[Yahoo-eng-team] [Bug 1505256] [NEW] Potential user_id collision between Federated IdPs

2015-10-12 Thread Adam Young
Public bug reported: User Ids cannot be something sepcified entirely by the Federation providers. If they are, there are a handful of potential problems: 1. The userId specified will be too big for the colum (varchar 64) 2. Two different Identity Providers can provide the same value for user_i

[Yahoo-eng-team] [Bug 1240163] Re: Can't store a PKI token with a large catalog

2015-11-19 Thread Adam Young
Due to a security issue with PKI tokens, we are going to stop supporting PKI and we will move people on to Fernet as a replacement. Thus, no new features will be implemented for PKI tokens ** Changed in: keystone Importance: High => Wishlist ** Changed in: keystone Status: Triaged => W

[Yahoo-eng-team] [Bug 1425174] Re: explicit unscoped token request does not match spec

2015-11-19 Thread Adam Young
Was fixed in commit 98732367e384b89c9ff9dd632be870e774083b94 ** Changed in: keystone Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad

[Yahoo-eng-team] [Bug 1476264] Re: Cannot delete resources in remote services once project is deleted

2015-11-19 Thread Adam Young
This is not a problem with current policy/approach. The approach to fix 968696 will also ensure this continues to work. ** Changed in: keystone Status: In Progress => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to

[Yahoo-eng-team] [Bug 1282676] Re: Error 500 when trying to set empty description with LDAP

2015-11-19 Thread Adam Young
We have depreaced the LDAP project back end. Even for identity, we are focusing on Read-Only, and not Read Write. Please reopen if this is still an issue. ** Changed in: keystone Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Eng

[Yahoo-eng-team] [Bug 1242620] Re: "Unable to add token to revocation list" warning happened when revoking token in memcache

2015-11-20 Thread Adam Young
Moving to Fernet tokens. Revocations will be handled by revocation events, not revocation list. Memcache as a storage mechanism for PKI tokens was deeply flawed, as dropping tokens from Memcache effectively unrevoked them. ** Changed in: keystone Status: Triaged => Won't Fix -- You rece

[Yahoo-eng-team] [Bug 1515825] Re: Horizon allows login without credential when configured to use WebSSO

2015-11-24 Thread Adam Young
Needs 3 things: 1. Feature in Keystone to track the WebSSO logout URL comparable to the login URL 2. A way to communicate this to Horizon 3. A tie in to Horizon to call the URL in order to logout. Since Keystone manages websso login, it should do the logout directly as well. ** Changed in: ke

[Yahoo-eng-team] [Bug 1354765] [NEW] Valid V3 tokens reported as invalid

2014-08-09 Thread Adam Young
Public bug reported: Use CURL to get an admin token and use it to perform list domains will result in a failure. Get an unscoped token: $ cat token-request-admin.json { "auth": { "identity": { "methods": [ "password" ], "password

[Yahoo-eng-team] [Bug 1278843] Re: Neutron doesn't report using a stale CA certificate

2014-08-11 Thread Adam Young
** Also affects: keystonemiddleware Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1278843 Title: Neutron doesn't report using a stale CA cert

[Yahoo-eng-team] [Bug 1356682] [NEW] GET /v3/users lists users in all domains

2014-08-13 Thread Adam Young
Public bug reported: The behaviour of this API is different if CONF.identity.domain_specific_drivers_enabled is set or not. If it is not set, then listing user shows for all domains. If it is set, even for SQL, only a single domain is listed. The correct behavior would be to only list users for

[Yahoo-eng-team] [Bug 1355125] Re: keystonemiddleware appears not to hash PKIZ tokens

2014-08-15 Thread Adam Young
** Also affects: python-keystoneclient Importance: Undecided Status: New ** No longer affects: keystone ** Changed in: python-keystoneclient Assignee: (unassigned) => Adam Young (ayoung) -- You received this bug notification because you are a member of Yahoo! Engineering T

[Yahoo-eng-team] [Bug 1366020] [NEW] LDAP Identity does not convert ID to DN for lookup

2014-09-05 Thread Adam Young
Public bug reported: there is a disconnect between how Identity gets users for Authentication and how it creates users. When creating a user, deleting a user, etc, the identity code calls: conn.add_s(self._id_to_dn(values['id']), attrs) Which attempts to convert an id to a dn t

[Yahoo-eng-team] [Bug 1367952] [NEW] Trust execution fails when trustor is in LDAP

2014-09-10 Thread Adam Young
. ** Affects: keystone Importance: Undecided Assignee: Adam Young (ayoung) Status: In Progress -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1367952 Title: Trust

[Yahoo-eng-team] [Bug 1220995] Re: Keystone running under apache HTTPD v2.0 API token revocation and validation limitation

2013-09-18 Thread Adam Young
In order to validate a PKI token via the Keystone API, use the MD5 hash of the token instead of the original token. This is short enough for all URLs. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1199880] Re: test_users.py:UsersTestJSON.test_create_user - Wrong expected response status

2013-09-27 Thread Adam Young
** Changed in: keystone Status: New => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1199880 Title: test_users.py:UsersTestJSON.test_create_user - Wrong expected respo

[Yahoo-eng-team] [Bug 1182481] Re: Keystone causing high mySQL usage

2013-10-08 Thread Adam Young
** Changed in: keystone Status: Expired => Confirmed ** Changed in: keystone Assignee: (unassigned) => Adam Young (ayoung) -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.ne

[Yahoo-eng-team] [Bug 1020127] Re: proxy-server Error: Second simultaneous read or write detected

2013-11-19 Thread Adam Young
No fix necessary in Keystone server ** Changed in: keystone Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1020127 Title: proxy-server Error:

[Yahoo-eng-team] [Bug 1255335] Re: v2 token request always allow external auth method

2013-12-05 Thread Adam Young
** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1255335 Title: v2 token request always allow external auth method Status in OpenSta

[Yahoo-eng-team] [Bug 1176190] Re: 'openssl' returned non-zero exit status 4 w/ SSL enabled

2013-12-05 Thread Adam Young
** Changed in: keystone Status: Expired => Confirmed ** Changed in: keystone Assignee: (unassigned) => Adam Young (ayoung) ** Project changed: keystone => python-keystoneclient -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1266812] [NEW] Keystone spamming log with deprecation warnings

2014-01-07 Thread Adam Young
Public bug reported: ONce the startup finishes, the log is currently filled with line after line of 2014-01-07 16:55:04.871 29654 WARNING keystone.common.utils [-] Deprecated: v2 API is deprecated as of Icehouse in favor of v3 API and may be removed in K. ** Affects: keystone Importance: Un

[Yahoo-eng-team] [Bug 1266921] [NEW] Log entry when a regular user does "keystone user-list" is not helpfu

2014-01-07 Thread Adam Young
Public bug reported: "keystone user-list" is an admin only command. When a regular user tries to execute it, you get a helpful response at the command line: [root@rhel ~(keystone_username)]# keystone user-list You are not authorized to perform the requested action: admin_required (HTTP 403) Ho

[Yahoo-eng-team] [Bug 1266926] [NEW] log files should reveal source of the request

2014-01-07 Thread Adam Young
Public bug reported: Created attachment 713099 [details] token logs Description of problem: Keystone log files should reveal the source of the token (ip address). I create a mis-configuration where i had two different setups (A & B ) by mistake i configure keystone quantum end-point in setup A

[Yahoo-eng-team] [Bug 1071865] Re: Keystone PKI token length hits cookie size limit

2013-02-07 Thread Adam Young
** Changed in: keystone Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1071865 Title: Keystone PKI token length hits cook

[Yahoo-eng-team] [Bug 1046884] Re: Code duplication between memcached and kvs backends

2013-02-19 Thread Adam Young
Better to get rid of the KVS backend all together ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1046884 Title: Code duplica

[Yahoo-eng-team] [Bug 1101276] Re: Domain support missing in LDAP

2013-05-03 Thread Adam Young
implemented in 5cb8e1f2e5e12cf7e8c6bce91af53b901f6254a9 ** Changed in: keystone Status: New => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1101276 Title: Domain

[Yahoo-eng-team] [Bug 1119641] Re: PKI support breaks memcache token backend

2013-05-22 Thread Adam Young
If it does it is a different problem. This was an error storing tokens and was specific to the memcached backend. ** Changed in: python-keystoneclient Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to

[Yahoo-eng-team] [Bug 1020127] Re: proxy-server Error: Second simultaneous read or write detected

2013-05-22 Thread Adam Young
** Changed in: python-keystoneclient Status: New => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1020127 Title: proxy-server Error: Second simultaneous read or wri

[Yahoo-eng-team] [Bug 1010010] Re: Support Kerberos authentication in Keystone

2013-07-23 Thread Adam Young
** Changed in: keystone Status: Triaged => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1010010 Title: Support Kerberos authentication in Keystone Status in OpenS

[Yahoo-eng-team] [Bug 1031008] Re: Report better error when signing dir is not writable

2013-07-31 Thread Adam Young
** Changed in: keystone Status: Triaged => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1031008 Title: Report better error when signing dir is not writable Status

[Yahoo-eng-team] [Bug 1064419] Re: Use inmemory SQLite database for SQL unittests

2013-07-31 Thread Adam Young
This is no longer an issue. The database is now saved in tests/tmp. The tests/tmp directory can be mounted in a ram disk, bypasing the tox issue. ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team

[Yahoo-eng-team] [Bug 1211643] Re: Update user name failed with LDAP back end by CLI

2013-08-13 Thread Adam Young
As you can see from the original code, this was a deliberate implementation decision. Neither the SQL nor the LDAP code allows modification of the usernames. Please respond here why you need this change. ** Changed in: keystone Status: In Progress => Invalid -- You received this bug not

[Yahoo-eng-team] [Bug 968696] Re: "admin"-ness not properly scoped

2021-05-04 Thread Adam Young
** Changed in: neutron Status: Triaged => Fix Committed ** Changed in: nova Status: In Progress => Fix Committed ** Changed in: puppet-keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscri

[Yahoo-eng-team] [Bug 1939879] Re: Failed to discover available identity versions when contacting http://controller1:35357/v3. Attempting to parse version from URL.

2021-09-28 Thread Adam Young
The Keystone server was down and the message was reported by the client. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.n

[Yahoo-eng-team] [Bug 1936686] Re: Install and configure in keystone: after keystone installation, there is no /etc/keystone folder

2021-09-28 Thread Adam Young
THis is an installer specific issue and not with the Keystone upstream project. The .deb should be creating the /etc/keytstone directory on install. PLease open the bug with the packager. Note that the page linked is specific to Ubuntu. ** Changed in: keystone Status: New => Invalid --

[Yahoo-eng-team] [Bug 1824239] [NEW] predictable role ids

2019-04-10 Thread Adam Young
Public bug reported: Make it possible to know what the ID of a role will be prior to creating it. This allows synchronization between multiple keystone servers ** Affects: keystone Importance: Undecided Assignee: Adam Young (ayoung) Status: In Progress -- You received this

[Yahoo-eng-team] [Bug 1827420] [NEW] Document issues with deep nesting of Quota/limits

2019-05-02 Thread Adam Young
Public bug reported: I wrote up the issues with gaming the system that can happen with deep quotas. This has driven what happened with 2 level quota in unified limites. https://adam.younglogic.com/2018/05/tracking-quota/ This should merge in with the documentation to explain why we limit things

[Yahoo-eng-team] [Bug 1832848] [NEW] Set Project ID for synchronization across servers

2019-06-14 Thread Adam Young
Public bug reported: Identifiers Each resource in Keystone has a unique identifier. For the majority of resources, the identifiers are currently generated as UUIDs. In addition, the identifiers are assigned by the system, and are not something an end user can specify when creating the resource. T

[Yahoo-eng-team] [Bug 1842397] Re: Possibility for project level roles ?

2019-09-03 Thread Adam Young
For these kinds of operations, you use role assignment inheritance. Do not attempt to enforce policy on parent project ID. I wrote up an article about this about a year back. CloudForms is just the consumer, but the rules are the same. https://adam.younglogic.com/2018/02/openstack-hmt-cloudfor

[Yahoo-eng-team] [Bug 968696] Re: "admin"-ness not properly scoped

2023-03-24 Thread Adam Young
If it is not fixed in Nova it is not fixed in Keystone, as the solution has to start there. ** Changed in: keystone Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keyst

[Yahoo-eng-team] [Bug 1643301] Re: bootstrapping keystone failed when LDAP backend is in use

2018-07-02 Thread Adam Young
I'm closing this Won't fix because running with the LDAP backend is a bad approach. Use SQL, with LDAP in a domain specific back end. ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is s

[Yahoo-eng-team] [Bug 1780159] Re: Some inherited projects missing when listing user's projects

2018-07-05 Thread Adam Young
** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1780159 Title: Some inherited projects missing when listing use

[Yahoo-eng-team] [Bug 1780159] Re: Some inherited projects missing when listing user's projects

2018-07-09 Thread Adam Young
** Changed in: keystone Status: Invalid => New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1780159 Title: Some inherited projects missing when listing use

[Yahoo-eng-team] [Bug 1782197] [NEW] Mapping Engine Tester is untested

2018-07-17 Thread Adam Young
Public bug reported: Looking at a coverage report for the Keystone CLI shows that the entirety of class MappingEngineTester(BaseApp): Is untested. Since this is production and supported code, this is a risk. ** Affects: keystone Importance: Undecided Status: New -- You received

[Yahoo-eng-team] [Bug 1790428] Re: Keystone policy.json not matching domain_id

2018-09-11 Thread Adam Young
Just to be clear, this has always been the case. THe documentation for the cloud sample stated it needed to be edited. Of course, I tripped over this exact problem. A few times. I once proposed reading policy values from the config file as a work around. But this is not a bug. As Lance put, w

[Yahoo-eng-team] [Bug 1793756] [NEW] remote user tests disabled

2018-09-21 Thread Adam Young
Public bug reported: in keystone/tests/unit/test_v3_auth.py there are two tests that have been commented out because they are unrunnable: test_remote_user_with_realm and test_remote_user_with_default_domain These support the External auth mechanism which should be avaialable to people with t

[Yahoo-eng-team] [Bug 1794530] [NEW] Federation IDs hardcode UUIDs instead of configured id_generator

2018-09-26 Thread Adam Young
user in LDAP). THus, the LDAP code can be changed at config time, but the Federated code can't. It also means that Federated IDs cannot be kept in sync between two keystone servers. ** Affects: keystone Importance: Low Assignee: Adam Young (ayoung) Status: In Pro

[Yahoo-eng-team] [Bug 1794527] [NEW] Allow domain creation with a specific ID

2018-09-26 Thread Adam Young
Public bug reported: When keeping two Keystone servers in sync, but avoiding Database replication, it is often necessary to hack the database to update the Domain ID so that entries match. Domain ID is then used for LDAP mapped IDs, and if they don't match, the user IDs are different. It should

[Yahoo-eng-team] [Bug 1794552] [NEW] Flaskification broke ECP

2018-09-26 Thread Adam Young
Public bug reported: THe Federation itegration (not voting) tests for Python35 are failing. == 2018-09-26 06:26:21.371093 | primary | Failed 1 tests - output below: 2018-09-26 06:26:21.371172 | primary | == 2018-09-26 06:26:21.371200 | pri

[Yahoo-eng-team] [Bug 1793756] Re: remote user tests disabled

2018-10-12 Thread Adam Young
After reviewing these tests, I think I can say with confidence that they are not testing code that we support any longer. External plugins work fine, including Kerberos. These tests were Kerberos specific, but we no longer support a specific Kerberos plugin, only the External one. They were test

[Yahoo-eng-team] [Bug 1804073] Re: Keystone fails to log policy target data

2018-11-20 Thread Adam Young
Added Oslo.policy to the bug report, as this is going to be an issue across all of the projects. Barbican, especially, needs target info, but the same is true for anything that enforces the scope check. ** Also affects: oslo.policy Importance: Undecided Status: New -- You received thi

[Yahoo-eng-team] [Bug 1808059] Re: admin user should have admin role in the Default domain

2018-12-12 Thread Adam Young
UNtil recently, this should be in bootstrap. This is the minimal amount of configuration a Keystone server needs: to be able to create a new domain, or create projects on the domain, etc. Now it should be one admin user with a service scoped admin role. From that, all other configuration can flo

[Yahoo-eng-team] [Bug 1719141] [NEW] Kick off Ansible Playbook from Keystone Actions

2017-09-23 Thread Adam Young
Public bug reported: When a Federated User logs in for the first time, many organizations want to be able to provision resources. This is a specific instance of the general idea that a Keystone token operation should be able to kick off a playbook. PLaybooks can perform both Openstack specific a

[Yahoo-eng-team] [Bug 1724645] [NEW] remote_id_attribute config options prevents multiple protocol variations for Federation

2017-10-18 Thread Adam Young
Public bug reported: In order to activate a protocol for Federation, you need SOME value for remote_id_attribute. However , this is set once per protocol in the config file, not in the federated data. Thus, if two different SAML implementations both wanted to use different values for remote_id_a

[Yahoo-eng-team] [Bug 1602081] Re: Use oslo.context's policy dict

2018-01-27 Thread Adam Young
Fixed in Keystone by f71a78db86632dccb391782e62da69a4627c7cad https://review.openstack.org/#/c/523650/ ** Changed in: keystone Assignee: (unassigned) => Adam Young (ayoung) ** Changed in: keystone Status: Triaged => Fix Released ** Changed in: keystone Status: Fix Re

[Yahoo-eng-team] [Bug 968696] Re: "admin"-ness not properly scoped

2016-10-10 Thread Adam Young
Reopening the Keystone one as the fix does not work for default policy, which is what most people use. ** Changed in: keystone Status: Fix Released => In Progress -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. htt

[Yahoo-eng-team] [Bug 1638603] [NEW] Identity LDAP does not support AD nested groups

2016-11-02 Thread Adam Young
Public bug reported: Active Directory has a very specific mechanism to handle nested groups. LDAP queries need to look like this: "(&(objectClass=group)(member=member:1.2.840.113556.1.4.1941:=CN=nwalnut,OU=Users,DC=EXAMPLE,DC=COM))" If a deployment is using nested groups, three queries need to

[Yahoo-eng-team] [Bug 1643112] [NEW] Auth plugins should be linked to Federation Protocol

2016-11-18 Thread Adam Young
Public bug reported: When setting up Federation, if the protocol needs an new auth plugin, the current mechanism is to add it to the methods list for the [auth] section. However, this has the effect of linking them all together, when the real method should be to link the auth plugin with the prot

[Yahoo-eng-team] [Bug 1646305] [NEW] Federation URL is public, but AUTH_URL is private

2016-11-30 Thread Adam Young
Public bug reported: Web SSO will be broken in places where the ssumption that the AUTH_URL that Horizon uses is publically accessible. Conversation with deployer: "keystone is open in haproxy to the public world, but the problem is that horizon forming the SSO url based on the region URL, which

[Yahoo-eng-team] [Bug 1647486] [NEW] sample-data makes incorrect credentials call

2016-12-05 Thread Adam Young
Public bug reported: ADMIN_PASSWORD=keystone tools/sample_data.sh ... lots of stuff working fine ... usage: openstack ec2 credentials create [-h] [-f {json,shell,table,value,yaml}] [-c COLUMN] [--max-width ]

[Yahoo-eng-team] [Bug 1648542] [NEW] keystone does not retry on deadlock Transactions [500 Error]

2016-12-08 Thread Adam Young
Public bug reported: Description of problem: DBDeadlock: (pymysql.err.InternalError) (1213, u'Deadlock found when trying to get lock; try restarting transaction') The above error is retry-able error, but no evidence for keystone would really did a retry before throwing a 500. 2016-11-12 08:55:1

[Yahoo-eng-team] [Bug 1648542] Re: keystone does not retry on deadlock Transactions [500 Error]

2016-12-08 Thread Adam Young
CLosing as a duplicate. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1648542 Title: keystone does not retry

[Yahoo-eng-team] [Bug 1689644] [NEW] Keystone does not report microversion headers

2017-05-09 Thread Adam Young
Public bug reported: Keystone is now behind the other projects in reporting the microversions in the microversion header ** Affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subsc

[Yahoo-eng-team] [Bug 1474284] Re: Adding users from different domain to a group

2015-12-16 Thread Adam Young
Works as designed and specified. The Wiki is wrong. Would not modify away from the existing behavior, either. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identit

[Yahoo-eng-team] [Bug 1534834] [NEW] Policy check forces impersonation for redelgation of trust

2016-01-15 Thread Adam Young
Public bug reported: When redelegating a trust, the API specifies that the trustor_id is the original trustor_id. However, the policy check for create_trust enforces that user_id = trust.trustor_user_id. Effectily limiting the redelgation ofr trusts to trusts which provide impersonation. ** Aff

[Yahoo-eng-team] [Bug 1536321] [NEW] cyclic dependencies in implied roles

2016-01-20 Thread Adam Young
Public bug reported: Today it is possible to define an implied role structure that is not a DAG. This will crash the Keystone server if a token iis requested that will pull in any of those roles. While it might be impractical to prevent cycles in the creation, it is very possible to prevent the

[Yahoo-eng-team] [Bug 1543318] [NEW] Token for trust does not expand implied roles

2016-02-08 Thread Adam Young
user_id=trustee['id'], password=trustee['password'], trust_id=trust['id']) r = self.v3_create_token(auth_data) token = r.result['token'] # This fails self.assertThat(token['roles'], matche

[Yahoo-eng-team] [Bug 1542486] Re: nova-compute stack traces with BadRequest: Specifying 'tenant_id' other than authenticated tenant in request requires admin privileges

2016-02-10 Thread Adam Young
Adding Nova to the bug report because it absolutely should not require a specific version of the Keystone API to make things work. I suspect that there is a workaround here, but the Keystone API and auth plugins are designed to be versionless. This is a step backwards, and should be treated as a

[Yahoo-eng-team] [Bug 1546039] Re: If one trustor role is removed, the trust cannot be used

2016-02-16 Thread Adam Young
Its a feature. A trust is assumed to be the smallest chunk of delegated roles possible to perform an action. If a user does not have all those roles, the trustor should be informed immediately that the trust is no longer viable. ** Changed in: keystone Status: In Progress => Invalid --

[Yahoo-eng-team] [Bug 1546562] [NEW] deleting role with implied role fails

2016-02-17 Thread Adam Young
Public bug reported: Create two roles. Make one imply the other (need curl for now) $ openstack role delete identity_policy_manager ERROR: openstack An unexpected error prevented the server from fulfilling your request. (HTTP 500) (Request-ID: req-a2b89f42-ad24-4985-a599-33cc182d8f80) Looki

[Yahoo-eng-team] [Bug 1546834] [NEW] The deletion of an LDAP domain in keystone when write enabled should not clear the LDAP database

2016-02-17 Thread Adam Young
Public bug reported: Description of problem: Testing multi domain support in RHOS. The deletion of this domain when write enabled cleared the LDAP database entirely. Thankfully this was done in a lab, because LDAP was a total loss. Version-Release number of selected component (if applicable):

[Yahoo-eng-team] [Bug 1588190] Re: policy.v3cloudsample.json broken in mitaka

2016-08-03 Thread Adam Young
I think this is a Horizon bug, not Keystone. The stack trace is all Horizon code. I suspect it is a conflict between domain and project scoped token code in Horizon ** Also affects: horizon Importance: Undecided Status: New -- You received this bug notification because you are a membe

[Yahoo-eng-team] [Bug 1321378] Re: keystone user-role-delete operation fails when user no longer exists in backend

2016-08-29 Thread Adam Young
So...this is a continuing Saga. The fix that went in for Keystone only allows the V3 AP call to continue. However, there is currently no way to call that API except for CURL. Something like: curl -X DELETE -H"X-Auth-Token:$TOKEN" -H "Content-type: application/json" $OS_AUTH_URL/projects/e9d

[Yahoo-eng-team] [Bug 1321378] Re: keystone user-role-delete operation fails when user no longer exists in backend

2016-08-30 Thread Adam Young
Reopening the issue against the Keystone server. The fix was not sufficient, as it was just a workaround, and one that we can't apply via the CLI. The real fix requires avoiding the exception from the identity backend when performing any assignment-backend calls. ** Changed in: keystone S

[Yahoo-eng-team] [Bug 1321378] Re: keystone user-role-* operations fails when user no longer exists in backend

2016-08-30 Thread Adam Young
Closing the Keystone server component again, as I just confirmed the user-list error does not happen in this code base, and thus it is a new bug and a regression. Will open a separate ticket for that. ** Changed in: keystone Status: Confirmed => Fix Released -- You received this bug notif

[Yahoo-eng-team] [Bug 1381961] Re: Keystone API GET 5000/v3 returns wrong endpoint URL in response body

2016-09-02 Thread Adam Young
Reported in a downstream distribution that should have synced from this code as still a bug. please reconfirm. ** Changed in: keystone Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenS

[Yahoo-eng-team] [Bug 1619758] [NEW] Credential Encryption breaks deployments without Fernet

2016-09-02 Thread Adam Young
Public bug reported: A recent change to encrypt credetials broke RDO/Tripleo deployments: 2016-09-02 17:16:55.074 17619 ERROR keystone.common.fernet_utils [req-31d60075-7e0e-401e-a93f-58297cd5439b f2caffbaf10d4e3da294c6366fe19a36 fd71b607cfa84539bf0440915ea2d94b - default default] Either [fern

[Yahoo-eng-team] [Bug 1381961] Re: Keystone API GET 5000/v3 returns wrong endpoint URL in response body

2016-09-12 Thread Adam Young
** Also affects: tripleo Importance: Undecided Status: New ** Changed in: tripleo Status: New => Confirmed ** Changed in: keystone Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscr

[Yahoo-eng-team] [Bug 1627094] [NEW] Keystone overwhelms Ceilometer with Identity Events

2016-09-23 Thread Adam Young
fo: Suggest setting notification_driver to either log or noop in /etc/keystone/keystone.conf ** Affects: keystone Importance: Undecided Assignee: Adam Young (ayoung) Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is sub

[Yahoo-eng-team] [Bug 1627094] Re: Keystone overwhelms Ceilometer with Identity Events

2016-09-23 Thread Adam Young
** Project changed: keystone => ceilometer -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1627094 Title: Keystone overwhelms Ceilometer with Identity Events Statu

[Yahoo-eng-team] [Bug 1410029] Re: Unnecessary conflict wrapper on assignment driver delete_project() method

2016-10-05 Thread Adam Young
Not a bugf, leave the wrapper in for SQL message reporting. ** Changed in: keystone Status: Triaged => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1

[Yahoo-eng-team] [Bug 1476264] [NEW] Cannot delete resources in remote services once project is deleted

2015-07-20 Thread Adam Young
forcing "admin somewhere is admin everywhere" ** Affects: keystone Importance: High Assignee: Adam Young (ayoung) Status: New ** Changed in: keystone Importance: Undecided => High ** Changed in: keystone Assignee: (unassigned) => Adam Young (ayoung) -- Y

[Yahoo-eng-team] [Bug 1475091] Re: Missing name field for trusts

2015-07-22 Thread Adam Young
It appears like this will do little to help the situation, and may in fact make things worse. There is the rist that the description field for a trust might be misleading, and I;d rather have people look at the actual trustee field when determining whay a trust exists, and if it is legitimate. Si

[Yahoo-eng-team] [Bug 1477373] [NEW] No way to convert V2 tokens to V3 if domain id changes

2015-07-22 Thread Adam Young
Public bug reported: While many people are still stuck on V2 tokens, we need a safe way to map them to V3. If they default domain changes, the tokens will not be properly converted. THe best that can be done now is to guess that the domain_id is "default" and the name is "Default" both these va

[Yahoo-eng-team] [Bug 1472285] Re: set default domain dynamically

2015-07-23 Thread Adam Young
Default domain is a "forward compat" feature necessary to let V2 continue to work in a V3 aware keystone. The default domain is a very important domain, and should be part of the core configuration. Changing that on the fly will change the meaning of the V2 tokens, and is not something to be don

[Yahoo-eng-team] [Bug 968696] Re: "admin"-ness not properly scoped

2015-07-24 Thread Adam Young
** Also affects: glance Importance: Undecided Status: New ** Also affects: cinder Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/96869

[Yahoo-eng-team] [Bug 1477373] Re: No way to convert V2 tokens to V3 if domain id changes

2015-07-27 Thread Adam Young
** Changed in: keystone Status: Invalid => New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1477373 Title: No way to convert V2 tokens to V3 if domain id changes Status in Key

[Yahoo-eng-team] [Bug 1334480] Re: remove revocation model

2015-07-28 Thread Adam Young
The code is not moving to client after all. The code in the Server will stand. ** Changed in: keystone Status: Triaged => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/13

[Yahoo-eng-team] [Bug 1464750] Re: Service accounts can be used to login horizon

2015-08-07 Thread Adam Young
It might make sense to have Horizon limit login to users with the Member or Admin roles only. ** Also affects: nova Importance: Undecided Status: New ** Changed in: nova Assignee: (unassigned) => Adam Young (ayoung) -- You received this bug notification because you are a mem

[Yahoo-eng-team] [Bug 1317815] Re: Documentation Keystone SSL configuration lack

2015-08-11 Thread Adam Young
Since we are dropping support for Eventlet based deployments, continuing to document them is counterproductive. Please switch over to using Apache HTTPD. ** Changed in: keystone Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engine

[Yahoo-eng-team] [Bug 1490690] [NEW] Discovery fails for V3 when admin not exposed

2015-08-31 Thread Adam Young
Public bug reported: V3 is not specifically rtied to either public or Admin in the specs, but practically speaking, it is tied to admin; When attempting to use the V3 api and the admin port is not exposed, the followng happens: $ echo $OS_AUTH_URL https://hostname/v3 $ openstack server list E

[Yahoo-eng-team] [Bug 1555137] [NEW] Transition from UUID/PKI to Fernet without dumping all tokens

2016-03-09 Thread Adam Young
Public bug reported: To minimize downtime, the conversion from persisted to ephemeral tokens should happen in two steps. The first migrates tokens over to the Fernet format, but will fall back to persisted store if the requested token is not in Fernet format. The second removes persistence. **

[Yahoo-eng-team] [Bug 1562965] Re: liberty -> mitaka db migrate fails on postgresql 091 migration

2016-03-29 Thread Adam Young
According to conversation in #openstack-keystone, reporter was running this by hand using ipython. The migrations are not designed to run multiple tiumes, and this error was not somthing we would see using the proper migrate mechanism. ** Changed in: keystone Status: New => Invalid -- Y

[Yahoo-eng-team] [Bug 1567446] [NEW] Utilizing Role Base Access Control for managing Multi-tenancy

2016-04-07 Thread Adam Young
Public bug reported: After creating a new project and allocating some amount of resources, we should be able to create a hierarchy of users like Project Manager (PM) having complete view of the project usage, then PM should be able to allocate resources to different sub-teams (like Dev, QA, Prod,

[Yahoo-eng-team] [Bug 1567900] Re: Keystone API has no method to cleanup revocation tree

2016-04-10 Thread Adam Young
Nope. Not going to expose this just for testing. Use direct database access if you want. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https:

[Yahoo-eng-team] [Bug 1568674] [NEW] Revocation events catching too many tokens

2016-04-10 Thread Adam Young
Public bug reported: We've seen an effect where setting the dfefault token handler to Fenet, and depending on Revocation events breaks several tests. These tests are supposed to track that a tokne comes back as invalid. However, what actually happens is the admin users token is invalid, returnin

[Yahoo-eng-team] [Bug 1571001] [NEW] Document Multi ldap support

2016-04-15 Thread Adam Young
Public bug reported: "When defining the URL for connecting to the LDAP server in the Keystone configuration, looking for a way to specify multiple LDAP servers for redundancy. For example if an AD domain controller were not available, Keystone would try an alternate domain controller." This is s

[Yahoo-eng-team] [Bug 1425174] [NEW] explicit unscoped token request does not match spec

2015-02-24 Thread Adam Young
Public bug reported: Spec states: http://git.openstack.org/cgit/openstack/keystone-specs/tree/api/v3 /identity-api-v3.rst#n1779 A user may explicitly request an unscoped token by setting the "scope" value of the token request to the string "unscoped." However the code actaully tests: scope_

[Yahoo-eng-team] [Bug 1427878] Re: cannot use v3 token with v2 services

2015-03-04 Thread Adam Young
The issue is with configuring Nova. When I edited Nova's conf file so that authe vesrion was unset, like this: auth_version= And restarted all the Nova services, it worked. ** Changed in: keystone Importance: Critical => Medium ** Also affects: nova Importance: Undecided Status:

[Yahoo-eng-team] [Bug 1427878] Re: cannot use v3 token with v2 services

2015-03-04 Thread Adam Young
** No longer affects: keystone ** Summary changed: - cannot use v3 token with v2 services + Nova cannot validate v3 token by default -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad

[Yahoo-eng-team] [Bug 1429334] [NEW] Unmatched Groups in Federation Mapping raise errors

2015-03-06 Thread Adam Young
Public bug reported: Mapping groups from REMOTE_USER_GROUPS (or comparable) via the rule: "local": [ { "group": { "name": "{0}", "domain": {"name": "Default"} }

  1   2   >