/lib/python2.7/uuid.py", line 134, in __init__ 2015-05-27 
12:11:52.955 57 TRACE
keystone.common.wsgi     raise ValueError('badly formed hexadecimal UUID 
string') 2015-05-27
12:11:52.955 57 TRACE keystone.common.wsgi ValueError: badly formed hexadecimal 
UUID string
2015-05-27 12:11:52.955 57 TRACE keystone.common.wsgi 2015-05-27 12:11:52.958 
57 INFO
eventlet.wsgi.server [-] 172.17.0.26 - - [27/May/2015 12:11:52] "POST 
/v3/auth/tokens
HTTP/1.1" 500 490 0.029590

Switching to UUID tokens it works. Switching to SQL Identity backend and fernet 
tokens works.

The combination of LDAP identity backend and fernet tokens gives me the above 
log for any
request with name/password. Reproducable always.

I have a very minimalistic "cloud" setup with only 2 or 3 docker containers. 
One with the SQL
DB, one for Keystone and optionally one for LDAP.

I use Ubuntu 15.04 as base image for my containers that includes Kilo. I've 
patched keystone
with the following changeset to make it work (with LDAP):

commit 2c6db4a3bb9e1718744b0e5b03af050fd2866182 Author: Edmund Rhudy 
<erh...@bloomberg.net>
Date:   Thu May 21 12:42:40 2015 -0400

Make sure LDAP filter is constructed correctly

Thanks, Hans

_______________________________________________ Mailing list:
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack Post to     :
openstack@lists.openstack.org Unsubscribe :
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack


_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to