Bug 1187706 - problems with puppet-keystone LDAP support
Summary: problems with puppet-keystone LDAP support
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-puppet-modules
Version: 6.0 (Juno)
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: z2
: 6.0 (Juno)
Assignee: Ivan Chavero
QA Contact: Mike Abrams
URL:
Whiteboard:
Depends On:
Blocks: 1172310 1172315 1194810
TreeView+ depends on / blocked
 
Reported: 2015-01-30 17:45 UTC by Rich Megginson
Modified: 2023-02-22 23:02 UTC (History)
9 users (show)

Fixed In Version: openstack-puppet-modules-2014.2.12-1.el7ost
Doc Type: Bug Fix
Doc Text:
Clone Of: 1185960
Environment:
Last Closed: 2015-04-07 15:10:23 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
script to set up ldap server and run packstack (7.92 KB, text/x-shellscript)
2015-03-18 14:50 UTC, Rich Megginson
no flags Details


Links
System ID Private Priority Status Summary Last Updated
OpenStack gerrit 150041 0 None None None Never
Red Hat Product Errata RHSA-2015:0789 0 normal SHIPPED_LIVE Important: openstack-packstack and openstack-puppet-modules security and bug fix update 2015-04-07 19:08:02 UTC

Description Rich Megginson 2015-01-30 17:45:05 UTC
+++ This bug was initially created as a clone of Bug #1185960 +++

Description of problem:


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

--- Additional comment from Rich Megginson on 2015-01-26 12:13:36 EST ---

When using Keystone with an LDAP identity backend, the default_project_id is not stored in the entry e.g. openstack user list and user show will display an empty project.  openstack user role list --project must be used to test if the user is a member of the tenant/project.  The puppet-keystone module needs to be aware of how to handle tenant/project when there is an LDAP backend.

Note that this particular change also depends on the switch of puppet-keystone to use the openstack client instead of the keystone client.

Comment 3 Ivan Chavero 2015-02-11 05:28:38 UTC
This patch has been added to the OPM repo https://github.com/stackforge/puppet-keystone/tree/stable/juno

Can i have acks in order to build the package?

Comment 4 Rich Megginson 2015-02-25 15:18:11 UTC
(In reply to Ivan Chavero from comment #3)
> This patch has been added to the OPM repo
> https://github.com/stackforge/puppet-keystone/tree/stable/juno
> 
> Can i have acks in order to build the package?

Looks like you have the acks - can you build the package now?

Comment 5 Jason Guiditta 2015-03-05 14:11:19 UTC
Ivan we need this to test Rich's patch for ofi, is there a build we can use at this time?  Thanks

Comment 7 Mike Abrams 2015-03-18 14:28:54 UTC
Nathan, any meaningful way to test this without an AD/IPA server?

Comment 8 Rich Megginson 2015-03-18 14:47:00 UTC
(In reply to Mike Abrams from comment #7)
> Nathan, any meaningful way to test this without an AD/IPA server?

Do you mean, as opposed to some other LDAP server?  You need some sort of LDAP server.  I did my testing with "plain" 389:
* yum install 389-ds-base
* setup-ds.pl - use dc=example,dc=com as the suffix

I did my installer testing using packstack.  See http://richmegginson.livejournal.com/25156.html

Comment 9 Rich Megginson 2015-03-18 14:50:30 UTC
Created attachment 1003267 [details]
script to set up ldap server and run packstack

I copied and pasted excerpts of a script I use (in a cloud-init) to set up a VM to test puppet code using packstack.  This will set up an LDAP server (389) and configure packstack to set up Keystone with an LDAP identity backend.  If you uncomment PRECREATE_USERS this will set up Keystone with a read-only LDAP backend, otherwise, it will use read-write.

Comment 10 Mike Abrams 2015-03-22 11:44:06 UTC
sanity against the latest puddle connected to an IPA ldap server yields successes across the board.  

One caveat is that the negative token test for the user portion now fails on 500 and not on 401; see this bug for more information:  https://bugzilla.redhat.com/show_bug.cgi?id=1204460

Final result:  VERIFIED

Comment 13 errata-xmlrpc 2015-04-07 15:10:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-0789.html


Note You need to log in before you can comment on or make changes to this bug.