On 05/30/2016 05:09 AM, Haïkel wrote:
2016-05-30 1:17 GMT+02:00 Pete Zaitcev <zaitcev(a)redhat.com>:
> On Mon, 30 May 2016 00:44:29 +0200
> Haïkel <hguemar(a)fedoraproject.org> wrote:
>
>>> So, what do everyone clone? If someone could do this, it would be helpful:
>> rdopkg clone openstack-swift
>> and then git review on rpm-master.
> Thanks a lot, that worked!
>
> BTW, it would be great if we could do "rdopkg clone rdopkg" perhaps?
>
> -- Pete
rdopkg clone uses rdoinfo database, that's why it doesn't work (only
openstack projects are registered)
But that's something we could fix.
My quick write up
http://adam.younglogic.com/2016/05/reviews-for-rdo-packages/
H.
_______________________________________________
rdo-list mailing list
rdo-list(a)redhat.com
https://www.redhat.com/mailman/listinfo/rdo-list
To unsubscribe: rdo-list-unsubscribe(a)redhat.com
On 05/25/2016 11:52 PM, Adam Young wrote:
I confirmed today that Kerberos still works for both WebSSO and CLI
operations on a Rippowam provisioned server. However, I think we need
to chase down the Kerberos Auth plugin. As things moved from
keystonclient to Keystone Auth, I don;'t remember what the final
decision was for Kerberos. To be strictly correct, it should
probablty move to python-keystoneauth-kerberos.
Trying ECP seems to be close, but not quite set up right. I am using
the following rc file:
$ cat keycloak-accrc
export OS_AUTH_TYPE=v3unscopedsaml
export OS_AUTH_URL=https://openstack.ayoung.oslab.test:5000/v3
export OS_IDENTITY_PROVIDER=keycloak
export
OS_IDENTITY_PROVIDER_URL=https://ipa.ayoung.oslab.test/auth/saml2/SSO/SOAP
export OS_PROTOCOL=saml2
export OS_PROJECT_NAME=demo
export OS_PROJECT_DOMAIN_ID=default
export OS_IDENTITY_API_VERSION=3
(prompts for password and userid ellided)
The post to
https://ipa.ayoung.oslab.test/auth/saml2/SSO/SOAP seems to
be failing with:
DEBUG: requests.packages.urllib3.connectionpool "POST
/auth/saml2/SSO/SOAP HTTP/1.1" 404 0
DEBUG: keystoneclient.session Request returned failure status: 404
ERROR: openstack Not Found (HTTP 404)
Do I have the OS_IDENTITY_PROVIDER_URL right? The remote ID for this
server is
remote_ids | [u'https://ipa.ayoung.oslab.test/auth/realms/openstack']
Which works with WebSSO. If I mess around with the PROVIDER_URL I
still get the same response. The tests
https://github.com/keycloak/keycloak/blob/master/testsuite/integration/sr...
seem to indicate that it should be /ecp-sp/ but that does not work,
either.