On 05/30/2016 05:09 AM, Haïkel wrote:
2016-05-30 1:17 GMT+02:00 Pete Zaitcev <zaitcev@redhat.com>:
On Mon, 30 May 2016 00:44:29 +0200
Haïkel <hguemar@fedoraproject.org> wrote:

So, what do everyone clone? If someone could do this, it would be helpful:

        
rdopkg clone openstack-swift
and then git review on rpm-master.
Thanks a lot, that worked!

BTW, it would be great if we could do "rdopkg clone rdopkg" perhaps?

-- Pete

rdopkg clone uses rdoinfo database, that's why it doesn't work (only
openstack projects are registered)
But that's something we could fix.

My quick write up


http://adam.younglogic.com/2016/05/reviews-for-rdo-packages/


H.

_______________________________________________
rdo-list mailing list
rdo-list@redhat.com
https://www.redhat.com/mailman/listinfo/rdo-list

To unsubscribe: rdo-list-unsubscribe@redhat.com

On 05/25/2016 11:52 PM, Adam Young wrote:
I confirmed today that Kerberos still works for both WebSSO and CLI operations on a Rippowam provisioned server.  However, I think we need to chase down the Kerberos Auth plugin.  As things moved from keystonclient to Keystone Auth, I don;'t remember what the final decision was for Kerberos.  To be strictly correct, it should probablty move to python-keystoneauth-kerberos.



Trying ECP seems to be close, but not quite set up right.  I am using the following rc file:

$ cat keycloak-accrc
export OS_AUTH_TYPE=v3unscopedsaml
export OS_AUTH_URL=https://openstack.ayoung.oslab.test:5000/v3
export OS_IDENTITY_PROVIDER=keycloak
export OS_IDENTITY_PROVIDER_URL=https://ipa.ayoung.oslab.test/auth/saml2/SSO/SOAP
export OS_PROTOCOL=saml2
export OS_PROJECT_NAME=demo
export OS_PROJECT_DOMAIN_ID=default
export OS_IDENTITY_API_VERSION=3
(prompts for password and userid ellided)


The post to https://ipa.ayoung.oslab.test/auth/saml2/SSO/SOAP  seems to be failing with:

DEBUG: requests.packages.urllib3.connectionpool "POST /auth/saml2/SSO/SOAP HTTP/1.1" 404 0
DEBUG: keystoneclient.session Request returned failure status: 404
ERROR: openstack Not Found (HTTP 404)

Do I have the OS_IDENTITY_PROVIDER_URL right?  The remote ID for this server is

remote_ids  | [u'https://ipa.ayoung.oslab.test/auth/realms/openstack']

Which works with WebSSO.  If I mess around with the PROVIDER_URL I still get the same response.  The tests https://github.com/keycloak/keycloak/blob/master/testsuite/integration/src/test/java/org/keycloak/testsuite/saml/SamlEcpProfileTest.java seem to indicate that it should be /ecp-sp/ but that does not work, either.