Horizon revokes admin role from user if cannot get user_list

Bug #1505200 reported by Paul Karikh
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Mirantis OpenStack
Won't Fix
High
Nikita Konovalov
7.0.x
Won't Fix
High
Nikita Konovalov
8.0.x
Won't Fix
High
Unassigned
9.x
Won't Fix
High
Unassigned

Bug Description

1) Deploy Horizon with users storing in LDAP
2) Create a lot of users in LDAP so Keystone couldn't return user_list
3) Go to identity/projects and try to update quotas for project where you have admin role

Sometimes you get message 'You cannot revoke your administrative privileges from the project you are currently logged into.' and sometimes you will lose your admin role.

MOS 7.0

Paul Karikh (pkarikh)
tags: added: horizon
Changed in mos:
milestone: none → 8.0
importance: Undecided → Medium
Timur Sufiev (tsufiev-x)
Changed in mos:
importance: Medium → High
Revision history for this message
Boris Bobrov (bbobrov) wrote :

This is not directly keystone's issue. Yes, keystone should not fail to return a list with many users, but Horizon should not drop roles if the list could not be retrieved. If you try to fetch a long list of users via cli, no roles are revoked.

Revision history for this message
Paul Karikh (pkarikh) wrote :
Revision history for this message
Paul Karikh (pkarikh) wrote :

Also here is Keystone patch which should help us to fix (or workaround, at least) this problem:
https://review.openstack.org/#/c/234849/

Revision history for this message
Paul Karikh (pkarikh) wrote :

Horizon patch is on hold since we are wating for Keystone filtering/limiting patch. After it we are going to update Horizon patch in accordance with Keystone patch.

Revision history for this message
Paul Karikh (pkarikh) wrote :

We decided to use another approach. Now we want to use Keystone truncated functionality and api filtering to solve this problem. I belive this bug will be mostly covered with the patches for this bug: https://bugs.launchpad.net/mos/+bug/1494806

Paul Karikh (pkarikh)
Changed in mos:
milestone: 8.0 → 9.0
tags: added: area-horizon
removed: horizon
tags: added: release-notes
tags: added: 8.0 release-notes-done
removed: release-notes
Revision history for this message
Paul Karikh (pkarikh) wrote :

Fix for this issue requires another patch for python-keystone client and according to Boris Bobrov who is author of this patch, there is no chances to get this fix for 9.0.
So we should to move this bug to 10.0.

Timur Sufiev (tsufiev-x)
Changed in mos:
milestone: 9.0 → 10.0
Revision history for this message
Dina Belova (dbelova) wrote :

Added move-to-10.0 tag to show this was moved to 10.0 from 9.0

tags: added: move-to-10.0
Revision history for this message
Timur Sufiev (tsufiev-x) wrote :

Added 10.0-reviewed tag since the bugfix relies on keystoneclient feature that will be implemented no earlier than in Newton.

tags: added: 10.0-reviewed
Revision history for this message
Timur Sufiev (tsufiev-x) wrote :

Horizon fix/feature is still waiting for the required changes in python-keystoneclient. Reassigning to Boris Bobrov, as he has more context to track the progress of Keystone-side changes.

Changed in mos:
assignee: Paul Karikh (pkarikh) → Boris Bobrov (bbobrov)
Boris Bobrov (bbobrov)
Changed in mos:
assignee: Boris Bobrov (bbobrov) → nobody
Changed in mos:
assignee: nobody → Nikita Konovalov (nkonovalov)
no longer affects: mos/10.0.x
Revision history for this message
Alexey Stupnikov (astupnikov) wrote :

We no longer support MOS5.1, MOS6.0, MOS6.1
We deliver only Critical/Security fixes to MOS7.0, MOS8.0.
We deliver only High/Critical/Security fixes to MOS9.2.

Changed in mos:
status: In Progress → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.