On 05/30/2016 05:09 AM, Haïkel wrote:
2016-05-30 1:17 GMT+02:00 Pete Zaitcev <zaitcev(a)redhat.com>:
> On Mon, 30 May 2016 00:44:29 +0200
> Haïkel <hguemar(a)fedoraproject.org> wrote:
>>> So, what do everyone clone? If someone could do this, it would be helpful:
>> rdopkg clone openstack-swift
>> and then git review on rpm-master.
> Thanks a lot, that worked!
> BTW, it would be great if we could do "rdopkg clone rdopkg" perhaps?
> -- Pete
rdopkg clone uses rdoinfo database, that's why it doesn't work (only
openstack projects are registered)
But that's something we could fix.
My quick write up
rdo-list mailing list
To unsubscribe: rdo-list-unsubscribe(a)redhat.com
On 05/25/2016 11:52 PM, Adam Young wrote:
I confirmed today that Kerberos still works for both WebSSO and CLI
operations on a Rippowam provisioned server. However, I think we need
to chase down the Kerberos Auth plugin. As things moved from
keystonclient to Keystone Auth, I don;'t remember what the final
decision was for Kerberos. To be strictly correct, it should
probablty move to python-keystoneauth-kerberos.
Trying ECP seems to be close, but not quite set up right. I am using
the following rc file:
$ cat keycloak-accrc
(prompts for password and userid ellided)
The post to https://ipa.ayoung.oslab.test/auth/saml2/SSO/SOAP
be failing with:
DEBUG: requests.packages.urllib3.connectionpool "POST
/auth/saml2/SSO/SOAP HTTP/1.1" 404 0
DEBUG: keystoneclient.session Request returned failure status: 404
ERROR: openstack Not Found (HTTP 404)
Do I have the OS_IDENTITY_PROVIDER_URL right? The remote ID for this
remote_ids | [u'https://ipa.ayoung.oslab.test/auth/realms/openstack']
Which works with WebSSO. If I mess around with the PROVIDER_URL I
still get the same response. The tests
seem to indicate that it should be /ecp-sp/ but that does not work,