<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr">Iain et al,<div><br></div><div>Appreciate your feedback.  I work with Michael D. Moore on the same cluster, and I'm looking at the is_admin_project thing you pointed out.  What I found was that is_project_admin appeared to be True for every single keystone request I found regardless of user.  There were no explicit settings in keystone.conf relating to admin_project_name or admin_project_domain_name.  In the debug logs, Keystone was setting those values to 'None'.  I went ahead and added the following into keystone.conf:</div><div><br></div><div><div>[resource]</div><div>admin_project_name = admin</div><div>admin_project_domain_name = Default</div></div><div><br></div><div>Subsequently, I think we are now seeing a different behavior with regard to 'is_admin_project' in keystone requests.  For example, here it is with the admin user of the Default domain:</div><div><br></div><div><div>[root@vm013 ~]# openstack --debug image list 2>&1|grep 'is_admin_project'</div><div>{"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "122576ec3bee490aaec8ff664a9446b4", "name": "admin"}], "is_admin_project": true, "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac5b283406ff429291b4b4e958adca3f", "name": "admin"},</div></div><div><br></div><div>And here it is again as the non-admin user 'jonathan' in the Default domain:</div><div><br></div><div><div>[root@vm013 ~]# . keystonerc_jonathan</div><div>[root@vm013 ~]# openstack --debug image list 2>&1|grep 'is_admin_project'</div><div>{"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "edc711368e72409ba25c6342ae9c0f80", "name": "user"}], "is_admin_project": false, "project": {"domain": {"id": "d473b9495e13484ab391d6b5799ab0e2", "name": "ndc"}, "id": "b472baecebb24f2f95c7b0c97b34e5c4", "name": "ozoneaq"},</div></div><div><br></div><div><br></div><div>Okay, so that looks good I guess.  It is different from before, where is_admin_project was True for both cases.  However, this does not seem to have fixed the problem in any way.  So I'm thinking that the is_admin_project part might be a red herring.</div><div><br></div><div>non-admin user jonathan @ Default can still see all glance images, even ones marked private and owned by other tenants.  Not knowing where else to go with this, I have opened a bug against Glance:  <a href="https://bugs.launchpad.net/glance/+bug/1799588">https://bugs.launchpad.net/glance/+bug/1799588</a></div><div><br></div><div>Jonathan</div><div><br></div><div><br></div></div></div></div></div></div></div></div><br><div class="gmail_quote"><div dir="ltr">On Tue, Oct 23, 2018 at 7:46 PM iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com">iain.macdonnell@oracle.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
It (still) seems like there's something funky about admin/non-admin in <br>
your case.<br>
<br>
You could try "openstack --debug token issue" (in the admin and <br>
non-admin cases), and examine the token dict that gets output. Look for <br>
the "roles" list and "is_admin_project".<br>
<br>
     ~iain<br>
<br>
<br>
<br>
On 10/23/2018 03:21 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS <br>
INTEGRA, INC.] wrote:<br>
> We have submitted a bug for this<br>
> <br>
> <a href="https://bugs.launchpad.net/glance/+bug/1799588" rel="noreferrer" target="_blank">https://bugs.launchpad.net/glance/+bug/1799588</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__bugs.launchpad.net_glance_-2Bbug_1799588&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=Mn2Mcb1CalyYcrdw2IZaS_mFLxT867ZjLCtchHttbP0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__bugs.launchpad.net_glance_-2Bbug_1799588&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=Mn2Mcb1CalyYcrdw2IZaS_mFLxT867ZjLCtchHttbP0&e=</a>><br>
> <br>
> Mike Moore, M.S.S.E.<br>
> <br>
> Systems Engineer, Goddard Private Cloud<br>
> <br>
> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a> <mailto:<a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a>><br>
> <br>
> **<br>
> <br>
> Hydrogen fusion brightens my day.<br>
> <br>
> *From: *"Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]" <br>
> <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>><br>
> *Date: *Saturday, October 20, 2018 at 7:22 PM<br>
> *To: *Logan Hicks <<a href="mailto:logan.hicks@live.com" target="_blank">logan.hicks@live.com</a>>, <br>
> "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>" <br>
> <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> *Subject: *Re: [Openstack-operators] OpenStack-operators Digest, Vol 96, <br>
> Issue 7<br>
> <br>
> The images exist and are bootable. I'm going to trace through the actual <br>
> code for glance API. Any suggestions on where the show/hide logic is <br>
> when it filters responses? I'm new to digging through OpenStack code.<br>
> <br>
> ------------------------------------------------------------------------<br>
> <br>
> *From:*Logan Hicks [<a href="mailto:logan.hicks@live.com" target="_blank">logan.hicks@live.com</a>]<br>
> *Sent:* Friday, October 19, 2018 8:00 PM<br>
> *To:* <a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a><br>
> *Subject:* Re: [Openstack-operators] OpenStack-operators Digest, Vol 96, <br>
> Issue 7<br>
> <br>
> Re: Glance Image Visibility Issue? - Non  admin users can see<br>
>        private images from other tenants (Chris Apsey)<br>
> <br>
> I noticed that the image says queued. If Im not mistaken, an image cant <br>
> have permissions applied until after the image is created, which might <br>
> explain the issue hes seeing.<br>
> <br>
> The object doesnt exist until its made by openstack.<br>
> <br>
> Id check to see if something is holding up images being made. Id start <br>
> with glance.<br>
> <br>
> Respectfully,<br>
> <br>
> Logan Hicks<br>
> <br>
> -------- Original message --------<br>
> <br>
> From: <a href="mailto:openstack-operators-request@lists.openstack.org" target="_blank">openstack-operators-request@lists.openstack.org</a><br>
> <br>
> Date: 10/19/18 7:49 PM (GMT-05:00)<br>
> <br>
> To: <a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a><br>
> <br>
> Subject: OpenStack-operators Digest, Vol 96, Issue 7<br>
> <br>
> Send OpenStack-operators mailing list submissions to<br>
>          <a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a><br>
> <br>
> To subscribe or unsubscribe via the World Wide Web, visit<br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> or, via email, send a message with subject or body 'help' to<br>
>          <a href="mailto:openstack-operators-request@lists.openstack.org" target="_blank">openstack-operators-request@lists.openstack.org</a><br>
> <br>
> You can reach the person managing the list at<br>
>          <a href="mailto:openstack-operators-owner@lists.openstack.org" target="_blank">openstack-operators-owner@lists.openstack.org</a><br>
> <br>
> When replying, please edit your Subject line so it is more specific<br>
> than "Re: Contents of OpenStack-operators digest..."<br>
> <br>
> <br>
> Today's Topics:<br>
> <br>
>     1. [nova] Removing the CachingScheduler (Matt Riedemann)<br>
>     2. Re: Glance Image Visibility Issue? - Non admin users can see<br>
>        private images from other tenants<br>
>        (Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.])<br>
>     3. Re: Glance Image Visibility Issue? - Non  admin users can see<br>
>        private images from other tenants (Chris Apsey)<br>
>     4. Re: Glance Image Visibility Issue? - Non admin users can see<br>
>        private images from other tenants (iain MacDonnell)<br>
>     5. Re: Glance Image Visibility Issue? - Non admin users can see<br>
>        private images from other tenants<br>
>        (Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.])<br>
>     6. Re: Glance Image Visibility Issue? - Non admin users can see<br>
>        private images from other tenants (iain MacDonnell)<br>
>     7. Re: Glance Image Visibility Issue? - Non  admin users can see<br>
>        private images from other tenants (Chris Apsey)<br>
>     8. osops-tools-monitoring Dependency problems (Tomáš Vondra)<br>
>     9. [heat][cinder] How to create stack snapshot       including volumes<br>
>        (Christian Zunker)<br>
>    10. Fleio - OpenStack billing - ver. 1.1 released (Adrian Andreias)<br>
>    11. Re: [Openstack-sigs] [all] Naming the T   release of OpenStack<br>
>        (Tony Breeds)<br>
>    12. Re: Glance Image Visibility Issue? - Non admin users can see<br>
>        private images from other tenants<br>
>        (Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.])<br>
>    13. Re: Glance Image Visibility Issue? - Non admin users can see<br>
>        private images from other tenants<br>
>        (Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.])<br>
>    14. Re: Fleio - OpenStack billing - ver. 1.1 released (Jay Pipes)<br>
>    15. Re: Fleio - OpenStack billing - ver. 1.1  released (Mohammed Naser)<br>
>    16. [Octavia] SSL errors polling amphorae and missing tenant<br>
>        network interface (Erik McCormick)<br>
>    17. Re: [Octavia] SSL errors polling amphorae and missing tenant<br>
>        network interface (Gaël THEROND)<br>
> <br>
> <br>
> ----------------------------------------------------------------------<br>
> <br>
> Message: 1<br>
> Date: Thu, 18 Oct 2018 17:07:00 -0500<br>
> From: Matt Riedemann <<a href="mailto:mriedemos@gmail.com" target="_blank">mriedemos@gmail.com</a>><br>
> To: "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: [Openstack-operators] [nova] Removing the CachingScheduler<br>
> Message-ID: <<a href="mailto:fa0c5339-a54d-6720-ca10-7f0cff12dba1@gmail.com" target="_blank">fa0c5339-a54d-6720-ca10-7f0cff12dba1@gmail.com</a>><br>
> Content-Type: text/plain; charset=utf-8; format=flowed<br>
> <br>
> It's been deprecated since Pike, and the time has come to remove it [1].<br>
> <br>
> mgagne has been the most vocal CachingScheduler operator I know and he<br>
> has tested out the "nova-manage placement heal_allocations" CLI, added<br>
> in Rocky, and said it will work for migrating his deployment from the<br>
> CachingScheduler to the FilterScheduler + Placement.<br>
> <br>
> If you are using the CachingScheduler and have a problem with its<br>
> removal, now is the time to speak up or forever hold your peace.<br>
> <br>
> [1] <a href="https://review.openstack.org/#/c/611723/1" rel="noreferrer" target="_blank">https://review.openstack.org/#/c/611723/1</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__review.openstack.org_-23_c_611723_1&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=CcuJbm96l8_bk_DdPB0xbW_A31hIN4eTR0nqDeQk4kM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__review.openstack.org_-23_c_611723_1&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=CcuJbm96l8_bk_DdPB0xbW_A31hIN4eTR0nqDeQk4kM&e=</a>><br>
> <br>
> -- <br>
> <br>
> Thanks,<br>
> <br>
> Matt<br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 2<br>
> Date: Thu, 18 Oct 2018 22:11:40 +0000<br>
> From: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>><br>
> To: iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>>,<br>
>          "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non admin users can see private images from other tenants<br>
> Message-ID: <<a href="mailto:EDBAEC2C-5245-4952-86C9-CDC635667C92@nasa.gov" target="_blank">EDBAEC2C-5245-4952-86C9-CDC635667C92@nasa.gov</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> I have replicated this unexpected behavior in a Pike test environment, <br>
> in addition to our Queens environment.<br>
> <br>
> <br>
> <br>
> Mike Moore, M.S.S.E.<br>
> <br>
> Systems Engineer, Goddard Private Cloud<br>
> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
> <br>
> Hydrogen fusion brightens my day.<br>
> <br>
> <br>
> On 10/18/18, 2:30 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS <br>
> INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
> <br>
>      Yes. I verified it by creating a non-admin user in a different <br>
> tenant. I created a new image, set to private with the project defined <br>
> as our admin tenant.<br>
> <br>
>      In the database I can see that the image is 'private' and the owner <br>
> is the ID of the admin tenant.<br>
> <br>
>      Mike Moore, M.S.S.E.<br>
> <br>
>      Systems Engineer, Goddard Private Cloud<br>
>      <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
> <br>
>      Hydrogen fusion brightens my day.<br>
> <br>
> <br>
>      On 10/18/18, 1:07 AM, "iain MacDonnell" <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
> <br>
> <br>
> <br>
>          On 10/17/2018 12:29 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>          INTEGRA, INC.] wrote:<br>
>          > I’m seeing unexpected behavior in our Queens environment <br>
> related to<br>
>          > Glance image visibility. Specifically users who, based on my<br>
>          > understanding of the visibility and ownership fields, should <br>
> NOT be able<br>
>          > to see or view the image.<br>
>          ><br>
>          > If I create a new image with openstack image create and <br>
> specify –project<br>
>          > <tenant> and –private a non-admin user in a different tenant <br>
> can see and<br>
>          > boot that image.<br>
>          ><br>
>          > That seems to be the opposite of what should happen. Any ideas?<br>
> <br>
>          Yep, something's not right there.<br>
> <br>
>          Are you sure that the user that can see the image doesn't have <br>
> the admin<br>
>          role (for the project in its keystone token) ?<br>
> <br>
>          Did you verify that the image's owner is what you intended, and <br>
> that the<br>
>          visibility really is "private" ?<br>
> <br>
>               ~iain<br>
> <br>
>          _______________________________________________<br>
>          OpenStack-operators mailing list<br>
>          <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
>      _______________________________________________<br>
>      OpenStack-operators mailing list<br>
>      <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 3<br>
> Date: Thu, 18 Oct 2018 18:23:35 -0400<br>
> From: Chris Apsey <<a href="mailto:bitskrieg@bitskrieg.net" target="_blank">bitskrieg@bitskrieg.net</a>><br>
> To: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>>, iain MacDonnell<br>
>          <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>>,<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non     admin users can see private images from other tenants<br>
> Message-ID:<br>
>          <<a href="mailto:1668946da70.278c.5f0d7f2baa7831a2bbe6450f254d9a24@bitskrieg.net" target="_blank">1668946da70.278c.5f0d7f2baa7831a2bbe6450f254d9a24@bitskrieg.net</a>><br>
> Content-Type: text/plain; format=flowed; charset="UTF-8"<br>
> <br>
> Do you have a liberal/custom policy.json that perhaps is causing unexpected<br>
> behavior?  Can't seem to reproduce this.<br>
> <br>
> On October 18, 2018 18:13:22 "Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
> INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
> <br>
>> I have replicated this unexpected behavior in a Pike test environment, in <br>
>> addition to our Queens environment.<br>
>><br>
>><br>
>><br>
>> Mike Moore, M.S.S.E.<br>
>><br>
>> Systems Engineer, Goddard Private Cloud<br>
>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>><br>
>> Hydrogen fusion brightens my day.<br>
>><br>
>><br>
>> On 10/18/18, 2:30 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, <br>
>> INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>><br>
>>    Yes. I verified it by creating a non-admin user in a different tenant. I <br>
>>    created a new image, set to private with the project defined as our admin <br>
>>    tenant.<br>
>><br>
>>    In the database I can see that the image is 'private' and the owner is the <br>
>>    ID of the admin tenant.<br>
>><br>
>>    Mike Moore, M.S.S.E.<br>
>><br>
>>    Systems Engineer, Goddard Private Cloud<br>
>>    <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>><br>
>>    Hydrogen fusion brightens my day.<br>
>><br>
>><br>
>>    On 10/18/18, 1:07 AM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>><br>
>><br>
>><br>
>>        On 10/17/2018 12:29 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>>        INTEGRA, INC.] wrote:<br>
>>> I’m seeing unexpected behavior in our Queens environment related to<br>
>>> Glance image visibility. Specifically users who, based on my<br>
>>> understanding of the visibility and ownership fields, should NOT be able<br>
>>> to see or view the image.<br>
>>><br>
>>> If I create a new image with openstack image create and specify –project<br>
>>> <tenant> and –private a non-admin user in a different tenant can see and<br>
>>> boot that image.<br>
>>><br>
>>> That seems to be the opposite of what should happen. Any ideas?<br>
>><br>
>>        Yep, something's not right there.<br>
>><br>
>>        Are you sure that the user that can see the image doesn't have the admin<br>
>>        role (for the project in its keystone token) ?<br>
>><br>
>>        Did you verify that the image's owner is what you intended, and that the<br>
>>        visibility really is "private" ?<br>
>><br>
>>             ~iain<br>
>><br>
>>        _______________________________________________<br>
>>        OpenStack-operators mailing list<br>
>>        <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>        <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
>><br>
>><br>
>>    _______________________________________________<br>
>>    OpenStack-operators mailing list<br>
>>    <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>    <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
>><br>
>><br>
>> _______________________________________________<br>
>> OpenStack-operators mailing list<br>
>> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 4<br>
> Date: Thu, 18 Oct 2018 15:25:22 -0700<br>
> From: iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>><br>
> To: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>>, <br>
> "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non admin users can see private images from other tenants<br>
> Message-ID: <<a href="mailto:11e3f7a6-875e-4b6c-259a-147188a860e1@oracle.com" target="_blank">11e3f7a6-875e-4b6c-259a-147188a860e1@oracle.com</a>><br>
> Content-Type: text/plain; charset=utf-8; format=flowed<br>
> <br>
> <br>
> I suspect that your non-admin user is not really non-admin. How did you<br>
> create it?<br>
> <br>
> What you have for "context_is_admin" in glance's policy.json ?<br>
> <br>
>       ~iain<br>
> <br>
> <br>
> On 10/18/2018 03:11 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
> INTEGRA, INC.] wrote:<br>
>> I have replicated this unexpected behavior in a Pike test environment, in addition to our Queens environment.<br>
>> <br>
>> <br>
>> <br>
>> Mike Moore, M.S.S.E.<br>
>>   <br>
>> Systems Engineer, Goddard Private Cloud<br>
>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>   <br>
>> Hydrogen fusion brightens my day.<br>
>>   <br>
>> <br>
>> On 10/18/18, 2:30 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>> <br>
>>      Yes. I verified it by creating a non-admin user in a different tenant. I created a new image, set to private with the project defined as our admin tenant.<br>
>>      <br>
>>      In the database I can see that the image is 'private' and the owner is the ID of the admin tenant.<br>
>>      <br>
>>      Mike Moore, M.S.S.E.<br>
>>       <br>
>>      Systems Engineer, Goddard Private Cloud<br>
>>      <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>       <br>
>>      Hydrogen fusion brightens my day.<br>
>>       <br>
>>      <br>
>>      On 10/18/18, 1:07 AM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>>      <br>
>>          <br>
>>          <br>
>>          On 10/17/2018 12:29 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>>          INTEGRA, INC.] wrote:<br>
>>          > I’m seeing unexpected behavior in our Queens environment related to<br>
>>          > Glance image visibility. Specifically users who, based on my<br>
>>          > understanding of the visibility and ownership fields, should NOT be able<br>
>>          > to see or view the image.<br>
>>          ><br>
>>          > If I create a new image with openstack image create and specify –project<br>
>>          > <tenant> and –private a non-admin user in a different tenant can see and<br>
>>          > boot that image.<br>
>>          ><br>
>>          > That seems to be the opposite of what should happen. Any ideas?<br>
>>          <br>
>>          Yep, something's not right there.<br>
>>          <br>
>>          Are you sure that the user that can see the image doesn't have the admin<br>
>>          role (for the project in its keystone token) ?<br>
>>          <br>
>>          Did you verify that the image's owner is what you intended, and that the<br>
>>          visibility really is "private" ?<br>
>>          <br>
>>               ~iain<br>
>>          <br>
>>          _______________________________________________<br>
>>          OpenStack-operators mailing list<br>
>>          <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>          <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>>          <br>
>>      <br>
>>      _______________________________________________<br>
>>      OpenStack-operators mailing list<br>
>>      <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>      <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>>      <br>
>> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 5<br>
> Date: Thu, 18 Oct 2018 22:32:42 +0000<br>
> From: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>><br>
> To: iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>>,<br>
>          "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non admin users can see private images from other tenants<br>
> Message-ID: <<a href="mailto:44085CC4-899C-49B2-9934-0800F6650B0B@nasa.gov" target="_blank">44085CC4-899C-49B2-9934-0800F6650B0B@nasa.gov</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> openstack user create --domain default --password xxxxxxxx <br>
> --project-domain ndc --project test mike<br>
> <br>
> <br>
> openstack role add --user mike --user-domain default --project test user<br>
> <br>
> my admin account is in the NDC domain with a different username.<br>
> <br>
> <br>
> <br>
> /etc/glance/policy.json<br>
> {<br>
> <br>
> "context_is_admin":  "role:admin",<br>
> "default": "role:admin",<br>
> <br>
> <snip><br>
> <br>
> <br>
> I'm not terribly familiar with the policies but I feel like that default <br>
> line is making everyone an admin by default?<br>
> <br>
> <br>
> Mike Moore, M.S.S.E.<br>
> <br>
> Systems Engineer, Goddard Private Cloud<br>
> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
> <br>
> Hydrogen fusion brightens my day.<br>
> <br>
> <br>
> On 10/18/18, 6:25 PM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
> <br>
> <br>
>      I suspect that your non-admin user is not really non-admin. How did <br>
> you<br>
>      create it?<br>
> <br>
>      What you have for "context_is_admin" in glance's policy.json ?<br>
> <br>
>           ~iain<br>
> <br>
> <br>
>      On 10/18/2018 03:11 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>      INTEGRA, INC.] wrote:<br>
>      > I have replicated this unexpected behavior in a Pike test <br>
> environment, in addition to our Queens environment.<br>
>      ><br>
>      ><br>
>      ><br>
>      > Mike Moore, M.S.S.E.<br>
>      ><br>
>      > Systems Engineer, Goddard Private Cloud<br>
>      > <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>      ><br>
>      > Hydrogen fusion brightens my day.<br>
>      ><br>
>      ><br>
>      > On 10/18/18, 2:30 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS <br>
> INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>      ><br>
>      >      Yes. I verified it by creating a non-admin user in a <br>
> different tenant. I created a new image, set to private with the project <br>
> defined as our admin tenant.<br>
>      ><br>
>      >      In the database I can see that the image is 'private' and <br>
> the owner is the ID of the admin tenant.<br>
>      ><br>
>      >      Mike Moore, M.S.S.E.<br>
>      ><br>
>      >      Systems Engineer, Goddard Private Cloud<br>
>      >      <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>      ><br>
>      >      Hydrogen fusion brightens my day.<br>
>      ><br>
>      ><br>
>      >      On 10/18/18, 1:07 AM, "iain MacDonnell" <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>      ><br>
>      ><br>
>      ><br>
>      >          On 10/17/2018 12:29 PM, Moore, Michael Dane <br>
> (GSFC-720.0)[BUSINESS<br>
>      >          INTEGRA, INC.] wrote:<br>
>      >          > I’m seeing unexpected behavior in our Queens <br>
> environment related to<br>
>      >          > Glance image visibility. Specifically users who, based <br>
> on my<br>
>      >          > understanding of the visibility and ownership fields, <br>
> should NOT be able<br>
>      >          > to see or view the image.<br>
>      >          ><br>
>      >          > If I create a new image with openstack image create <br>
> and specify –project<br>
>      >          > <tenant> and –private a non-admin user in a different <br>
> tenant can see and<br>
>      >          > boot that image.<br>
>      >          ><br>
>      >          > That seems to be the opposite of what should happen. <br>
> Any ideas?<br>
>      ><br>
>      >          Yep, something's not right there.<br>
>      ><br>
>      >          Are you sure that the user that can see the image <br>
> doesn't have the admin<br>
>      >          role (for the project in its keystone token) ?<br>
>      ><br>
>      >          Did you verify that the image's owner is what you <br>
> intended, and that the<br>
>      >          visibility really is "private" ?<br>
>      ><br>
>      >               ~iain<br>
>      ><br>
>      >          _______________________________________________<br>
>      >          OpenStack-operators mailing list<br>
>      >          <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>      > <br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>      ><br>
>      ><br>
>      >      _______________________________________________<br>
>      >      OpenStack-operators mailing list<br>
>      >      <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>      > <br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>      ><br>
>      ><br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 6<br>
> Date: Thu, 18 Oct 2018 15:48:27 -0700<br>
> From: iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>><br>
> To: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>>, <br>
> "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non admin users can see private images from other tenants<br>
> Message-ID: <<a href="mailto:c8bb19c1-8dcb-7f68-db3e-199cefd5c442@oracle.com" target="_blank">c8bb19c1-8dcb-7f68-db3e-199cefd5c442@oracle.com</a>><br>
> Content-Type: text/plain; charset=utf-8; format=flowed<br>
> <br>
> <br>
> That all looks fine.<br>
> <br>
> I believe that the "default" policy applies in place of any that's not<br>
> explicitly specified - i.e. "if there's no matching policy below, you<br>
> need to have the admin role to be able to do it". I do have that line in<br>
> my policy.json, and I cannot reproduce your problem (see below).<br>
> <br>
> I'm not using domains (other than "default"). I wonder if that's a factor...<br>
> <br>
>       ~iain<br>
> <br>
> <br>
> $ openstack user create --password foo user1<br>
> +---------------------+----------------------------------+<br>
> | Field               | Value                            |<br>
> +---------------------+----------------------------------+<br>
> | domain_id           | default                          |<br>
> | enabled             | True                             |<br>
> | id                  | d18c0031ec56430499a2d690cb1f125c |<br>
> | name                | user1                            |<br>
> | options             | {}                               |<br>
> | password_expires_at | None                             |<br>
> +---------------------+----------------------------------+<br>
> $ openstack user create --password foo user2<br>
> +---------------------+----------------------------------+<br>
> | Field               | Value                            |<br>
> +---------------------+----------------------------------+<br>
> | domain_id           | default                          |<br>
> | enabled             | True                             |<br>
> | id                  | be9f1061a5104abd834eabe98dff055d |<br>
> | name                | user2                            |<br>
> | options             | {}                               |<br>
> | password_expires_at | None                             |<br>
> +---------------------+----------------------------------+<br>
> $ openstack project create project1<br>
> +-------------+----------------------------------+<br>
> | Field       | Value                            |<br>
> +-------------+----------------------------------+<br>
> | description |                                  |<br>
> | domain_id   | default                          |<br>
> | enabled     | True                             |<br>
> | id          | 826876d6d3724018bae6253c7f540cb3 |<br>
> | is_domain   | False                            |<br>
> | name        | project1                         |<br>
> | parent_id   | default                          |<br>
> | tags        | []                               |<br>
> +-------------+----------------------------------+<br>
> $ openstack project create project2<br>
> +-------------+----------------------------------+<br>
> | Field       | Value                            |<br>
> +-------------+----------------------------------+<br>
> | description |                                  |<br>
> | domain_id   | default                          |<br>
> | enabled     | True                             |<br>
> | id          | b446b93ac6e24d538c1943acbdd13cb2 |<br>
> | is_domain   | False                            |<br>
> | name        | project2                         |<br>
> | parent_id   | default                          |<br>
> | tags        | []                               |<br>
> +-------------+----------------------------------+<br>
> $ openstack role add --user user1 --project project1 _member_<br>
> $ openstack role add --user user2 --project project2 _member_<br>
> $ export OS_PASSWORD=foo<br>
> $ export OS_USERNAME=user1<br>
> $ export OS_PROJECT_NAME=project1<br>
> $ openstack image list<br>
> +--------------------------------------+--------+--------+<br>
> | ID                                   | Name   | Status |<br>
> +--------------------------------------+--------+--------+<br>
> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
> +--------------------------------------+--------+--------+<br>
> $ openstack image create --private image1<br>
> +------------------+------------------------------------------------------------------------------+<br>
> | Field            | Value<br>
>                            |<br>
> +------------------+------------------------------------------------------------------------------+<br>
> | checksum         | None<br>
>                            |<br>
> | container_format | bare<br>
>                            |<br>
> | created_at       | 2018-10-18T22:17:41Z<br>
>                            |<br>
> | disk_format      | raw<br>
>                            |<br>
> | file             |<br>
> /v2/images/6a0c1928-b79c-4dbf-a9c9-305b599056e4/file<br>
>       |<br>
> | id               | 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>                            |<br>
> | min_disk         | 0<br>
>                            |<br>
> | min_ram          | 0<br>
>                            |<br>
> | name             | image1<br>
>                            |<br>
> | owner            | 826876d6d3724018bae6253c7f540cb3<br>
>                            |<br>
> | properties       | locations='[]', os_hash_algo='None',<br>
> os_hash_value='None', os_hidden='False' |<br>
> | protected        | False<br>
>                            |<br>
> | schema           | /v2/schemas/image<br>
>                            |<br>
> | size             | None<br>
>                            |<br>
> | status           | queued<br>
>                            |<br>
> | tags             |<br>
>                            |<br>
> | updated_at       | 2018-10-18T22:17:41Z<br>
>                            |<br>
> | virtual_size     | None<br>
>                            |<br>
> | visibility       | private<br>
>                            |<br>
> +------------------+------------------------------------------------------------------------------+<br>
> $ openstack image list<br>
> +--------------------------------------+--------+--------+<br>
> | ID                                   | Name   | Status |<br>
> +--------------------------------------+--------+--------+<br>
> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
> | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
> +--------------------------------------+--------+--------+<br>
> $ export OS_USERNAME=user2<br>
> $ export OS_PROJECT_NAME=project2<br>
> $ openstack image list<br>
> +--------------------------------------+--------+--------+<br>
> | ID                                   | Name   | Status |<br>
> +--------------------------------------+--------+--------+<br>
> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
> +--------------------------------------+--------+--------+<br>
> $ export OS_USERNAME=admin<br>
> $ export OS_PROJECT_NAME=admin<br>
> $ export OS_PASSWORD=xxx<br>
> $ openstack image set --public 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
> $ export OS_USERNAME=user2<br>
> $ export OS_PROJECT_NAME=project2<br>
> $ export OS_PASSWORD=foo<br>
> $ openstack image list<br>
> +--------------------------------------+--------+--------+<br>
> | ID                                   | Name   | Status |<br>
> +--------------------------------------+--------+--------+<br>
> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
> | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
> +--------------------------------------+--------+--------+<br>
> $<br>
> <br>
> <br>
> On 10/18/2018 03:32 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
> INTEGRA, INC.] wrote:<br>
>> openstack user create --domain default --password xxxxxxxx --project-domain ndc --project test mike<br>
>> <br>
>> <br>
>> openstack role add --user mike --user-domain default --project test user<br>
>> <br>
>> my admin account is in the NDC domain with a different username.<br>
>> <br>
>> <br>
>> <br>
>> /etc/glance/policy.json<br>
>> {<br>
>> <br>
>> "context_is_admin":  "role:admin",<br>
>> "default": "role:admin",<br>
>> <br>
>> <snip><br>
>> <br>
>> <br>
>> I'm not terribly familiar with the policies but I feel like that default line is making everyone an admin by default?<br>
>> <br>
>> <br>
>> Mike Moore, M.S.S.E.<br>
>>   <br>
>> Systems Engineer, Goddard Private Cloud<br>
>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>   <br>
>> Hydrogen fusion brightens my day.<br>
>>   <br>
>> <br>
>> On 10/18/18, 6:25 PM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>> <br>
>>      <br>
>>      I suspect that your non-admin user is not really non-admin. How did you<br>
>>      create it?<br>
>>      <br>
>>      What you have for "context_is_admin" in glance's policy.json ?<br>
>>      <br>
>>           ~iain<br>
>>      <br>
>>      <br>
>>      On 10/18/2018 03:11 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>>      INTEGRA, INC.] wrote:<br>
>>      > I have replicated this unexpected behavior in a Pike test environment, in addition to our Queens environment.<br>
>>      ><br>
>>      ><br>
>>      ><br>
>>      > Mike Moore, M.S.S.E.<br>
>>      ><br>
>>      > Systems Engineer, Goddard Private Cloud<br>
>>      > <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>      ><br>
>>      > Hydrogen fusion brightens my day.<br>
>>      ><br>
>>      ><br>
>>      > On 10/18/18, 2:30 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>>      ><br>
>>      >      Yes. I verified it by creating a non-admin user in a different tenant. I created a new image, set to private with the project defined as our admin tenant.<br>
>>      ><br>
>>      >      In the database I can see that the image is 'private' and the owner is the ID of the admin tenant.<br>
>>      ><br>
>>      >      Mike Moore, M.S.S.E.<br>
>>      ><br>
>>      >      Systems Engineer, Goddard Private Cloud<br>
>>      >      <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>      ><br>
>>      >      Hydrogen fusion brightens my day.<br>
>>      ><br>
>>      ><br>
>>      >      On 10/18/18, 1:07 AM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>>      ><br>
>>      ><br>
>>      ><br>
>>      >          On 10/17/2018 12:29 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>>      >          INTEGRA, INC.] wrote:<br>
>>      >          > I’m seeing unexpected behavior in our Queens environment related to<br>
>>      >          > Glance image visibility. Specifically users who, based on my<br>
>>      >          > understanding of the visibility and ownership fields, should NOT be able<br>
>>      >          > to see or view the image.<br>
>>      >          ><br>
>>      >          > If I create a new image with openstack image create and specify –project<br>
>>      >          > <tenant> and –private a non-admin user in a different tenant can see and<br>
>>      >          > boot that image.<br>
>>      >          ><br>
>>      >          > That seems to be the opposite of what should happen. Any ideas?<br>
>>      ><br>
>>      >          Yep, something's not right there.<br>
>>      ><br>
>>      >          Are you sure that the user that can see the image doesn't have the admin<br>
>>      >          role (for the project in its keystone token) ?<br>
>>      ><br>
>>      >          Did you verify that the image's owner is what you intended, and that the<br>
>>      >          visibility really is "private" ?<br>
>>      ><br>
>>      >               ~iain<br>
>>      ><br>
>>      >          _______________________________________________<br>
>>      >          OpenStack-operators mailing list<br>
>>      >          <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>      >          <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>>      ><br>
>>      ><br>
>>      >      _______________________________________________<br>
>>      >      OpenStack-operators mailing list<br>
>>      >      <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>      >      <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>>      ><br>
>>      ><br>
>>      <br>
>> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 7<br>
> Date: Thu, 18 Oct 2018 19:23:42 -0400<br>
> From: Chris Apsey <<a href="mailto:bitskrieg@bitskrieg.net" target="_blank">bitskrieg@bitskrieg.net</a>><br>
> To: iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>>, "Moore, Michael Dane<br>
>          (GSFC-720.0)[BUSINESS INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>>,<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non     admin users can see private images from other tenants<br>
> Message-ID:<br>
>          <<a href="mailto:166897de830.278c.5f0d7f2baa7831a2bbe6450f254d9a24@bitskrieg.net" target="_blank">166897de830.278c.5f0d7f2baa7831a2bbe6450f254d9a24@bitskrieg.net</a>><br>
> Content-Type: text/plain; format=flowed; charset="UTF-8"<br>
> <br>
> We are using multiple keystone domains - still can't reproduce this.<br>
> <br>
> Do you happen to have a customized keystone policy.json?<br>
> <br>
> Worst case, I would launch a devstack of your targeted release.  If you<br>
> can't reproduce the issue there, you would at least know its caused by a<br>
> nonstandard config rather than a bug (or at least not a bug that's present<br>
> when using a default config)<br>
> <br>
> On October 18, 2018 18:50:12 iain MacDonnell <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>><br>
> wrote:<br>
> <br>
>> That all looks fine.<br>
>><br>
>> I believe that the "default" policy applies in place of any that's not<br>
>> explicitly specified - i.e. "if there's no matching policy below, you<br>
>> need to have the admin role to be able to do it". I do have that line in<br>
>> my policy.json, and I cannot reproduce your problem (see below).<br>
>><br>
>> I'm not using domains (other than "default"). I wonder if that's a factor...<br>
>><br>
>>     ~iain<br>
>><br>
>><br>
>> $ openstack user create --password foo user1<br>
>> +---------------------+----------------------------------+<br>
>> | Field               | Value                            |<br>
>> +---------------------+----------------------------------+<br>
>> | domain_id           | default                          |<br>
>> | enabled             | True                             |<br>
>> | id                  | d18c0031ec56430499a2d690cb1f125c |<br>
>> | name                | user1                            |<br>
>> | options             | {}                               |<br>
>> | password_expires_at | None                             |<br>
>> +---------------------+----------------------------------+<br>
>> $ openstack user create --password foo user2<br>
>> +---------------------+----------------------------------+<br>
>> | Field               | Value                            |<br>
>> +---------------------+----------------------------------+<br>
>> | domain_id           | default                          |<br>
>> | enabled             | True                             |<br>
>> | id                  | be9f1061a5104abd834eabe98dff055d |<br>
>> | name                | user2                            |<br>
>> | options             | {}                               |<br>
>> | password_expires_at | None                             |<br>
>> +---------------------+----------------------------------+<br>
>> $ openstack project create project1<br>
>> +-------------+----------------------------------+<br>
>> | Field       | Value                            |<br>
>> +-------------+----------------------------------+<br>
>> | description |                                  |<br>
>> | domain_id   | default                          |<br>
>> | enabled     | True                             |<br>
>> | id          | 826876d6d3724018bae6253c7f540cb3 |<br>
>> | is_domain   | False                            |<br>
>> | name        | project1                         |<br>
>> | parent_id   | default                          |<br>
>> | tags        | []                               |<br>
>> +-------------+----------------------------------+<br>
>> $ openstack project create project2<br>
>> +-------------+----------------------------------+<br>
>> | Field       | Value                            |<br>
>> +-------------+----------------------------------+<br>
>> | description |                                  |<br>
>> | domain_id   | default                          |<br>
>> | enabled     | True                             |<br>
>> | id          | b446b93ac6e24d538c1943acbdd13cb2 |<br>
>> | is_domain   | False                            |<br>
>> | name        | project2                         |<br>
>> | parent_id   | default                          |<br>
>> | tags        | []                               |<br>
>> +-------------+----------------------------------+<br>
>> $ openstack role add --user user1 --project project1 _member_<br>
>> $ openstack role add --user user2 --project project2 _member_<br>
>> $ export OS_PASSWORD=foo<br>
>> $ export OS_USERNAME=user1<br>
>> $ export OS_PROJECT_NAME=project1<br>
>> $ openstack image list<br>
>> +--------------------------------------+--------+--------+<br>
>> | ID                                   | Name   | Status |<br>
>> +--------------------------------------+--------+--------+<br>
>> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>> +--------------------------------------+--------+--------+<br>
>> $ openstack image create --private image1<br>
>> +------------------+------------------------------------------------------------------------------+<br>
>> | Field            | Value<br>
>>                          |<br>
>> +------------------+------------------------------------------------------------------------------+<br>
>> | checksum         | None<br>
>>                          |<br>
>> | container_format | bare<br>
>>                          |<br>
>> | created_at       | 2018-10-18T22:17:41Z<br>
>>                          |<br>
>> | disk_format      | raw<br>
>>                          |<br>
>> | file             |<br>
>> /v2/images/6a0c1928-b79c-4dbf-a9c9-305b599056e4/file<br>
>>     |<br>
>> | id               | 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>>                          |<br>
>> | min_disk         | 0<br>
>>                          |<br>
>> | min_ram          | 0<br>
>>                          |<br>
>> | name             | image1<br>
>>                          |<br>
>> | owner            | 826876d6d3724018bae6253c7f540cb3<br>
>>                          |<br>
>> | properties       | locations='[]', os_hash_algo='None',<br>
>> os_hash_value='None', os_hidden='False' |<br>
>> | protected        | False<br>
>>                          |<br>
>> | schema           | /v2/schemas/image<br>
>>                          |<br>
>> | size             | None<br>
>>                          |<br>
>> | status           | queued<br>
>>                          |<br>
>> | tags             |<br>
>>                          |<br>
>> | updated_at       | 2018-10-18T22:17:41Z<br>
>>                          |<br>
>> | virtual_size     | None<br>
>>                          |<br>
>> | visibility       | private<br>
>>                          |<br>
>> +------------------+------------------------------------------------------------------------------+<br>
>> $ openstack image list<br>
>> +--------------------------------------+--------+--------+<br>
>> | ID                                   | Name   | Status |<br>
>> +--------------------------------------+--------+--------+<br>
>> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>> | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
>> +--------------------------------------+--------+--------+<br>
>> $ export OS_USERNAME=user2<br>
>> $ export OS_PROJECT_NAME=project2<br>
>> $ openstack image list<br>
>> +--------------------------------------+--------+--------+<br>
>> | ID                                   | Name   | Status |<br>
>> +--------------------------------------+--------+--------+<br>
>> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>> +--------------------------------------+--------+--------+<br>
>> $ export OS_USERNAME=admin<br>
>> $ export OS_PROJECT_NAME=admin<br>
>> $ export OS_PASSWORD=xxx<br>
>> $ openstack image set --public 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>> $ export OS_USERNAME=user2<br>
>> $ export OS_PROJECT_NAME=project2<br>
>> $ export OS_PASSWORD=foo<br>
>> $ openstack image list<br>
>> +--------------------------------------+--------+--------+<br>
>> | ID                                   | Name   | Status |<br>
>> +--------------------------------------+--------+--------+<br>
>> | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>> | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
>> +--------------------------------------+--------+--------+<br>
>> $<br>
>><br>
>><br>
>> On 10/18/2018 03:32 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>> INTEGRA, INC.] wrote:<br>
>>> openstack user create --domain default --password xxxxxxxx --project-domain <br>
>>> ndc --project test mike<br>
>>><br>
>>><br>
>>> openstack role add --user mike --user-domain default --project test user<br>
>>><br>
>>> my admin account is in the NDC domain with a different username.<br>
>>><br>
>>><br>
>>><br>
>>> /etc/glance/policy.json<br>
>>> {<br>
>>><br>
>>> "context_is_admin":  "role:admin",<br>
>>> "default": "role:admin",<br>
>>><br>
>>> <snip><br>
>>><br>
>>><br>
>>> I'm not terribly familiar with the policies but I feel like that default <br>
>>> line is making everyone an admin by default?<br>
>>><br>
>>><br>
>>> Mike Moore, M.S.S.E.<br>
>>><br>
>>> Systems Engineer, Goddard Private Cloud<br>
>>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>><br>
>>> Hydrogen fusion brightens my day.<br>
>>><br>
>>><br>
>>> On 10/18/18, 6:25 PM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>>><br>
>>><br>
>>> I suspect that your non-admin user is not really non-admin. How did you<br>
>>> create it?<br>
>>><br>
>>> What you have for "context_is_admin" in glance's policy.json ?<br>
>>><br>
>>>  ~iain<br>
>>><br>
>>><br>
>>> On 10/18/2018 03:11 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>>> INTEGRA, INC.] wrote:<br>
>>>> I have replicated this unexpected behavior in a Pike test environment, in <br>
>>>> addition to our Queens environment.<br>
>>>><br>
>>>><br>
>>>><br>
>>>> Mike Moore, M.S.S.E.<br>
>>>><br>
>>>> Systems Engineer, Goddard Private Cloud<br>
>>>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>>><br>
>>>> Hydrogen fusion brightens my day.<br>
>>>><br>
>>>><br>
>>>> On 10/18/18, 2:30 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, <br>
>>>> INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>>>><br>
>>>>    Yes. I verified it by creating a non-admin user in a different tenant. I <br>
>>>>    created a new image, set to private with the project defined as our admin <br>
>>>>    tenant.<br>
>>>><br>
>>>>    In the database I can see that the image is 'private' and the owner is the<br>
>>>>    ID of the admin tenant.<br>
>>>><br>
>>>>    Mike Moore, M.S.S.E.<br>
>>>><br>
>>>>    Systems Engineer, Goddard Private Cloud<br>
>>>>    <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>>>><br>
>>>>    Hydrogen fusion brightens my day.<br>
>>>><br>
>>>><br>
>>>>    On 10/18/18, 1:07 AM, "iain MacDonnell" <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>>>><br>
>>>><br>
>>>><br>
>>>>        On 10/17/2018 12:29 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>>>>        INTEGRA, INC.] wrote:<br>
>>>>        > I’m seeing unexpected behavior in our Queens environment related to<br>
>>>>        > Glance image visibility. Specifically users who, based on my<br>
>>>>        > understanding of the visibility and ownership fields, should NOT be able<br>
>>>>        > to see or view the image.<br>
>>>>        ><br>
>>>>        > If I create a new image with openstack image create and specify –project<br>
>>>>        > <tenant> and –private a non-admin user in a different tenant can see and<br>
>>>>        > boot that image.<br>
>>>>        ><br>
>>>>        > That seems to be the opposite of what should happen. Any ideas?<br>
>>>><br>
>>>>        Yep, something's not right there.<br>
>>>><br>
>>>>        Are you sure that the user that can see the image doesn't have the admin<br>
>>>>        role (for the project in its keystone token) ?<br>
>>>><br>
>>>>        Did you verify that the image's owner is what you intended, and that the<br>
>>>>        visibility really is "private" ?<br>
>>>><br>
>>>>             ~iain<br>
>>>><br>
>>>>        _______________________________________________<br>
>>>>        OpenStack-operators mailing list<br>
>>>>        <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>>>        <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>>>><br>
>>>><br>
>>>>    _______________________________________________<br>
>>>>    OpenStack-operators mailing list<br>
>>>>    <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>>>>    <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>><br>
>> _______________________________________________<br>
>> OpenStack-operators mailing list<br>
>> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 8<br>
> Date: Fri, 19 Oct 2018 10:58:30 +0200<br>
> From: Tomáš Vondra <<a href="mailto:vondra@homeatcloud.cz" target="_blank">vondra@homeatcloud.cz</a>><br>
> To: <<a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a>><br>
> Subject: [Openstack-operators] osops-tools-monitoring Dependency<br>
>          problems<br>
> Message-ID: <049e01d46789$e8bf5220$ba3df660$@<a href="http://homeatcloud.cz" rel="noreferrer" target="_blank">homeatcloud.cz</a>><br>
> Content-Type: text/plain;       charset="iso-8859-2"<br>
> <br>
> Hi!<br>
> I'm a long time user of monitoring-for-openstack, also known as oschecks.<br>
> Concretely, I used a version from 2015 with OpenStack python client<br>
> libraries from Kilo. Now I have upgraded them to Mitaka and it got broken.<br>
> Even the latest oschecks don't work. I didn't quite expect that, given that<br>
> there are several commits from this year e.g. by Nagasai Vinaykumar<br>
> Kapalavai and paramite. Can one of them or some other user step up and say<br>
> what version of OpenStack clients is oschecks working with? Ideally, write<br>
> it down in requirements.txt so that it will be reproducible? Also, some<br>
> documentation of what is the minimal set of parameters would also come in<br>
> handy.<br>
> Thanks a lot, Tomas from Homeatcloud<br>
> <br>
> The error messages are as absurd as:<br>
> oschecks-check_glance_api --os_auth_url='<a href="http://10.1.101.30:5000/v2.0" rel="noreferrer" target="_blank">http://10.1.101.30:5000/v2.0</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__10.1.101.30-3A5000_v2.0&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=_OahSWkou5-POtvp2P_0PQEAtRXnl_2ry82DIo_ygQ4&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__10.1.101.30-3A5000_v2.0&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=_OahSWkou5-POtvp2P_0PQEAtRXnl_2ry82DIo_ygQ4&e=</a>>'<br>
> --os_username=monitoring --os_password=XXX --os_tenant_name=monitoring<br>
> <br>
> CRITICAL: Traceback (most recent call last):<br>
>    File "/usr/lib/python2.7/dist-packages/oschecks/utils.py", line 121, in<br>
> safe_run<br>
>      method()<br>
>    File "/usr/lib/python2.7/dist-packages/oschecks/glance.py", line 29, in<br>
> _check_glance_api<br>
>      glance = utils.Glance()<br>
>    File "/usr/lib/python2.7/dist-packages/oschecks/utils.py", line 177, in<br>
> __init__<br>
>      self.glance.parser = self.glance.get_base_parser(sys.argv)<br>
> TypeError: get_base_parser() takes exactly 1 argument (2 given)<br>
> <br>
> (I can see 4 parameters on the command line.)<br>
> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 9<br>
> Date: Fri, 19 Oct 2018 11:21:25 +0200<br>
> From: Christian Zunker <christian.zunker@codecentric.cloud><br>
> To: openstack-operators <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: [Openstack-operators] [heat][cinder] How to create stack<br>
>          snapshot        including volumes<br>
> Message-ID:<br>
>          <br>
> <CAHS=<a href="mailto:D_ZGow%2BhSPuiicq6z0UrRCb3DxC4hf425uY7%2B5%2BRt%2B-z5w@mail.gmail.com" target="_blank">D_ZGow+hSPuiicq6z0UrRCb3DxC4hf425uY7+5+Rt+-z5w@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> Hi List,<br>
> <br>
> I'd like to take snapshots of heat stacks including the volumes.<br>
>>From what I found until now, this should be possible. You just have to<br>
> configure some parts of OpenStack.<br>
> <br>
> I enabled cinder-backup with ceph backend. Backups from volumes are working.<br>
> I configured heat to include the option backups_enabled = True.<br>
> <br>
> When I use openstack stack snapshot create, I get a snapshot but no backups<br>
> of my volumes. I don't get any error messages in heat. Debug logging didn't<br>
> help either.<br>
> <br>
> OpenStack version is Pike on Ubuntu installed with openstack-ansible.<br>
> heat version is 9.0.3. So this should also include this bugfix:<br>
> <a href="https://bugs.launchpad.net/heat/+bug/1687006" rel="noreferrer" target="_blank">https://bugs.launchpad.net/heat/+bug/1687006</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__bugs.launchpad.net_heat_-2Bbug_1687006&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=GveynPsCtRgNf5xllOIdz2Y5eNCZAvn4B9xEtzLDi1A&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__bugs.launchpad.net_heat_-2Bbug_1687006&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=GveynPsCtRgNf5xllOIdz2Y5eNCZAvn4B9xEtzLDi1A&e=</a>><br>
> <br>
> Is anybody using this feature? What am I missing?<br>
> <br>
> Best regards<br>
> Christian<br>
> -------------- next part --------------<br>
> An HTML attachment was scrubbed...<br>
> URL: <br>
> <<a href="http://lists.openstack.org/pipermail/openstack-operators/attachments/20181019/bb7dd81b/attachment-0001.html" rel="noreferrer" target="_blank">http://lists.openstack.org/pipermail/openstack-operators/attachments/20181019/bb7dd81b/attachment-0001.html</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181019_bb7dd81b_attachment-2D0001.html&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=YCjjLeySrbifzs2-92NmaHNUG4DFb6Ps4CpFzjdo0ts&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181019_bb7dd81b_attachment-2D0001.html&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=YCjjLeySrbifzs2-92NmaHNUG4DFb6Ps4CpFzjdo0ts&e=</a>>><br>
> <br>
> ------------------------------<br>
> <br>
> Message: 10<br>
> Date: Fri, 19 Oct 2018 12:42:00 +0300<br>
> From: Adrian Andreias <<a href="mailto:adrian@fleio.com" target="_blank">adrian@fleio.com</a>><br>
> To: <a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a><br>
> Subject: [Openstack-operators] Fleio - OpenStack billing - ver. 1.1<br>
>          released<br>
> Message-ID:<br>
>          <br>
> <CACp-FE3gEP=nwXRtwy-H13qXrnhPa5bn0uWiukxWp=<a href="mailto:YTU-4e8A@mail.gmail.com" target="_blank">YTU-4e8A@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> Hello,<br>
> <br>
> We've just released Fleio version 1.1.<br>
> <br>
> Fleio is a billing solution and control panel for OpenStack public clouds<br>
> and traditional web hosters.<br>
> <br>
> Fleio software automates the entire process for cloud users. New customers<br>
> can use Fleio to sign up for an account, pay invoices, add credit to their<br>
> account, as well as create and manage cloud resources such as virtual<br>
> machines, storage and networking.<br>
> <br>
> Full feature list:<br>
> <a href="https://fleio.com#features" rel="noreferrer" target="_blank">https://fleio.com#features</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com-23features&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=BrOjwRrcQVfBauwf8lZ439skCFkW1CmcZ4NNdTkQDGg&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com-23features&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=BrOjwRrcQVfBauwf8lZ439skCFkW1CmcZ4NNdTkQDGg&e=</a>><br>
> <br>
> You can see an online demo:<br>
> <a href="https://fleio.com/demo" rel="noreferrer" target="_blank">https://fleio.com/demo</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_demo&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=3Zute5FDzopFoMvqplhIEh9_6wmKOczoeYx4F2Ulni0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_demo&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=3Zute5FDzopFoMvqplhIEh9_6wmKOczoeYx4F2Ulni0&e=</a>><br>
> <br>
> And sign-up for a free trial:<br>
> <a href="https://fleio.com/signup" rel="noreferrer" target="_blank">https://fleio.com/signup</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_signup&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=1z9sWcZjZ3HsDnbaK7jH0_WcAJ_ZNSP7fw6hORW00v0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_signup&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=1z9sWcZjZ3HsDnbaK7jH0_WcAJ_ZNSP7fw6hORW00v0&e=</a>><br>
> <br>
> <br>
> <br>
> Cheers!<br>
> <br>
> - Adrian Andreias<br>
> <a href="https://fleio.com" rel="noreferrer" target="_blank">https://fleio.com</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=6dlGzWvUN7KbdNbPt3xeMM7tBqWDCXRb0hSyshGhYJM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=6dlGzWvUN7KbdNbPt3xeMM7tBqWDCXRb0hSyshGhYJM&e=</a>><br>
> -------------- next part --------------<br>
> An HTML attachment was scrubbed...<br>
> URL: <br>
> <<a href="http://lists.openstack.org/pipermail/openstack-operators/attachments/20181019/3031e47f/attachment-0001.html" rel="noreferrer" target="_blank">http://lists.openstack.org/pipermail/openstack-operators/attachments/20181019/3031e47f/attachment-0001.html</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181019_3031e47f_attachment-2D0001.html&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=JCagcM_ZjfKNMy6hUc9mScnVifU3IZVyccED28OEhpA&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181019_3031e47f_attachment-2D0001.html&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=JCagcM_ZjfKNMy6hUc9mScnVifU3IZVyccED28OEhpA&e=</a>>><br>
> <br>
> ------------------------------<br>
> <br>
> Message: 11<br>
> Date: Fri, 19 Oct 2018 20:54:29 +1100<br>
> From: Tony Breeds <<a href="mailto:tony@bakeyournoodle.com" target="_blank">tony@bakeyournoodle.com</a>><br>
> To: OpenStack Development <<a href="mailto:openstack-dev@lists.openstack.org" target="_blank">openstack-dev@lists.openstack.org</a>>,<br>
>          OpenStack SIGs <<a href="mailto:openstack-sigs@lists.openstack.org" target="_blank">openstack-sigs@lists.openstack.org</a>>, OpenStack<br>
>          Operators <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] [Openstack-sigs] [all] Naming the T<br>
>          release of OpenStack<br>
> Message-ID: <<a href="mailto:20181019095428.GA9399@thor.bakeyournoodle.com" target="_blank">20181019095428.GA9399@thor.bakeyournoodle.com</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> On Thu, Oct 18, 2018 at 05:35:39PM +1100, Tony Breeds wrote:<br>
>> Hello all,<br>
>>     As per [1] the nomination period for names for the T release have<br>
>> now closed (actually 3 days ago sorry).  The nominated names and any<br>
>> qualifying remarks can be seen at2].<br>
>> <br>
>> Proposed Names<br>
>>  * Tarryall<br>
>>  * Teakettle<br>
>>  * Teller<br>
>>  * Telluride<br>
>>  * Thomas<br>
>>  * Thornton<br>
>>  * Tiger<br>
>>  * Tincup<br>
>>  * Timnath<br>
>>  * Timber<br>
>>  * Tiny Town<br>
>>  * Torreys<br>
>>  * Trail<br>
>>  * Trinidad<br>
>>  * Treasure<br>
>>  * Troublesome<br>
>>  * Trussville<br>
>>  * Turret<br>
>>  * Tyrone<br>
>> <br>
>> Proposed Names that do not meet the criteria<br>
>>  * Train<br>
> <br>
> I have re-worked my openstack/governance change[1] to ask the TC to accept<br>
> adding Train to the poll as (partially) described in [2].<br>
> <br>
> I present the names above to the community and Foundation marketing team<br>
> for consideration.  The list above does contain Train, clearly if the TC<br>
> do not approve [1] Train will not be included in the poll when created.<br>
> <br>
> I apologise for any offence or slight caused by my previous email in<br>
> this thread.  It was well intentioned albeit, with hindsight, poorly<br>
> thought through.<br>
> <br>
> Yours Tony.<br>
> <br>
> [1] <a href="https://review.openstack.org/#/c/611511/" rel="noreferrer" target="_blank">https://review.openstack.org/#/c/611511/</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__review.openstack.org_-23_c_611511_&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=cRWATGRCwFhRInCOOTmTaFGPvMXWXznOs1-pnONNMvA&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__review.openstack.org_-23_c_611511_&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=cRWATGRCwFhRInCOOTmTaFGPvMXWXznOs1-pnONNMvA&e=</a>><br>
> [2] <br>
> <a href="https://governance.openstack.org/tc/reference/release-naming.html#release-name-criteria" rel="noreferrer" target="_blank">https://governance.openstack.org/tc/reference/release-naming.html#release-name-criteria</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__governance.openstack.org_tc_reference_release-2Dnaming.html-23release-2Dname-2Dcriteria&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=ORBvxW9YNjEKlSx6vbG0BIAOLa6sDtdIw1oWC8aGyvA&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__governance.openstack.org_tc_reference_release-2Dnaming.html-23release-2Dname-2Dcriteria&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=ORBvxW9YNjEKlSx6vbG0BIAOLa6sDtdIw1oWC8aGyvA&e=</a>><br>
> -------------- next part --------------<br>
> A non-text attachment was scrubbed...<br>
> Name: signature.asc<br>
> Type: application/pgp-signature<br>
> Size: 488 bytes<br>
> Desc: not available<br>
> URL: <br>
> <<a href="http://lists.openstack.org/pipermail/openstack-operators/attachments/20181019/49c95d5d/attachment-0001.sig" rel="noreferrer" target="_blank">http://lists.openstack.org/pipermail/openstack-operators/attachments/20181019/49c95d5d/attachment-0001.sig</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181019_49c95d5d_attachment-2D0001.sig&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=jMzO0p4dD0TpgnxO_HTziQRuWfGZJz4W1oPgADf0iw0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181019_49c95d5d_attachment-2D0001.sig&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=jMzO0p4dD0TpgnxO_HTziQRuWfGZJz4W1oPgADf0iw0&e=</a>>><br>
> <br>
> ------------------------------<br>
> <br>
> Message: 12<br>
> Date: Fri, 19 Oct 2018 16:33:17 +0000<br>
> From: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>><br>
> To: Chris Apsey <<a href="mailto:bitskrieg@bitskrieg.net" target="_blank">bitskrieg@bitskrieg.net</a>>, iain MacDonnell<br>
>          <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>>,<br>
>          "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non admin users can see private images from other tenants<br>
> Message-ID: <<a href="mailto:4704898B-D193-4540-B106-BF38ACAB68E2@nasa.gov" target="_blank">4704898B-D193-4540-B106-BF38ACAB68E2@nasa.gov</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> Our NDC domain is LDAP backed. Default is not.<br>
> <br>
> Our keystone policy.json file is empty {}<br>
> <br>
> <br>
> <br>
> Mike Moore, M.S.S.E.<br>
> <br>
> Systems Engineer, Goddard Private Cloud<br>
> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
> <br>
> Hydrogen fusion brightens my day.<br>
> <br>
> <br>
> On 10/18/18, 7:24 PM, "Chris Apsey" <<a href="mailto:bitskrieg@bitskrieg.net" target="_blank">bitskrieg@bitskrieg.net</a>> wrote:<br>
> <br>
>      We are using multiple keystone domains - still can't reproduce this.<br>
> <br>
>      Do you happen to have a customized keystone policy.json?<br>
> <br>
>      Worst case, I would launch a devstack of your targeted release.  If <br>
> you<br>
>      can't reproduce the issue there, you would at least know its caused <br>
> by a<br>
>      nonstandard config rather than a bug (or at least not a bug that's <br>
> present<br>
>      when using a default config)<br>
> <br>
>      On October 18, 2018 18:50:12 iain MacDonnell <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>><br>
>      wrote:<br>
> <br>
>      > That all looks fine.<br>
>      ><br>
>      > I believe that the "default" policy applies in place of any <br>
> that's not<br>
>      > explicitly specified - i.e. "if there's no matching policy below, you<br>
>      > need to have the admin role to be able to do it". I do have that <br>
> line in<br>
>      > my policy.json, and I cannot reproduce your problem (see below).<br>
>      ><br>
>      > I'm not using domains (other than "default"). I wonder if that's <br>
> a factor...<br>
>      ><br>
>      >     ~iain<br>
>      ><br>
>      ><br>
>      > $ openstack user create --password foo user1<br>
>      > +---------------------+----------------------------------+<br>
>      > | Field               | Value                            |<br>
>      > +---------------------+----------------------------------+<br>
>      > | domain_id           | default                          |<br>
>      > | enabled             | True                             |<br>
>      > | id                  | d18c0031ec56430499a2d690cb1f125c |<br>
>      > | name                | user1                            |<br>
>      > | options             | {}                               |<br>
>      > | password_expires_at | None                             |<br>
>      > +---------------------+----------------------------------+<br>
>      > $ openstack user create --password foo user2<br>
>      > +---------------------+----------------------------------+<br>
>      > | Field               | Value                            |<br>
>      > +---------------------+----------------------------------+<br>
>      > | domain_id           | default                          |<br>
>      > | enabled             | True                             |<br>
>      > | id                  | be9f1061a5104abd834eabe98dff055d |<br>
>      > | name                | user2                            |<br>
>      > | options             | {}                               |<br>
>      > | password_expires_at | None                             |<br>
>      > +---------------------+----------------------------------+<br>
>      > $ openstack project create project1<br>
>      > +-------------+----------------------------------+<br>
>      > | Field       | Value                            |<br>
>      > +-------------+----------------------------------+<br>
>      > | description |                                  |<br>
>      > | domain_id   | default                          |<br>
>      > | enabled     | True                             |<br>
>      > | id          | 826876d6d3724018bae6253c7f540cb3 |<br>
>      > | is_domain   | False                            |<br>
>      > | name        | project1                         |<br>
>      > | parent_id   | default                          |<br>
>      > | tags        | []                               |<br>
>      > +-------------+----------------------------------+<br>
>      > $ openstack project create project2<br>
>      > +-------------+----------------------------------+<br>
>      > | Field       | Value                            |<br>
>      > +-------------+----------------------------------+<br>
>      > | description |                                  |<br>
>      > | domain_id   | default                          |<br>
>      > | enabled     | True                             |<br>
>      > | id          | b446b93ac6e24d538c1943acbdd13cb2 |<br>
>      > | is_domain   | False                            |<br>
>      > | name        | project2                         |<br>
>      > | parent_id   | default                          |<br>
>      > | tags        | []                               |<br>
>      > +-------------+----------------------------------+<br>
>      > $ openstack role add --user user1 --project project1 _member_<br>
>      > $ openstack role add --user user2 --project project2 _member_<br>
>      > $ export OS_PASSWORD=foo<br>
>      > $ export OS_USERNAME=user1<br>
>      > $ export OS_PROJECT_NAME=project1<br>
>      > $ openstack image list<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ID                                   | Name   | Status |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > $ openstack image create --private image1<br>
>      > <br>
> +------------------+------------------------------------------------------------------------------+<br>
>      > | Field            | Value<br>
>      >                          |<br>
>      > <br>
> +------------------+------------------------------------------------------------------------------+<br>
>      > | checksum         | None<br>
>      >                          |<br>
>      > | container_format | bare<br>
>      >                          |<br>
>      > | created_at       | 2018-10-18T22:17:41Z<br>
>      >                          |<br>
>      > | disk_format      | raw<br>
>      >                          |<br>
>      > | file             |<br>
>      > /v2/images/6a0c1928-b79c-4dbf-a9c9-305b599056e4/file<br>
>      >     |<br>
>      > | id               | 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>      >                          |<br>
>      > | min_disk         | 0<br>
>      >                          |<br>
>      > | min_ram          | 0<br>
>      >                          |<br>
>      > | name             | image1<br>
>      >                          |<br>
>      > | owner            | 826876d6d3724018bae6253c7f540cb3<br>
>      >                          |<br>
>      > | properties       | locations='[]', os_hash_algo='None',<br>
>      > os_hash_value='None', os_hidden='False' |<br>
>      > | protected        | False<br>
>      >                          |<br>
>      > | schema           | /v2/schemas/image<br>
>      >                          |<br>
>      > | size             | None<br>
>      >                          |<br>
>      > | status           | queued<br>
>      >                          |<br>
>      > | tags             |<br>
>      >                          |<br>
>      > | updated_at       | 2018-10-18T22:17:41Z<br>
>      >                          |<br>
>      > | virtual_size     | None<br>
>      >                          |<br>
>      > | visibility       | private<br>
>      >                          |<br>
>      > <br>
> +------------------+------------------------------------------------------------------------------+<br>
>      > $ openstack image list<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ID                                   | Name   | Status |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>      > | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > $ export OS_USERNAME=user2<br>
>      > $ export OS_PROJECT_NAME=project2<br>
>      > $ openstack image list<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ID                                   | Name   | Status |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > $ export OS_USERNAME=admin<br>
>      > $ export OS_PROJECT_NAME=admin<br>
>      > $ export OS_PASSWORD=xxx<br>
>      > $ openstack image set --public 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>      > $ export OS_USERNAME=user2<br>
>      > $ export OS_PROJECT_NAME=project2<br>
>      > $ export OS_PASSWORD=foo<br>
>      > $ openstack image list<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ID                                   | Name   | Status |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>      > | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
>      > +--------------------------------------+--------+--------+<br>
>      > $<br>
>      ><br>
>      ><br>
>      > On 10/18/2018 03:32 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>      > INTEGRA, INC.] wrote:<br>
>      >> openstack user create --domain default --password xxxxxxxx <br>
> --project-domain<br>
>      >> ndc --project test mike<br>
>      >><br>
>      >><br>
>      >> openstack role add --user mike --user-domain default --project <br>
> test user<br>
>      >><br>
>      >> my admin account is in the NDC domain with a different username.<br>
>      >><br>
>      >><br>
>      >><br>
>      >> /etc/glance/policy.json<br>
>      >> {<br>
>      >><br>
>      >> "context_is_admin":  "role:admin",<br>
>      >> "default": "role:admin",<br>
>      >><br>
>      >> <snip><br>
>      >><br>
>      >><br>
>      >> I'm not terribly familiar with the policies but I feel like that <br>
> default<br>
>      >> line is making everyone an admin by default?<br>
>      >><br>
>      >><br>
>      >> Mike Moore, M.S.S.E.<br>
>      >><br>
>      >> Systems Engineer, Goddard Private Cloud<br>
>      >> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>      >><br>
>      >> Hydrogen fusion brightens my day.<br>
>      >><br>
>      >><br>
>      >> On 10/18/18, 6:25 PM, "iain MacDonnell" <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>      >><br>
>      >><br>
>      >> I suspect that your non-admin user is not really non-admin. How <br>
> did you<br>
>      >> create it?<br>
>      >><br>
>      >> What you have for "context_is_admin" in glance's policy.json ?<br>
>      >><br>
>      >>  ~iain<br>
>      >><br>
>      >><br>
>      >> On 10/18/2018 03:11 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>      >> INTEGRA, INC.] wrote:<br>
>      >>> I have replicated this unexpected behavior in a Pike test <br>
> environment, in<br>
>      >>> addition to our Queens environment.<br>
>      >>><br>
>      >>><br>
>      >>><br>
>      >>> Mike Moore, M.S.S.E.<br>
>      >>><br>
>      >>> Systems Engineer, Goddard Private Cloud<br>
>      >>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>      >>><br>
>      >>> Hydrogen fusion brightens my day.<br>
>      >>><br>
>      >>><br>
>      >>> On 10/18/18, 2:30 PM, "Moore, Michael Dane <br>
> (GSFC-720.0)[BUSINESS INTEGRA,<br>
>      >>> INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>      >>><br>
>      >>>    Yes. I verified it by creating a non-admin user in a <br>
> different tenant. I<br>
>      >>>    created a new image, set to private with the project defined <br>
> as our admin<br>
>      >>>    tenant.<br>
>      >>><br>
>      >>>    In the database I can see that the image is 'private' and <br>
> the owner is the<br>
>      >>>    ID of the admin tenant.<br>
>      >>><br>
>      >>>    Mike Moore, M.S.S.E.<br>
>      >>><br>
>      >>>    Systems Engineer, Goddard Private Cloud<br>
>      >>>    <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>      >>><br>
>      >>>    Hydrogen fusion brightens my day.<br>
>      >>><br>
>      >>><br>
>      >>>    On 10/18/18, 1:07 AM, "iain MacDonnell" <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>      >>><br>
>      >>><br>
>      >>><br>
>      >>>        On 10/17/2018 12:29 PM, Moore, Michael Dane <br>
> (GSFC-720.0)[BUSINESS<br>
>      >>>        INTEGRA, INC.] wrote:<br>
>      >>>        > I’m seeing unexpected behavior in our Queens <br>
> environment related to<br>
>      >>>        > Glance image visibility. Specifically users who, based <br>
> on my<br>
>      >>>        > understanding of the visibility and ownership fields, <br>
> should NOT be able<br>
>      >>>        > to see or view the image.<br>
>      >>>        ><br>
>      >>>        > If I create a new image with openstack image create <br>
> and specify –project<br>
>      >>>        > <tenant> and –private a non-admin user in a different <br>
> tenant can see and<br>
>      >>>        > boot that image.<br>
>      >>>        ><br>
>      >>>        > That seems to be the opposite of what should happen. <br>
> Any ideas?<br>
>      >>><br>
>      >>>        Yep, something's not right there.<br>
>      >>><br>
>      >>>        Are you sure that the user that can see the image <br>
> doesn't have the admin<br>
>      >>>        role (for the project in its keystone token) ?<br>
>      >>><br>
>      >>>        Did you verify that the image's owner is what you <br>
> intended, and that the<br>
>      >>>        visibility really is "private" ?<br>
>      >>><br>
>      >>>             ~iain<br>
>      >>><br>
>      >>>        _______________________________________________<br>
>      >>>        OpenStack-operators mailing list<br>
>      >>>        <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>      >>> <br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>      >>><br>
>      >>><br>
>      >>>    _______________________________________________<br>
>      >>>    OpenStack-operators mailing list<br>
>      >>>    <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>      >>> <br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>      ><br>
>      > _______________________________________________<br>
>      > OpenStack-operators mailing list<br>
>      > <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>      > <br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 13<br>
> Date: Fri, 19 Oct 2018 16:54:12 +0000<br>
> From: "Moore, Michael Dane (GSFC-720.0)[BUSINESS INTEGRA, INC.]"<br>
>          <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>><br>
> To: Chris Apsey <<a href="mailto:bitskrieg@bitskrieg.net" target="_blank">bitskrieg@bitskrieg.net</a>>, iain MacDonnell<br>
>          <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>>,<br>
>          "<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>"<br>
>          <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Glance Image Visibility Issue? -<br>
>          Non admin users can see private images from other tenants<br>
> Message-ID: <<a href="mailto:A5FD0CCA-8B13-424D-A8F2-E6ACECF58C23@nasa.gov" target="_blank">A5FD0CCA-8B13-424D-A8F2-E6ACECF58C23@nasa.gov</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> <br>
> For reference, here is our full glance policy.json<br>
> <br>
> <br>
> {<br>
>      "context_is_admin":  "role:admin",<br>
>      "default": "role:admin",<br>
> <br>
>      "add_image": "",<br>
>      "delete_image": "",<br>
>      "get_image": "",<br>
>      "get_images": "",<br>
>      "modify_image": "",<br>
>      "publicize_image": "role:admin",<br>
>      "communitize_image": "",<br>
>      "copy_from": "",<br>
> <br>
>      "download_image": "",<br>
>      "upload_image": "",<br>
> <br>
>      "delete_image_location": "",<br>
>      "get_image_location": "",<br>
>      "set_image_location": "",<br>
> <br>
>      "add_member": "",<br>
>      "delete_member": "",<br>
>      "get_member": "",<br>
>      "get_members": "",<br>
>      "modify_member": "",<br>
> <br>
>      "manage_image_cache": "role:admin",<br>
> <br>
>      "get_task": "",<br>
>      "get_tasks": "",<br>
>      "add_task": "",<br>
>      "modify_task": "",<br>
>      "tasks_api_access": "role:admin",<br>
> <br>
>      "deactivate": "",<br>
>      "reactivate": "",<br>
> <br>
>      "get_metadef_namespace": "",<br>
>      "get_metadef_namespaces":"",<br>
>      "modify_metadef_namespace":"",<br>
>      "add_metadef_namespace":"",<br>
> <br>
>      "get_metadef_object":"",<br>
>      "get_metadef_objects":"",<br>
>      "modify_metadef_object":"",<br>
>      "add_metadef_object":"",<br>
> <br>
>      "list_metadef_resource_types":"",<br>
>      "get_metadef_resource_type":"",<br>
>      "add_metadef_resource_type_association":"",<br>
> <br>
>      "get_metadef_property":"",<br>
>      "get_metadef_properties":"",<br>
>      "modify_metadef_property":"",<br>
>      "add_metadef_property":"",<br>
> <br>
>      "get_metadef_tag":"",<br>
>      "get_metadef_tags":"",<br>
>      "modify_metadef_tag":"",<br>
>      "add_metadef_tag":"",<br>
>      "add_metadef_tags":""<br>
> <br>
> }<br>
> <br>
> <br>
> Mike Moore, M.S.S.E.<br>
> <br>
> Systems Engineer, Goddard Private Cloud<br>
> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
> <br>
> Hydrogen fusion brightens my day.<br>
> <br>
> <br>
> On 10/19/18, 12:39 PM, "Moore, Michael Dane (GSFC-720.0)[BUSINESS <br>
> INTEGRA, INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
> <br>
>      Our NDC domain is LDAP backed. Default is not.<br>
> <br>
>      Our keystone policy.json file is empty {}<br>
> <br>
> <br>
> <br>
>      Mike Moore, M.S.S.E.<br>
> <br>
>      Systems Engineer, Goddard Private Cloud<br>
>      <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
> <br>
>      Hydrogen fusion brightens my day.<br>
> <br>
> <br>
>      On 10/18/18, 7:24 PM, "Chris Apsey" <<a href="mailto:bitskrieg@bitskrieg.net" target="_blank">bitskrieg@bitskrieg.net</a>> wrote:<br>
> <br>
>          We are using multiple keystone domains - still can't reproduce <br>
> this.<br>
> <br>
>          Do you happen to have a customized keystone policy.json?<br>
> <br>
>          Worst case, I would launch a devstack of your targeted <br>
> release.  If you<br>
>          can't reproduce the issue there, you would at least know its <br>
> caused by a<br>
>          nonstandard config rather than a bug (or at least not a bug <br>
> that's present<br>
>          when using a default config)<br>
> <br>
>          On October 18, 2018 18:50:12 iain MacDonnell <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>><br>
>          wrote:<br>
> <br>
>          > That all looks fine.<br>
>          ><br>
>          > I believe that the "default" policy applies in place of any <br>
> that's not<br>
>          > explicitly specified - i.e. "if there's no matching policy <br>
> below, you<br>
>          > need to have the admin role to be able to do it". I do have <br>
> that line in<br>
>          > my policy.json, and I cannot reproduce your problem (see below).<br>
>          ><br>
>          > I'm not using domains (other than "default"). I wonder if <br>
> that's a factor...<br>
>          ><br>
>          >     ~iain<br>
>          ><br>
>          ><br>
>          > $ openstack user create --password foo user1<br>
>          > +---------------------+----------------------------------+<br>
>          > | Field               | Value                            |<br>
>          > +---------------------+----------------------------------+<br>
>          > | domain_id           | default                          |<br>
>          > | enabled             | True                             |<br>
>          > | id                  | d18c0031ec56430499a2d690cb1f125c |<br>
>          > | name                | user1                            |<br>
>          > | options             | {}                               |<br>
>          > | password_expires_at | None                             |<br>
>          > +---------------------+----------------------------------+<br>
>          > $ openstack user create --password foo user2<br>
>          > +---------------------+----------------------------------+<br>
>          > | Field               | Value                            |<br>
>          > +---------------------+----------------------------------+<br>
>          > | domain_id           | default                          |<br>
>          > | enabled             | True                             |<br>
>          > | id                  | be9f1061a5104abd834eabe98dff055d |<br>
>          > | name                | user2                            |<br>
>          > | options             | {}                               |<br>
>          > | password_expires_at | None                             |<br>
>          > +---------------------+----------------------------------+<br>
>          > $ openstack project create project1<br>
>          > +-------------+----------------------------------+<br>
>          > | Field       | Value                            |<br>
>          > +-------------+----------------------------------+<br>
>          > | description |                                  |<br>
>          > | domain_id   | default                          |<br>
>          > | enabled     | True                             |<br>
>          > | id          | 826876d6d3724018bae6253c7f540cb3 |<br>
>          > | is_domain   | False                            |<br>
>          > | name        | project1                         |<br>
>          > | parent_id   | default                          |<br>
>          > | tags        | []                               |<br>
>          > +-------------+----------------------------------+<br>
>          > $ openstack project create project2<br>
>          > +-------------+----------------------------------+<br>
>          > | Field       | Value                            |<br>
>          > +-------------+----------------------------------+<br>
>          > | description |                                  |<br>
>          > | domain_id   | default                          |<br>
>          > | enabled     | True                             |<br>
>          > | id          | b446b93ac6e24d538c1943acbdd13cb2 |<br>
>          > | is_domain   | False                            |<br>
>          > | name        | project2                         |<br>
>          > | parent_id   | default                          |<br>
>          > | tags        | []                               |<br>
>          > +-------------+----------------------------------+<br>
>          > $ openstack role add --user user1 --project project1 _member_<br>
>          > $ openstack role add --user user2 --project project2 _member_<br>
>          > $ export OS_PASSWORD=foo<br>
>          > $ export OS_USERNAME=user1<br>
>          > $ export OS_PROJECT_NAME=project1<br>
>          > $ openstack image list<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ID                                   | Name   | Status |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > $ openstack image create --private image1<br>
>          > <br>
> +------------------+------------------------------------------------------------------------------+<br>
>          > | Field            | Value<br>
>          >                          |<br>
>          > <br>
> +------------------+------------------------------------------------------------------------------+<br>
>          > | checksum         | None<br>
>          >                          |<br>
>          > | container_format | bare<br>
>          >                          |<br>
>          > | created_at       | 2018-10-18T22:17:41Z<br>
>          >                          |<br>
>          > | disk_format      | raw<br>
>          >                          |<br>
>          > | file             |<br>
>          > /v2/images/6a0c1928-b79c-4dbf-a9c9-305b599056e4/file<br>
>          >     |<br>
>          > | id               | 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>          >                          |<br>
>          > | min_disk         | 0<br>
>          >                          |<br>
>          > | min_ram          | 0<br>
>          >                          |<br>
>          > | name             | image1<br>
>          >                          |<br>
>          > | owner            | 826876d6d3724018bae6253c7f540cb3<br>
>          >                          |<br>
>          > | properties       | locations='[]', os_hash_algo='None',<br>
>          > os_hash_value='None', os_hidden='False' |<br>
>          > | protected        | False<br>
>          >                          |<br>
>          > | schema           | /v2/schemas/image<br>
>          >                          |<br>
>          > | size             | None<br>
>          >                          |<br>
>          > | status           | queued<br>
>          >                          |<br>
>          > | tags             |<br>
>          >                          |<br>
>          > | updated_at       | 2018-10-18T22:17:41Z<br>
>          >                          |<br>
>          > | virtual_size     | None<br>
>          >                          |<br>
>          > | visibility       | private<br>
>          >                          |<br>
>          > <br>
> +------------------+------------------------------------------------------------------------------+<br>
>          > $ openstack image list<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ID                                   | Name   | Status |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>          > | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > $ export OS_USERNAME=user2<br>
>          > $ export OS_PROJECT_NAME=project2<br>
>          > $ openstack image list<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ID                                   | Name   | Status |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > $ export OS_USERNAME=admin<br>
>          > $ export OS_PROJECT_NAME=admin<br>
>          > $ export OS_PASSWORD=xxx<br>
>          > $ openstack image set --public <br>
> 6a0c1928-b79c-4dbf-a9c9-305b599056e4<br>
>          > $ export OS_USERNAME=user2<br>
>          > $ export OS_PROJECT_NAME=project2<br>
>          > $ export OS_PASSWORD=foo<br>
>          > $ openstack image list<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ID                                   | Name   | Status |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > | ad497523-b497-4500-8e6c-b5fb12a30cee | cirros | active |<br>
>          > | 6a0c1928-b79c-4dbf-a9c9-305b599056e4 | image1 | queued |<br>
>          > +--------------------------------------+--------+--------+<br>
>          > $<br>
>          ><br>
>          ><br>
>          > On 10/18/2018 03:32 PM, Moore, Michael Dane (GSFC-720.0)[BUSINESS<br>
>          > INTEGRA, INC.] wrote:<br>
>          >> openstack user create --domain default --password xxxxxxxx <br>
> --project-domain<br>
>          >> ndc --project test mike<br>
>          >><br>
>          >><br>
>          >> openstack role add --user mike --user-domain default <br>
> --project test user<br>
>          >><br>
>          >> my admin account is in the NDC domain with a different username.<br>
>          >><br>
>          >><br>
>          >><br>
>          >> /etc/glance/policy.json<br>
>          >> {<br>
>          >><br>
>          >> "context_is_admin":  "role:admin",<br>
>          >> "default": "role:admin",<br>
>          >><br>
>          >> <snip><br>
>          >><br>
>          >><br>
>          >> I'm not terribly familiar with the policies but I feel like <br>
> that default<br>
>          >> line is making everyone an admin by default?<br>
>          >><br>
>          >><br>
>          >> Mike Moore, M.S.S.E.<br>
>          >><br>
>          >> Systems Engineer, Goddard Private Cloud<br>
>          >> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>          >><br>
>          >> Hydrogen fusion brightens my day.<br>
>          >><br>
>          >><br>
>          >> On 10/18/18, 6:25 PM, "iain MacDonnell" <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>          >><br>
>          >><br>
>          >> I suspect that your non-admin user is not really non-admin. <br>
> How did you<br>
>          >> create it?<br>
>          >><br>
>          >> What you have for "context_is_admin" in glance's policy.json ?<br>
>          >><br>
>          >>  ~iain<br>
>          >><br>
>          >><br>
>          >> On 10/18/2018 03:11 PM, Moore, Michael Dane <br>
> (GSFC-720.0)[BUSINESS<br>
>          >> INTEGRA, INC.] wrote:<br>
>          >>> I have replicated this unexpected behavior in a Pike test <br>
> environment, in<br>
>          >>> addition to our Queens environment.<br>
>          >>><br>
>          >>><br>
>          >>><br>
>          >>> Mike Moore, M.S.S.E.<br>
>          >>><br>
>          >>> Systems Engineer, Goddard Private Cloud<br>
>          >>> <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>          >>><br>
>          >>> Hydrogen fusion brightens my day.<br>
>          >>><br>
>          >>><br>
>          >>> On 10/18/18, 2:30 PM, "Moore, Michael Dane <br>
> (GSFC-720.0)[BUSINESS INTEGRA,<br>
>          >>> INC.]" <<a href="mailto:michael.d.moore@nasa.gov" target="_blank">michael.d.moore@nasa.gov</a>> wrote:<br>
>          >>><br>
>          >>>    Yes. I verified it by creating a non-admin user in a <br>
> different tenant. I<br>
>          >>>    created a new image, set to private with the project <br>
> defined as our admin<br>
>          >>>    tenant.<br>
>          >>><br>
>          >>>    In the database I can see that the image is 'private' <br>
> and the owner is the<br>
>          >>>    ID of the admin tenant.<br>
>          >>><br>
>          >>>    Mike Moore, M.S.S.E.<br>
>          >>><br>
>          >>>    Systems Engineer, Goddard Private Cloud<br>
>          >>>    <a href="mailto:Michael.D.Moore@nasa.gov" target="_blank">Michael.D.Moore@nasa.gov</a><br>
>          >>><br>
>          >>>    Hydrogen fusion brightens my day.<br>
>          >>><br>
>          >>><br>
>          >>>    On 10/18/18, 1:07 AM, "iain MacDonnell" <br>
> <<a href="mailto:iain.macdonnell@oracle.com" target="_blank">iain.macdonnell@oracle.com</a>> wrote:<br>
>          >>><br>
>          >>><br>
>          >>><br>
>          >>>        On 10/17/2018 12:29 PM, Moore, Michael Dane <br>
> (GSFC-720.0)[BUSINESS<br>
>          >>>        INTEGRA, INC.] wrote:<br>
>          >>>        > I’m seeing unexpected behavior in our Queens <br>
> environment related to<br>
>          >>>        > Glance image visibility. Specifically users who, <br>
> based on my<br>
>          >>>        > understanding of the visibility and ownership <br>
> fields, should NOT be able<br>
>          >>>        > to see or view the image.<br>
>          >>>        ><br>
>          >>>        > If I create a new image with openstack image <br>
> create and specify –project<br>
>          >>>        > <tenant> and –private a non-admin user in a <br>
> different tenant can see and<br>
>          >>>        > boot that image.<br>
>          >>>        ><br>
>          >>>        > That seems to be the opposite of what should <br>
> happen. Any ideas?<br>
>          >>><br>
>          >>>        Yep, something's not right there.<br>
>          >>><br>
>          >>>        Are you sure that the user that can see the image <br>
> doesn't have the admin<br>
>          >>>        role (for the project in its keystone token) ?<br>
>          >>><br>
>          >>>        Did you verify that the image's owner is what you <br>
> intended, and that the<br>
>          >>>        visibility really is "private" ?<br>
>          >>><br>
>          >>>             ~iain<br>
>          >>><br>
>          >>>        _______________________________________________<br>
>          >>>        OpenStack-operators mailing list<br>
>          >>>        <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>          >>> <br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>          >>><br>
>          >>><br>
>          >>>    _______________________________________________<br>
>          >>>    OpenStack-operators mailing list<br>
>          >>>    <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>          >>> <br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=B-M8uELxrmQ5uIYT792YA5rpb5NLAecRQPH_ITY1R5k&s=1KSr8HB8BJJB4-nGHyuZDcQUdssno-bBdbNqswMm6oE&e=</a><br>
>          ><br>
>          > _______________________________________________<br>
>          > OpenStack-operators mailing list<br>
>          > <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>          > <br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> <br>
> <br>
>      _______________________________________________<br>
>      OpenStack-operators mailing list<br>
>      <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 14<br>
> Date: Fri, 19 Oct 2018 13:45:03 -0400<br>
> From: Jay Pipes <<a href="mailto:jaypipes@gmail.com" target="_blank">jaypipes@gmail.com</a>><br>
> To: <a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a><br>
> Subject: Re: [Openstack-operators] Fleio - OpenStack billing - ver.<br>
>          1.1 released<br>
> Message-ID: <<a href="mailto:b3f680a3-71ef-5c55-6dea-d71c9d973640@gmail.com" target="_blank">b3f680a3-71ef-5c55-6dea-d71c9d973640@gmail.com</a>><br>
> Content-Type: text/plain; charset=utf-8; format=flowed<br>
> <br>
> Please do not use these mailing lists to advertise<br>
> closed-source/proprietary software solutions.<br>
> <br>
> Thank you,<br>
> -jay<br>
> <br>
> On 10/19/2018 05:42 AM, Adrian Andreias wrote:<br>
>> Hello,<br>
>> <br>
>> We've just released Fleio version 1.1.<br>
>> <br>
>> Fleio is a billing solution and control panel for OpenStack public <br>
>> clouds and traditional web hosters.<br>
>> <br>
>> Fleio software automates the entire process for cloud users. New <br>
>> customers can use Fleio to sign up for an account, pay invoices, add <br>
>> credit to their account, as well as create and manage cloud resources <br>
>> such as virtual machines, storage and networking.<br>
>> <br>
>> Full feature list:<br>
>> <a href="https://fleio.com#features" rel="noreferrer" target="_blank">https://fleio.com#features</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com-23features&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=BrOjwRrcQVfBauwf8lZ439skCFkW1CmcZ4NNdTkQDGg&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com-23features&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=BrOjwRrcQVfBauwf8lZ439skCFkW1CmcZ4NNdTkQDGg&e=</a>><br>
>> <br>
>> You can see an online demo:<br>
>> <a href="https://fleio.com/demo" rel="noreferrer" target="_blank">https://fleio.com/demo</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_demo&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=3Zute5FDzopFoMvqplhIEh9_6wmKOczoeYx4F2Ulni0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_demo&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=3Zute5FDzopFoMvqplhIEh9_6wmKOczoeYx4F2Ulni0&e=</a>><br>
>> <br>
>> And sign-up for a free trial:<br>
>> <a href="https://fleio.com/signup" rel="noreferrer" target="_blank">https://fleio.com/signup</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_signup&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=1z9sWcZjZ3HsDnbaK7jH0_WcAJ_ZNSP7fw6hORW00v0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_signup&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=1z9sWcZjZ3HsDnbaK7jH0_WcAJ_ZNSP7fw6hORW00v0&e=</a>><br>
>> <br>
>> <br>
>> <br>
>> Cheers!<br>
>> <br>
>> - Adrian Andreias<br>
>> <a href="https://fleio.com" rel="noreferrer" target="_blank">https://fleio.com</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=6dlGzWvUN7KbdNbPt3xeMM7tBqWDCXRb0hSyshGhYJM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=6dlGzWvUN7KbdNbPt3xeMM7tBqWDCXRb0hSyshGhYJM&e=</a>><br>
>> <br>
>> <br>
>> <br>
>> _______________________________________________<br>
>> OpenStack-operators mailing list<br>
>> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
>> <br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 15<br>
> Date: Fri, 19 Oct 2018 20:13:40 +0200<br>
> From: Mohammed Naser <<a href="mailto:mnaser@vexxhost.com" target="_blank">mnaser@vexxhost.com</a>><br>
> To: <a href="mailto:jaypipes@gmail.com" target="_blank">jaypipes@gmail.com</a><br>
> Cc: openstack-operators <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] Fleio - OpenStack billing - ver.<br>
>          1.1     released<br>
> Message-ID:<br>
>          <br>
> <<a href="mailto:CAEs876gDHPFjgxnD%2BHHKyP782u2XX0attJq9dYiYFDibc6DTZQ@mail.gmail.com" target="_blank">CAEs876gDHPFjgxnD+HHKyP782u2XX0attJq9dYiYFDibc6DTZQ@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="UTF-8"<br>
> <br>
> On Fri, Oct 19, 2018 at 7:45 PM Jay Pipes <<a href="mailto:jaypipes@gmail.com" target="_blank">jaypipes@gmail.com</a>> wrote:<br>
>><br>
>> Please do not use these mailing lists to advertise<br>
>> closed-source/proprietary software solutions.<br>
> <br>
> +1<br>
> <br>
>> Thank you,<br>
>> -jay<br>
>><br>
>> On 10/19/2018 05:42 AM, Adrian Andreias wrote:<br>
>> > Hello,<br>
>> ><br>
>> > We've just released Fleio version 1.1.<br>
>> ><br>
>> > Fleio is a billing solution and control panel for OpenStack public<br>
>> > clouds and traditional web hosters.<br>
>> ><br>
>> > Fleio software automates the entire process for cloud users. New<br>
>> > customers can use Fleio to sign up for an account, pay invoices, add<br>
>> > credit to their account, as well as create and manage cloud resources<br>
>> > such as virtual machines, storage and networking.<br>
>> ><br>
>> > Full feature list:<br>
>> > <a href="https://fleio.com#features" rel="noreferrer" target="_blank">https://fleio.com#features</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com-23features&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=BrOjwRrcQVfBauwf8lZ439skCFkW1CmcZ4NNdTkQDGg&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com-23features&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=BrOjwRrcQVfBauwf8lZ439skCFkW1CmcZ4NNdTkQDGg&e=</a>><br>
>> ><br>
>> > You can see an online demo:<br>
>> > <a href="https://fleio.com/demo" rel="noreferrer" target="_blank">https://fleio.com/demo</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_demo&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=3Zute5FDzopFoMvqplhIEh9_6wmKOczoeYx4F2Ulni0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_demo&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=3Zute5FDzopFoMvqplhIEh9_6wmKOczoeYx4F2Ulni0&e=</a>><br>
>> ><br>
>> > And sign-up for a free trial:<br>
>> > <a href="https://fleio.com/signup" rel="noreferrer" target="_blank">https://fleio.com/signup</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_signup&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=1z9sWcZjZ3HsDnbaK7jH0_WcAJ_ZNSP7fw6hORW00v0&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com_signup&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=1z9sWcZjZ3HsDnbaK7jH0_WcAJ_ZNSP7fw6hORW00v0&e=</a>><br>
>> ><br>
>> ><br>
>> ><br>
>> > Cheers!<br>
>> ><br>
>> > - Adrian Andreias<br>
>> > <a href="https://fleio.com" rel="noreferrer" target="_blank">https://fleio.com</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=6dlGzWvUN7KbdNbPt3xeMM7tBqWDCXRb0hSyshGhYJM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=https-3A__fleio.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=6dlGzWvUN7KbdNbPt3xeMM7tBqWDCXRb0hSyshGhYJM&e=</a>><br>
>> ><br>
>> ><br>
>> ><br>
>> > _______________________________________________<br>
>> > OpenStack-operators mailing list<br>
>> > <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>> > <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
>> ><br>
>><br>
>> _______________________________________________<br>
>> OpenStack-operators mailing list<br>
>> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> <br>
> -- <br>
> Mohammed Naser — vexxhost<br>
> -----------------------------------------------------<br>
> D. 514-316-8872<br>
> D. 800-910-1726 ext. 200<br>
> E. <a href="mailto:mnaser@vexxhost.com" target="_blank">mnaser@vexxhost.com</a><br>
> W. <a href="http://vexxhost.com" rel="noreferrer" target="_blank">http://vexxhost.com</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__vexxhost.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=bq9EPen7RattOa34V0HaOLcBDca21nN47DlkgOKUYMM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__vexxhost.com&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=bq9EPen7RattOa34V0HaOLcBDca21nN47DlkgOKUYMM&e=</a>><br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 16<br>
> Date: Fri, 19 Oct 2018 14:39:29 -0400<br>
> From: Erik McCormick <<a href="mailto:emccormick@cirrusseven.com" target="_blank">emccormick@cirrusseven.com</a>><br>
> To: openstack-operators <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: [Openstack-operators] [Octavia] SSL errors polling amphorae<br>
>          and     missing tenant network interface<br>
> Message-ID:<br>
>          <br>
> <CAHUi5cNByYFRr4vHY9iAEhAFc=<a href="mailto:MhdjhBWHNArCQG0D-w-Z2gFg@mail.gmail.com" target="_blank">MhdjhBWHNArCQG0D-w-Z2gFg@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="UTF-8"<br>
> <br>
> I've been wrestling with getting Octavia up and running and have<br>
> become stuck on two issues. I'm hoping someone has run into these<br>
> before. My google foo has come up empty.<br>
> <br>
> Issue 1:<br>
> When the Octavia controller tries to poll the amphora instance, it<br>
> tries repeatedly and eventually fails. The error on the controller<br>
> side is:<br>
> <br>
> 2018-10-19 14:17:39.181 26 ERROR<br>
> octavia.amphorae.drivers.haproxy.rest_api_driver [-] Connection<br>
> retries (currently set to 300) exhausted.  The amphora is unavailable.<br>
> Reason: HTTPSConnectionPool(host='10.7.0.112', port=9443): Max retries<br>
> exceeded with url: /0.5/plug/vip/<a href="http://10.250.20.15" rel="noreferrer" target="_blank">10.250.20.15</a> (Caused by<br>
> SSLError(SSLError("bad handshake: Error([('rsa routines',<br>
> 'RSA_padding_check_PKCS1_type_1', 'invalid padding'), ('rsa routines',<br>
> 'rsa_ossl_public_decrypt', 'padding check failed'), ('asn1 encoding<br>
> routines', 'ASN1_item_verify', 'EVP lib'), ('SSL routines',<br>
> 'tls_process_server_certificate', 'certificate verify<br>
> failed')],)",),)): SSLError: HTTPSConnectionPool(host='10.7.0.112',<br>
> port=9443): Max retries exceeded with url: /0.5/plug/vip/<a href="http://10.250.20.15" rel="noreferrer" target="_blank">10.250.20.15</a><br>
> (Caused by SSLError(SSLError("bad handshake: Error([('rsa routines',<br>
> 'RSA_padding_check_PKCS1_type_1', 'invalid padding'), ('rsa routines',<br>
> 'rsa_ossl_public_decrypt', 'padding check failed'), ('asn1 encoding<br>
> routines', 'ASN1_item_verify', 'EVP lib'), ('SSL routines',<br>
> 'tls_process_server_certificate', 'certificate verify<br>
> failed')],)",),))<br>
> <br>
> On the amphora side I see:<br>
> [2018-10-19 17:52:54 +0000] [1331] [DEBUG] Error processing SSL request.<br>
> [2018-10-19 17:52:54 +0000] [1331] [DEBUG] Invalid request from<br>
> ip=::ffff:<a href="http://10.7.0.40" rel="noreferrer" target="_blank">10.7.0.40</a>: [SSL: SSL_HANDSHAKE_FAILURE] ssl handshake<br>
> failure (_ssl.c:1754)<br>
> <br>
> I've generated certificates both with the script in the Octavia git<br>
> repo, and with the Openstack Ansible playbook. I can see that they are<br>
> present in /etc/octavia/certs.<br>
> <br>
> I'm using the Kolla (Queens) containers for the control plane so I'm<br>
> sure I've satisfied all the python library constraints.<br>
> <br>
> Issue 2:<br>
> I"m not sure how it gets configured, but the tenant network interface<br>
> (ens6) never comes up. I can spawn other instances on that network<br>
> with no issue, and I can see that Neutron has the port attached to the<br>
> instance. However, in the instance this is all I get:<br>
> <br>
> ubuntu@amphora-33e0aab3-8bc4-4fcb-bc42-b9b36afb16d4:~$ ip a<br>
> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN<br>
> group default qlen 1<br>
>      link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00<br>
>      inet <a href="http://127.0.0.1/8" rel="noreferrer" target="_blank">127.0.0.1/8</a> scope host lo<br>
>         valid_lft forever preferred_lft forever<br>
>      inet6 ::1/128 scope host<br>
>         valid_lft forever preferred_lft forever<br>
> 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast<br>
> state UP group default qlen 1000<br>
>      link/ether fa:16:3e:30:c4:60 brd ff:ff:ff:ff:ff:ff<br>
>      inet <a href="http://10.7.0.112/16" rel="noreferrer" target="_blank">10.7.0.112/16</a> brd 10.7.255.255 scope global ens3<br>
>         valid_lft forever preferred_lft forever<br>
>      inet6 fe80::f816:3eff:fe30:c460/64 scope link<br>
>         valid_lft forever preferred_lft forever<br>
> 3: ens6: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group<br>
> default qlen 1000<br>
>      link/ether fa:16:3e:89:a2:7f brd ff:ff:ff:ff:ff:ff<br>
> <br>
> There's no evidence of the interface anywhere else including udev rules.<br>
> <br>
> Any help with either or both issues would be greatly appreciated.<br>
> <br>
> Cheers,<br>
> Erik<br>
> <br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> Message: 17<br>
> Date: Sat, 20 Oct 2018 01:47:42 +0200<br>
> From: Gaël THEROND <<a href="mailto:gael.therond@gmail.com" target="_blank">gael.therond@gmail.com</a>><br>
> To: Erik McCormick <<a href="mailto:emccormick@cirrusseven.com" target="_blank">emccormick@cirrusseven.com</a>><br>
> Cc: openstack-operators <<a href="mailto:openstack-operators@lists.openstack.org" target="_blank">openstack-operators@lists.openstack.org</a>><br>
> Subject: Re: [Openstack-operators] [Octavia] SSL errors polling<br>
>          amphorae and missing tenant network interface<br>
> Message-ID:<br>
>          <br>
> <CAG+53ua-Hcjjq=_<a href="mailto:00rUZNsATmWq7g_8uZbMXAB_9VghtR_ByZA@mail.gmail.com" target="_blank">00rUZNsATmWq7g_8uZbMXAB_9VghtR_ByZA@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="utf-8"<br>
> <br>
> Hi eric!<br>
> <br>
> Glad I’m not the only one having this issue with the ssl communication<br>
> between the amphora and the CP.<br>
> <br>
> Even if I don’t yet get a clear answer regarding that issue, I think your<br>
> second issue is not an issue as the interface is mounted on a namespace and<br>
> so you’ll need to list all nic even those from namespace.<br>
> <br>
> Use an ip netns ls to get the namespace.<br>
> <br>
> Hope it will help.<br>
> <br>
> Le ven. 19 oct. 2018 à 20:40, Erik McCormick <<a href="mailto:emccormick@cirrusseven.com" target="_blank">emccormick@cirrusseven.com</a>> a<br>
> écrit :<br>
> <br>
>> I've been wrestling with getting Octavia up and running and have<br>
>> become stuck on two issues. I'm hoping someone has run into these<br>
>> before. My google foo has come up empty.<br>
>><br>
>> Issue 1:<br>
>> When the Octavia controller tries to poll the amphora instance, it<br>
>> tries repeatedly and eventually fails. The error on the controller<br>
>> side is:<br>
>><br>
>> 2018-10-19 14:17:39.181 26 ERROR<br>
>> octavia.amphorae.drivers.haproxy.rest_api_driver [-] Connection<br>
>> retries (currently set to 300) exhausted.  The amphora is unavailable.<br>
>> Reason: HTTPSConnectionPool(host='10.7.0.112', port=9443): Max retries<br>
>> exceeded with url: /0.5/plug/vip/<a href="http://10.250.20.15" rel="noreferrer" target="_blank">10.250.20.15</a> (Caused by<br>
>> SSLError(SSLError("bad handshake: Error([('rsa routines',<br>
>> 'RSA_padding_check_PKCS1_type_1', 'invalid padding'), ('rsa routines',<br>
>> 'rsa_ossl_public_decrypt', 'padding check failed'), ('asn1 encoding<br>
>> routines', 'ASN1_item_verify', 'EVP lib'), ('SSL routines',<br>
>> 'tls_process_server_certificate', 'certificate verify<br>
>> failed')],)",),)): SSLError: HTTPSConnectionPool(host='10.7.0.112',<br>
>> port=9443): Max retries exceeded with url: /0.5/plug/vip/<a href="http://10.250.20.15" rel="noreferrer" target="_blank">10.250.20.15</a><br>
>> (Caused by SSLError(SSLError("bad handshake: Error([('rsa routines',<br>
>> 'RSA_padding_check_PKCS1_type_1', 'invalid padding'), ('rsa routines',<br>
>> 'rsa_ossl_public_decrypt', 'padding check failed'), ('asn1 encoding<br>
>> routines', 'ASN1_item_verify', 'EVP lib'), ('SSL routines',<br>
>> 'tls_process_server_certificate', 'certificate verify<br>
>> failed')],)",),))<br>
>><br>
>> On the amphora side I see:<br>
>> [2018-10-19 17:52:54 +0000] [1331] [DEBUG] Error processing SSL request.<br>
>> [2018-10-19 17:52:54 +0000] [1331] [DEBUG] Invalid request from<br>
>> ip=::ffff:<a href="http://10.7.0.40" rel="noreferrer" target="_blank">10.7.0.40</a>: [SSL: SSL_HANDSHAKE_FAILURE] ssl handshake<br>
>> failure (_ssl.c:1754)<br>
>><br>
>> I've generated certificates both with the script in the Octavia git<br>
>> repo, and with the Openstack Ansible playbook. I can see that they are<br>
>> present in /etc/octavia/certs.<br>
>><br>
>> I'm using the Kolla (Queens) containers for the control plane so I'm<br>
>> sure I've satisfied all the python library constraints.<br>
>><br>
>> Issue 2:<br>
>> I"m not sure how it gets configured, but the tenant network interface<br>
>> (ens6) never comes up. I can spawn other instances on that network<br>
>> with no issue, and I can see that Neutron has the port attached to the<br>
>> instance. However, in the instance this is all I get:<br>
>><br>
>> ubuntu@amphora-33e0aab3-8bc4-4fcb-bc42-b9b36afb16d4:~$ ip a<br>
>> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN<br>
>> group default qlen 1<br>
>>     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00<br>
>>     inet <a href="http://127.0.0.1/8" rel="noreferrer" target="_blank">127.0.0.1/8</a> scope host lo<br>
>>        valid_lft forever preferred_lft forever<br>
>>     inet6 ::1/128 scope host<br>
>>        valid_lft forever preferred_lft forever<br>
>> 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast<br>
>> state UP group default qlen 1000<br>
>>     link/ether fa:16:3e:30:c4:60 brd ff:ff:ff:ff:ff:ff<br>
>>     inet <a href="http://10.7.0.112/16" rel="noreferrer" target="_blank">10.7.0.112/16</a> brd 10.7.255.255 scope global ens3<br>
>>        valid_lft forever preferred_lft forever<br>
>>     inet6 fe80::f816:3eff:fe30:c460/64 scope link<br>
>>        valid_lft forever preferred_lft forever<br>
>> 3: ens6: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group<br>
>> default qlen 1000<br>
>>     link/ether fa:16:3e:89:a2:7f brd ff:ff:ff:ff:ff:ff<br>
>><br>
>> There's no evidence of the interface anywhere else including udev rules.<br>
>><br>
>> Any help with either or both issues would be greatly appreciated.<br>
>><br>
>> Cheers,<br>
>> Erik<br>
>><br>
>> _______________________________________________<br>
>> OpenStack-operators mailing list<br>
>> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
>><br>
> -------------- next part --------------<br>
> An HTML attachment was scrubbed...<br>
> URL: <br>
> <<a href="http://lists.openstack.org/pipermail/openstack-operators/attachments/20181020/71c8e27a/attachment.html" rel="noreferrer" target="_blank">http://lists.openstack.org/pipermail/openstack-operators/attachments/20181020/71c8e27a/attachment.html</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181020_71c8e27a_attachment.html&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=TZjVFI4W3tEBE7QxcsUIhZ92OpBCz-jlpvaQ856vmEw&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_pipermail_openstack-2Doperators_attachments_20181020_71c8e27a_attachment.html&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=TZjVFI4W3tEBE7QxcsUIhZ92OpBCz-jlpvaQ856vmEw&e=</a>>><br>
> <br>
> ------------------------------<br>
> <br>
> Subject: Digest Footer<br>
> <br>
> _______________________________________________<br>
> OpenStack-operators mailing list<br>
> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a> <br>
> <<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a>><br>
> <br>
> <br>
> ------------------------------<br>
> <br>
> End of OpenStack-operators Digest, Vol 96, Issue 7<br>
> **************************************************<br>
> <br>
> <br>
> <br>
> _______________________________________________<br>
> OpenStack-operators mailing list<br>
> <a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
> <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=" rel="noreferrer" target="_blank">https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openstack.org_cgi-2Dbin_mailman_listinfo_openstack-2Doperators&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=RxYkIjeLZPK2frXV_wEUCq8d3wvUIvDPimUcunMwbMs&m=UMCq1q-ElsVP72_5lCFTGnKxGwn4zkNordf47XiWPYg&s=sAUSoIWeLJ2p07R9PICTtT_OkUTfjNKOngMa8nQunvM&e=</a><br>
> <br>
<br>
_______________________________________________<br>
OpenStack-operators mailing list<br>
<a href="mailto:OpenStack-operators@lists.openstack.org" target="_blank">OpenStack-operators@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators" rel="noreferrer" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators</a><br>
</blockquote></div>