[openstack-dev] Possible Keystone OS-TRUST bug

Miller, Mark M (EB SW Cloud - R&D - Corvallis) mark.m.miller at hp.com
Mon Oct 28 17:22:47 UTC 2013


Done.

https://bugs.launchpad.net/keystone/+bug/1245590

From: Dolph Mathews [mailto:dolph.mathews at gmail.com]
Sent: Monday, October 28, 2013 5:37 AM
To: OpenStack Development Mailing List
Subject: Re: [openstack-dev] Possible Keystone OS-TRUST bug

Can you file a bug report against keystone so we can track this?

  https://bugs.launchpad.net/keystone

Thanks!

On Fri, Oct 25, 2013 at 5:47 PM, Miller, Mark M (EB SW Cloud - R&D - Corvallis) <mark.m.miller at hp.com<mailto:mark.m.miller at hp.com>> wrote:
Hello,

We are getting an HTTP 500 error when we try to list all trusts. We can list individual trusts, but not the generic list.



GET REST Request:

curl -v -X GET http://10.1.8.20:35357/v3/OS-TRUST/trusts -H "X-Auth-Token: ed241ae1e986319086f3"



REST Response:

{
    "error": {
        "message": "An unexpected error prevented the server from fulfilling your request. 'id'",
        "code": 500,
        "title": "Internal Server Error"
    }
}



/var/log/keystone/keystone.log file entry:

2013-10-25 22:39:25    DEBUG [keystone.common.wsgi] arg_dict: {'trust_id': u'f30840dc20b3417bbc187bc15e1b72dd'}
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] SELECT token.id<http://token.id> AS token_id, token.expires AS token_expires, token.extra AS token_extra, token.valid AS token_valid, token.user_id AS token_user_id, token.trust_id AS token_trust_id
FROM token
WHERE token.id<http://token.id> = %(param_1)s
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] {'param_1': 'a8b2004cd0ea47be9a350890b0463fc2'}
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] SELECT trust.id<http://trust.id> AS trust_id, trust.trustor_user_id AS trust_trustor_user_id, trust.trustee_user_id AS trust_trustee_user_id, trust.project_id AS trust_project_id, trust.impersonation AS trust_impersonation, trust.deleted_at AS trust_deleted_at, trust.expires_at AS trust_expires_at, trust.extra AS trust_extra
FROM trust
WHERE trust.deleted_at IS NULL AND trust.id<http://trust.id> = %(id_1)s
LIMIT %(param_1)s
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] {'id_1': u'f30840dc20b3417bbc187bc15e1b72dd', 'param_1': 1}
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] SELECT trust_role.trust_id AS trust_role_trust_id, trust_role.role_id AS trust_role_role_id
FROM trust_role
WHERE trust_role.trust_id = %(trust_id_1)s
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] {'trust_id_1': u'f30840dc20b3417bbc187bc15e1b72dd'}
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] SELECT role.id<http://role.id> AS role_id, role.name<http://role.name> AS role_name, role.extra AS role_extra
FROM role
2013-10-25 22:39:26     INFO [sqlalchemy.engine.base.Engine] {}
2013-10-25 22:39:26     INFO [access] 127.0.0.1 - - [25/Oct/2013:22:39:26 +0000] "GET http://localhost:35357/v3/OS-TRUST/trusts/f30840dc20b3417bbc187bc15e1b72dd HTTP/1.0" 200 626
2013-10-25 22:39:26    DEBUG [eventlet.wsgi.server] 127.0.0.1 - - [25/Oct/2013 22:39:26] "GET /v3/OS-TRUST/trusts/f30840dc20b3417bbc187bc15e1b72dd HTTP/1.1" 200 755 0.241976

2013-10-25 22:41:52    DEBUG [keystone.common.wsgi] arg_dict: {}
2013-10-25 22:41:52  WARNING [keystone.common.controller] RBAC: Bypassing authorization
2013-10-25 22:41:52     INFO [sqlalchemy.engine.base.Engine] SELECT token.id<http://token.id> AS token_id, token.expires AS token_expires, token.extra AS token_extra, token.valid AS token_valid, token.user_id AS token_user_id, token.trust_id AS token_trust_id
FROM token
WHERE token.id<http://token.id> = %(param_1)s
2013-10-25 22:41:52     INFO [sqlalchemy.engine.base.Engine] {'param_1': 'a03530ce84ab4384aca15d2ef8e5fa9d'}
2013-10-25 22:41:52    ERROR [keystone.token.providers.uuid] Failed to verify token
Traceback (most recent call last):
  File "/usr/lib/python2.6/site-packages/keystone/token/providers/uuid.py", line 560, in validate_token
    return self._validate_v3_token(token_id)
  File "/usr/lib/python2.6/site-packages/keystone/token/providers/uuid.py", line 532, in _validate_v3_token
    token_ref = self._verify_token(token_id)
  File "/usr/lib/python2.6/site-packages/keystone/token/providers/uuid.py", line 441, in _verify_token
    token_ref = self.token_api.get_token(token_id=token_id)
  File "/usr/lib/python2.6/site-packages/keystone/token/core.py", line 118, in get_token
    return self.driver.get_token(self._unique_id(token_id))
  File "/usr/lib/python2.6/site-packages/keystone/token/backends/sql.py", line 47, in get_token
    raise exception.TokenNotFound(token_id=token_id)
TokenNotFound: Could not find token, a03530ce84ab4384aca15d2ef8e5fa9d.
2013-10-25 22:41:52  WARNING [keystone.common.wsgi] Authorization failed. Could not find token, a03530ce84ab4384aca15d2ef8e5fa9d. from 127.0.0.1
2013-10-25 22:41:52     INFO [access] 127.0.0.1 - - [25/Oct/2013:22:41:52 +0000] "GET http://localhost:5000/v3/auth/tokens HTTP/1.0" 401 119
2013-10-25 22:41:52    DEBUG [eventlet.wsgi.server] 10.1.5.157,127.0.0.1 - - [25/Oct/2013 22:41:52] "GET //v3/auth/tokens HTTP/1.1" 401 282 0.017426

_______________________________________________
OpenStack-dev mailing list
OpenStack-dev at lists.openstack.org<mailto:OpenStack-dev at lists.openstack.org>
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev



--

-Dolph
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20131028/3af40551/attachment.html>


More information about the OpenStack-dev mailing list