[Yahoo-eng-team] [Bug 1620764] [NEW] migration test fails on table addition

2016-09-06 Thread Alexander Makarov
Public bug reported:

If expand repo migration adds a table, corresponding unit test fails
attempting to access created table with the error "Table does not exist"
[0]

[0] http://logs.openstack.org/88/208488/51/check/gate-keystone-python27
-db-ubuntu-xenial/81311f3/console.html#_2016-09-06_14_27_49_936937

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1620764

Title:
  migration test fails on table addition

Status in OpenStack Identity (keystone):
  New

Bug description:
  If expand repo migration adds a table, corresponding unit test fails
  attempting to access created table with the error "Table does not
  exist" [0]

  [0] http://logs.openstack.org/88/208488/51/check/gate-keystone-
  python27-db-ubuntu-
  xenial/81311f3/console.html#_2016-09-06_14_27_49_936937

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1620764/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1569389] [NEW] set_config_defaults() never called on testing

2016-04-12 Thread Alexander Makarov
Public bug reported:

I can even put a line 
None[0]
in the keystone.common.config.set_config_defaults()
and tests run as nothing wrong happened.
Consequently, any defaults override put there has no effect during testing.

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1569389

Title:
  set_config_defaults() never called on testing

Status in OpenStack Identity (keystone):
  In Progress

Bug description:
  I can even put a line 
  None[0]
  in the keystone.common.config.set_config_defaults()
  and tests run as nothing wrong happened.
  Consequently, any defaults override put there has no effect during testing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1569389/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1501698] [NEW] LDAP identity backend does not honor list_limit

2015-10-01 Thread Alexander Makarov
Public bug reported:

list_limit set in [identity] section is not used to limit user list: the
result contains entire set of users returned by the query

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1501698

Title:
  LDAP identity backend does not honor list_limit

Status in Keystone:
  New

Bug description:
  list_limit set in [identity] section is not used to limit user list:
  the result contains entire set of users returned by the query

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1501698/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1496512] Re: Misplaced memcache servers in keystone config cause token loss

2015-09-16 Thread Alexander Makarov
master: https://review.fuel-infra.org/#/c/11662/
7.0: https://review.fuel-infra.org/#/c/8189


** Also affects: keystone
   Importance: Undecided
   Status: New

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

** No longer affects: keystone

** Also affects: mos/7.0.x
   Importance: Undecided
   Status: New

** Changed in: mos/7.0.x
   Status: New => Fix Committed

** Changed in: mos/7.0.x
 Assignee: (unassigned) => Alexander Makarov (amakarov)

** Changed in: mos/7.0.x
Milestone: None => 7.0

** Changed in: mos/7.0.x
   Importance: Undecided => Critical

** Changed in: mos
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1496512

Title:
  Misplaced memcache servers in keystone config cause token loss

Status in Mirantis OpenStack:
  In Progress
Status in Mirantis OpenStack 7.0.x series:
  Fix Committed

Bug description:
  If memcache servers specified in [cache] section of keystone config
  are enumerated in different order on cloud controllers, tokens fail to
  validate as keystone searches the wrong memcache server if token issue
  and validation occur on different controllers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/mos/+bug/1496512/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1494398] [NEW] AuthN fails if the tenant is recreated in the process

2015-09-10 Thread Alexander Makarov
Public bug reported:

Scenario:

2 requests are executed in parallel:
1) authentication against "the tenant" by tenant name
2) delete "the tenant" + create "the tenant"

According to API contract authentication should pass, but internally all magic 
is done using tenant_id acquired at the very beginning of the request (1).
So while formally tenant named "the tenant" exists, authentication fails as 
it's no mode accessible by it's old id.

** Affects: keystone
 Importance: Undecided
 Status: New

** Summary changed:

- AuthN fails if the projects is recreated in the process
+ AuthN fails if the tenant is recreated in the process

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1494398

Title:
  AuthN fails if the tenant is recreated in the process

Status in Keystone:
  New

Bug description:
  Scenario:

  2 requests are executed in parallel:
  1) authentication against "the tenant" by tenant name
  2) delete "the tenant" + create "the tenant"

  According to API contract authentication should pass, but internally all 
magic is done using tenant_id acquired at the very beginning of the request (1).
  So while formally tenant named "the tenant" exists, authentication fails as 
it's no mode accessible by it's old id.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1494398/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1493126] [NEW] openstack group create fails while using admin token

2015-09-07 Thread Alexander Makarov
Public bug reported:

While using --os-token=ADMIN_TOKEN rather then admin user credentials
fails with error message:

$ openstack --os-token= group create "qwerty"
ERROR: openstack The request you have made requires authentication. (Disable 
debug mode to suppress these details.) (HTTP 401) (Request-ID: req-8b45e<...>)

OS_USERNAME and OS_PASSWORD are set to ""

Keystone log contains:

2015-09-07 19:30:50.514850 14499 DEBUG keystone.middleware.core [-] RBAC: 
auth_context: {} process_request 
/opt/stack/keystone/keystone/middleware/core.py:209
2015-09-07 19:30:50.533697 14499 INFO keystone.common.wsgi [-] POST 
http://172.16.51.28:5000/v3/groups
2015-09-07 19:30:50.536504 14499 WARNING keystone.common.controller [-] RBAC: 
Bypassing authorization
2015-09-07 19:30:50.539266 14499 WARNING keystone.common.utils [-] Couldn't 
find the auth context.
2015-09-07 19:30:50.547398 14499 WARNING keystone.common.wsgi [-] Authorization 
failed. The request you have made requires authentication. (Disable debug mode 
to suppress these details.) (Disable debug mode to suppress these details.) 
from 

Using admin credentials works fine.

---
Investigation gave me that the root cause of this is that during group creation 
[0] the token information is being extracted from context [1] which is {empty} 
for request authenticated using ADMIN_TOKEN [2]

[0] 
https://github.com/openstack/keystone/blob/master/keystone/identity/controllers.py#L300
[1] 
https://github.com/openstack/keystone/blob/master/keystone/common/utils.py#L523-L525
[2] 
https://github.com/openstack/keystone/blob/master/keystone/middleware/core.py#L72

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1493126

Title:
  openstack group create fails while using admin token

Status in Keystone:
  New

Bug description:
  While using --os-token=ADMIN_TOKEN rather then admin user credentials
  fails with error message:

  $ openstack --os-token= group create "qwerty"
  ERROR: openstack The request you have made requires authentication. (Disable 
debug mode to suppress these details.) (HTTP 401) (Request-ID: req-8b45e<...>)

  OS_USERNAME and OS_PASSWORD are set to ""

  Keystone log contains:

  2015-09-07 19:30:50.514850 14499 DEBUG keystone.middleware.core [-] RBAC: 
auth_context: {} process_request 
/opt/stack/keystone/keystone/middleware/core.py:209
  2015-09-07 19:30:50.533697 14499 INFO keystone.common.wsgi [-] POST 
http://172.16.51.28:5000/v3/groups
  2015-09-07 19:30:50.536504 14499 WARNING keystone.common.controller [-] RBAC: 
Bypassing authorization
  2015-09-07 19:30:50.539266 14499 WARNING keystone.common.utils [-] Couldn't 
find the auth context.
  2015-09-07 19:30:50.547398 14499 WARNING keystone.common.wsgi [-] 
Authorization failed. The request you have made requires authentication. 
(Disable debug mode to suppress these details.) (Disable debug mode to suppress 
these details.) from 

  Using admin credentials works fine.

  ---
  Investigation gave me that the root cause of this is that during group 
creation [0] the token information is being extracted from context [1] which is 
{empty} for request authenticated using ADMIN_TOKEN [2]

  [0] 
https://github.com/openstack/keystone/blob/master/keystone/identity/controllers.py#L300
  [1] 
https://github.com/openstack/keystone/blob/master/keystone/common/utils.py#L523-L525
  [2] 
https://github.com/openstack/keystone/blob/master/keystone/middleware/core.py#L72

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1493126/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1482271] [NEW] Race condition in multithreaded Apache/WSGI setup

2015-08-06 Thread Alexander Makarov
Public bug reported:

When configured as an Apache WSGI module a race condition is possible during 
keystone cache initialization:
https://github.com/openstack/keystone/blob/master/keystone/common/kvs/core.py#L240
The operation raises exception region.RegionAlreadyConfigured.
This is a result of the race condition involving global 'application' variable 
being initialized several times (1 per thread).
application is required to be global according to Paste Deploy documentation:
http://pythonpaste.org/deploy/
Apache modwsgi documentation suggests protecting global objects with thread 
locks:
http://code.google.com/p/modwsgi/wiki/ProcessesAndThreading#Building_A_Portable_Application

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1482271

Title:
  Race condition in multithreaded Apache/WSGI setup

Status in Keystone:
  In Progress

Bug description:
  When configured as an Apache WSGI module a race condition is possible during 
keystone cache initialization:
  
https://github.com/openstack/keystone/blob/master/keystone/common/kvs/core.py#L240
  The operation raises exception region.RegionAlreadyConfigured.
  This is a result of the race condition involving global 'application' 
variable being initialized several times (1 per thread).
  application is required to be global according to Paste Deploy documentation:
  http://pythonpaste.org/deploy/
  Apache modwsgi documentation suggests protecting global objects with thread 
locks:
  
http://code.google.com/p/modwsgi/wiki/ProcessesAndThreading#Building_A_Portable_Application

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1482271/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1472306] [NEW] Broken ascii diagram in materialized path spec

2015-07-07 Thread Alexander Makarov
Public bug reported:

In the problem description of the spec:
https://github.com/openstack/keystone-specs/blob/master/specs/liberty/materialize-project-hierarchy.rst

A tree diagram is represented in variable width font because of the mistake in 
syntax:
a string ending with '::' must precede the pseudo-graphics block for it to be 
displayed in a monospace font.

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: In Progress

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1472306

Title:
  Broken ascii diagram in materialized path spec

Status in OpenStack Identity (Keystone):
  In Progress

Bug description:
  In the problem description of the spec:
  
https://github.com/openstack/keystone-specs/blob/master/specs/liberty/materialize-project-hierarchy.rst

  A tree diagram is represented in variable width font because of the mistake 
in syntax:
  a string ending with '::' must precede the pseudo-graphics block for it to be 
displayed in a monospace font.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1472306/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1420788] [NEW] Logging blocks on race condition under eventlet

2015-02-11 Thread Alexander Makarov
Public bug reported:

Wrong initialization order makes logging block on race condition under
eventlet.

bin/keystone-all launcher initialize logging first and after that does
eventlet patching leaving logging system with generic thred.lock in
critical sections what leads to infinite thread locks under high load.

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1420788

Title:
  Logging blocks on race condition under eventlet

Status in OpenStack Identity (Keystone):
  New

Bug description:
  Wrong initialization order makes logging block on race condition under
  eventlet.

  bin/keystone-all launcher initialize logging first and after that does
  eventlet patching leaving logging system with generic thred.lock in
  critical sections what leads to infinite thread locks under high load.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1420788/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1417737] [NEW] KVS cache backend incompatible with redis-py

2015-02-03 Thread Alexander Makarov
Public bug reported:

Created Redis cache backend: https://review.openstack.org/#/c/150844/

Tempest revealed problem with locking:

<11>Feb 3 14:56:14 node-27 keystone-all 'LuaLock' object has no attribute 
'lock_timeout'
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi Traceback (most recent 
call last):
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/common/wsgi.py", line 223, in _call_
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi result = 
method(context, **params)
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/controllers.py", line 452, in 
delete_token
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self.token_provider_api.revoke_token(token_id)
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/provider.py", line 485, in 
revoke_token
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self._persistence.delete_token(token_id=token_id)
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/persistence/core.py", line 
106, in delete_token
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self.driver.delete_token(unique_id)
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/persistence/backends/kvs.py", 
line 254, in delete_token
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self._add_to_revocation_list(data, lock)
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/common/kvs/core.py", line 405, in 
_exit_
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi self.release()
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/common/kvs/core.py", line 398, in 
release
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi if not self.expired:
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/common/kvs/core.py", line 389, in 
expired
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi if 
self.mutex.lock_timeout == 0:
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi AttributeError: 
'LuaLock' object has no attribute 'lock_timeout'
2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1417737

Title:
  KVS cache backend incompatible with redis-py

Status in OpenStack Identity (Keystone):
  New

Bug description:
  Created Redis cache backend: https://review.openstack.org/#/c/150844/

  Tempest revealed problem with locking:

  <11>Feb 3 14:56:14 node-27 keystone-all 'LuaLock' object has no attribute 
'lock_timeout'
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi Traceback (most 
recent call last):
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/common/wsgi.py", line 223, in _call_
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi result = 
method(context, **params)
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/controllers.py", line 452, in 
delete_token
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self.token_provider_api.revoke_token(token_id)
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/provider.py", line 485, in 
revoke_token
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self._persistence.delete_token(token_id=token_id)
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/persistence/core.py", line 
106, in delete_token
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self.driver.delete_token(unique_id)
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/token/persistence/backends/kvs.py", 
line 254, in delete_token
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi 
self._add_to_revocation_list(data, lock)
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi File 
"/usr/lib/python2.7/dist-packages/keystone/common/kvs/core.py", line 405, in 
_exit_
  2015-02-03 14:56:14.890 8959 TRACE keystone.common.wsgi self.release()
  2015-02-03 14:56:14.890 8959 T

[Yahoo-eng-team] [Bug 1412846] [NEW] Cannot chain a trust with a role specified by name

2015-01-20 Thread Alexander Makarov
Public bug reported:

>From comment in https://review.openstack.org/#/c/126897/

Hi! The new feature is great, but (unless I did a mistake somewhere) I
cannot create a chained trust specifying roles with "name" as opposed to
"id".

Here's a sample trust POST:
{"trust":{"trustor_user_id":"...","trustee_user_id":"...","project_id":"...","impersonation":true,"roles":[{"name":"admin"}]}}

And an accompanying traceback:

2015-01-19 17:12:36.953 4246 ERROR keystone.common.wsgi [-] 'id'
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi Traceback (most recent 
call last):
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/common/wsgi.py", line 223, in 
__call__
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi result = 
method(context, **params)
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/common/controller.py", line 158, in 
inner
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi return f(self, 
context, *args, **kwargs)
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/common/validation/__init__.py", line 
36, in wrapper
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi return func(*args, 
**kwargs)
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/trust/controllers.py", line 163, in 
create_trust
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi redelegated_trust)
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/notifications.py", line 93, in 
wrapper
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi result = f(*args, 
**kwargs)
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/trust/core.py", line 165, in 
create_trust
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi 
self._validate_redelegation(t, trust)
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/trust/core.py", line 85, in 
_validate_redelegation
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi if not 
all(role['id'] in parent_roles for role in trust['roles']):
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/trust/core.py", line 85, in 
<genexpr>
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi if not 
all(role['id'] in parent_roles for role in trust['roles']):
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi KeyError: 'id'
2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1412846

Title:
  Cannot chain a trust with a role specified by name

Status in OpenStack Identity (Keystone):
  New

Bug description:
  From comment in https://review.openstack.org/#/c/126897/

  Hi! The new feature is great, but (unless I did a mistake somewhere) I
  cannot create a chained trust specifying roles with "name" as opposed
  to "id".

  Here's a sample trust POST:
  
{"trust":{"trustor_user_id":"...","trustee_user_id":"...","project_id":"...","impersonation":true,"roles":[{"name":"admin"}]}}

  And an accompanying traceback:

  2015-01-19 17:12:36.953 4246 ERROR keystone.common.wsgi [-] 'id'
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi Traceback (most 
recent call last):
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/common/wsgi.py", line 223, in 
__call__
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi result = 
method(context, **params)
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/common/controller.py", line 158, in 
inner
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi return f(self, 
context, *args, **kwargs)
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.wsgi   File 
"/usr/lib/python2.7/site-packages/keystone/common/validation/__init__.py", line 
36, in wrapper
  2015-01-19 17:12:36.953 4246 TRACE keystone.common.ws

[Yahoo-eng-team] [Bug 1403929] [NEW] Improve clarity, encapsulation and performance of assignment type calculation

2014-12-18 Thread Alexander Makarov
Public bug reported:

There is an assignment type calculation function in:
https://github.com/openstack/keystone/blob/master/keystone/assignment/backends/sql.py#L121-L135,
which is better to be implemented as an AssignmentType classmethod.

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: In Progress

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1403929

Title:
  Improve clarity, encapsulation and performance of assignment type
  calculation

Status in OpenStack Identity (Keystone):
  In Progress

Bug description:
  There is an assignment type calculation function in:
  
https://github.com/openstack/keystone/blob/master/keystone/assignment/backends/sql.py#L121-L135,
  which is better to be implemented as an AssignmentType classmethod.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1403929/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1402760] [NEW] All user tokens are considered revoked on it's group role revocation

2014-12-15 Thread Alexander Makarov
Public bug reported:

The case for the bug:
- User authenticates and receives a token scoped to the project1
- User authenticates and receives a token scoped to the project2
- User joins the group
- Group is granted a role to the project1
- Group role grant to the project1 is revoked

Result:
All user tokens are considered revoked.

Analysis:
Revoke model lacks correct token by group revocation - it is done through 
revocation by user, what results in described effect.

** Affects: keystone
 Importance: Undecided
 Assignee: Haneef Ali (haneef)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1402760

Title:
  All user tokens are considered revoked on it's group role revocation

Status in OpenStack Identity (Keystone):
  In Progress

Bug description:
  The case for the bug:
  - User authenticates and receives a token scoped to the project1
  - User authenticates and receives a token scoped to the project2
  - User joins the group
  - Group is granted a role to the project1
  - Group role grant to the project1 is revoked

  Result:
  All user tokens are considered revoked.

  Analysis:
  Revoke model lacks correct token by group revocation - it is done through 
revocation by user, what results in described effect.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1402760/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1401926] [NEW] Role revocation invalidates tokens on all user projects

2014-12-12 Thread Alexander Makarov
Public bug reported:

Keystone invalidates every token for a user after changing its roles within one 
project.
This was reported by Horizon team, here are related bugs:
- https://bugs.launchpad.net/mos/+bug/1393732
- https://bugs.launchpad.net/horizon/+bug/1252341

After some debugging I discovered, that it looks like revocation
extension bug:

I added this test case to tests.test_v3_auth.TestTokenRevokeById

http://paste.openstack.org/show/149939/

It assigns role to user on 2 different project, authorizes user on those 
projects, revokes the role from one of the projects.
Token to the other, "intact" project, seizes to validate.

Further investigation gave me that token is not deleted, but a
revocation event created matching both tokens.

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1401926

Title:
  Role revocation invalidates tokens on all user projects

Status in OpenStack Identity (Keystone):
  In Progress

Bug description:
  Keystone invalidates every token for a user after changing its roles within 
one project.
  This was reported by Horizon team, here are related bugs:
  - https://bugs.launchpad.net/mos/+bug/1393732
  - https://bugs.launchpad.net/horizon/+bug/1252341

  After some debugging I discovered, that it looks like revocation
  extension bug:

  I added this test case to tests.test_v3_auth.TestTokenRevokeById

  http://paste.openstack.org/show/149939/

  It assigns role to user on 2 different project, authorizes user on those 
projects, revokes the role from one of the projects.
  Token to the other, "intact" project, seizes to validate.

  Further investigation gave me that token is not deleted, but a
  revocation event created matching both tokens.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1401926/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1401108] [NEW] Memcache pool locks on release

2014-12-10 Thread Alexander Makarov
Public bug reported:

At some point Keystone stops processing HTTP requests and HAProxy moves
the server out of pool. Once Keystones on all controllers stuck HAProxy
starts to respond with HTTP 503 error.

Symptoms:
~
HAProxy log:
2014-12-08T11:01:06.135849+00:00 info: 192.168.0.23:34984 
[08/Dec/2014:11:01:06.135] keystone-2 keystone-2/ 0/-1/-1/-1/0 503 212 - 
- SC-- 366/0/0/0/0 0/0 "POST /v2.0/tokens HTTP/1.1"

Keystone keeps accepting TCP connection, but hangs at HTTP level
(meaning that telnet works, but curl hangs)

root@node-21:/var/log/keystone# strace -p 26330
Process 26330 attached - interrupt to quit
futex(0xe50420, FUTEX_WAIT_PRIVATE, 0, NULL

The last logged message from stuck process:
2014-12-05 17:01:20.749 26330 DEBUG keystone.common.cache._memcache_pool [-] 
Memcached pool 39391504, thread 139781728069376: Acquiring connection 
_debug_logger 
/usr/lib/python2.7/dist-packages/keystone/common/cache/_memcache_pool.py:91

Memcache pool has asymmetric behaviour on aquire and release of a connection:
If pool is depleted a new connection is created
If pool has reached it's maximum size that connection excess still being pushed 
back to the pool causing thread lock.

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1401108

Title:
  Memcache pool locks on release

Status in OpenStack Identity (Keystone):
  New

Bug description:
  At some point Keystone stops processing HTTP requests and HAProxy
  moves the server out of pool. Once Keystones on all controllers stuck
  HAProxy starts to respond with HTTP 503 error.

  Symptoms:
  ~
  HAProxy log:
  2014-12-08T11:01:06.135849+00:00 info: 192.168.0.23:34984 
[08/Dec/2014:11:01:06.135] keystone-2 keystone-2/ 0/-1/-1/-1/0 503 212 - 
- SC-- 366/0/0/0/0 0/0 "POST /v2.0/tokens HTTP/1.1"

  Keystone keeps accepting TCP connection, but hangs at HTTP level
  (meaning that telnet works, but curl hangs)

  root@node-21:/var/log/keystone# strace -p 26330
  Process 26330 attached - interrupt to quit
  futex(0xe50420, FUTEX_WAIT_PRIVATE, 0, NULL

  The last logged message from stuck process:
  2014-12-05 17:01:20.749 26330 DEBUG keystone.common.cache._memcache_pool [-] 
Memcached pool 39391504, thread 139781728069376: Acquiring connection 
_debug_logger 
/usr/lib/python2.7/dist-packages/keystone/common/cache/_memcache_pool.py:91

  Memcache pool has asymmetric behaviour on aquire and release of a connection:
  If pool is depleted a new connection is created
  If pool has reached it's maximum size that connection excess still being 
pushed back to the pool causing thread lock.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1401108/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1395688] [NEW] Memcache distributed lock ruins HA

2014-11-24 Thread Alexander Makarov
Public bug reported:

Current memcache lock's polling interval calculation locks execution for too 
long.
In concurrent environment when distributed locking is actively used the chance 
of 8 subsequent lock collisions is high enough to begin failing authorisation 
due to timeout.

** Affects: keystone
 Importance: Undecided
 Status: New


** Tags: performance

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1395688

Title:
  Memcache distributed lock ruins HA

Status in OpenStack Identity (Keystone):
  New

Bug description:
  Current memcache lock's polling interval calculation locks execution for too 
long.
  In concurrent environment when distributed locking is actively used the 
chance of 8 subsequent lock collisions is high enough to begin failing 
authorisation due to timeout.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1395688/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1388069] [NEW] Review documentation change for trust redelegation

2014-10-31 Thread Alexander Makarov
Public bug reported:

https://review.openstack.org/#/c/131541/ needs a tech. writer review.

** Affects: keystone
 Importance: Undecided
 Assignee: Irina (ipovolotskaya)
 Status: New


** Tags: documentation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1388069

Title:
  Review documentation change for trust redelegation

Status in OpenStack Identity (Keystone):
  New

Bug description:
  https://review.openstack.org/#/c/131541/ needs a tech. writer review.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1388069/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1380670] [NEW] python-memcached misses working backend

2014-10-13 Thread Alexander Makarov
Public bug reported:

In multi-backend case there is always a chance for client to miss a
working backend among not responding.

Assuming memcached is up and running on localhost:11211:

import memcache
import random
cl = memcache.Client(['localhost:11211', 'localhost:11212', 'localhost:11213', 
'localhost:11214'])
while cl.set(str(random.random()), 1): pass

'while' must be an infinite loop since cl.set() returns True on success
but it exits in milliseconds instead.

Bug may be fixed by changing backend selection logic, patch attached.

** Affects: keystone
 Importance: Undecided
 Status: New

** Patch added: "MIRA0001-get_server_fix.patch"
   
https://bugs.launchpad.net/bugs/1380670/+attachment/4234454/+files/MIRA0001-get_server_fix.patch

** Description changed:

- In multi-backend case there always a chance for client to miss a working
- backend among not responding.
+ In multi-backend case there is always a chance for client to miss a
+ working backend among not responding.
  
  Assuming memcached is up and running on localhost:11211:
  
  import memcache
  import random
  cl = memcache.Client(['localhost:11211', 'localhost:11212', 
'localhost:11213', 'localhost:11214'])
  while cl.set(str(random.random()), 1): pass
  
  'while' must be an infinite loop since cl.set() returns True on success
  but it exits in milliseconds instead.
  
  Bug may be fixed by changing backend selection logic, patch attached.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1380670

Title:
  python-memcached misses working backend

Status in OpenStack Identity (Keystone):
  New

Bug description:
  In multi-backend case there is always a chance for client to miss a
  working backend among not responding.

  Assuming memcached is up and running on localhost:11211:

  import memcache
  import random
  cl = memcache.Client(['localhost:11211', 'localhost:11212', 
'localhost:11213', 'localhost:11214'])
  while cl.set(str(random.random()), 1): pass

  'while' must be an infinite loop since cl.set() returns True on
  success but it exits in milliseconds instead.

  Bug may be fixed by changing backend selection logic, patch attached.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1380670/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1377080] Re: Stale endpoint selection logic in keystone client

2014-10-03 Thread Alexander Makarov
** Changed in: keystone
 Assignee: (unassigned) => Alexander Makarov (amakarov)

** Project changed: keystone => python-keystoneclient

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1377080

Title:
  Stale endpoint selection logic in keystone client

Status in Python client library for Keystone:
  New

Bug description:
  In V3 endpoint groups from different regions are not grouped. It results in a 
problem in "url_for":
  it only stores for result endpoints of the last region of all with similar 
service type.

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-keystoneclient/+bug/1377080/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1377080] [NEW] Stale endpoint selection logic in keystone client

2014-10-03 Thread Alexander Makarov
Public bug reported:

In V3 endpoint groups from different regions are not grouped. It results in a 
problem in "url_for":
it only stores for result endpoints of the last region of all with similar 
service type.

** Affects: keystone
 Importance: Undecided
 Assignee: Alexander Makarov (amakarov)
 Status: New


** Tags: catalog

** Summary changed:

- Stale endpoint group selection logic in keystone client
+ Stale endpoint selection logic in keystone client

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1377080

Title:
  Stale endpoint selection logic in keystone client

Status in OpenStack Identity (Keystone):
  New

Bug description:
  In V3 endpoint groups from different regions are not grouped. It results in a 
problem in "url_for":
  it only stores for result endpoints of the last region of all with similar 
service type.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1377080/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp