[openstack-dev] [keystoneclient] self-signed keystone not accessible from other services

Bhuvan Arumugam bhuvan at apache.org
Tue Oct 15 17:20:25 UTC 2013


On Mon, Oct 14, 2013 at 7:20 PM, Jamie Lennox <jamielennox at redhat.com>wrote:

> On Mon, 2013-10-14 at 18:36 -0700, Bhuvan Arumugam wrote:
> > Just making sure i'm not the only one facing this problem.
> > https://bugs.launchpad.net/nova/+bug/1239894
>
> Yep, we thought this may raise some issues but insecure by default was
> just not acceptable.
>

I think we should document it.


>
> > keystoneclient v0.4.0 was released last week and used by all openstack
> > services now. The insecure=False, as defined in
> > keystoneclient.middleware.auth_token. The keystone client is happy as
> > long as --insecure flag is used. There is no way to configure it in
> > other openstack services like nova, neutron or glance while it is
> > integrated with self-signed keystone instance.
>
> I'm not following the problem. As you mentioned before the equivalent
> setting for --insecure in auth_token is setting insecure=True in the
> service's config file along with all the other keystone auth_token
> settings. The equivalent when using the client library is passing
> insecure=True to the client initialization.
>

Yep, the problem is solved after setting this flag in [filter:authtoken]
section in /etc/nova/api-paste.ini.


> > We should introduce new config parameter keystone_api_insecure and
> > configure keystoneclient behavior based on this parameter. The config
> > parameter should be defined in all other openstack services, as all of
> > them integrate with keystone.
>
> A new config parameter where? I guess we could make insecure in
> auth_token also response to an OS_SSL_INSECURE but that pattern is not
> followed for any other service or parameter.
>

I think we are inconsistent in using this flag for different services. For
instance, we use:
  neutron_api_insecure
  glance_api_insecure

for keystone, we use:
insecure=True

I think it's reasonable as one way or the other, it's configurable. We'll
be good if we document it somwhere here.
  http://docs.openstack.org/developer/python-keystoneclient/using-api.html

> Until it's resolved, I think the known workaround is to use
> > keystoneclient==0.3.2.
> >
> >
> > Is there any other workaround for this issue?
>
> Signed certificates.
>

Oh yeah! we use signed cert in our prod environment. This one is our test
bed.

Thank you,

-- 
Regards,
Bhuvan Arumugam
www.livecipher.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20131015/56a19af7/attachment.html>


More information about the OpenStack-dev mailing list