Keystone container crash with openid configuration

Bug #2008890 reported by Fontenay Tony
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
OpenStack Identity (keystone)
New
Undecided
Unassigned

Bug Description

Hello,

We use federation identity with openid for one of our main plateform.
Everything was ok but we faced a recent problem.

After containers updates, keystone keeps crashing with the error:
"realloc(): invalid pointer"

It was not the case before.

Without openid configuration, everything is ok
Each time we enable it, keystone crash on start and loops.

On container, those mod_auth_openid packages are available:

mod_auth_openidc-0:2.3.7-11.module_el8.6.0+1083+4025e8c5.x86_64
mod_auth_openidc-0:2.3.7-8.module_el8.4.0+674+2c6c7264.x86_64
mod_auth_openidc-0:2.3.7-9.module_el8.6.0+972+cf997e73.x86_64
mod_auth_openidc-0:2.4.9.4-1.module_el8.7.0+1136+d8f380b8.x86_64

The problem occurs with 2.4.9.4-1 package version.

With mod_auth_openidc-0:2.3.7-11.module_el8.6.0+1083+4025e8c5.x86_64 keystone starts successfully.

We can reproduce this problem on production and lab environment. Kolla version and base_distro:
kolla_base_distro: "centos"
kolla_install_type: "binary"
openstack_release: "xena"

Many thanks,
Yves and Tony

Revision history for this message
Fontenay Tony (weezhard) wrote :
Revision history for this message
Fontenay Tony (weezhard) wrote :

Testing several changes to the wsgi-keystone.conf file, the container starts when the line "OIDCOAuthVerifyCertFiles" is commented out. This instruction checks the AC of access tokens.

# The fully qualified names of the files that contain the X.509 certificates with the RSA public
# keys that can be used for local JWT access token verification.
# NB: this is one or more key tuples where a key tuple consists of:
# [<key-identifier>#]<path-to-cert>
# and the key identifier part is required when the JWT access token contains a "kid" in its header.
# When not defined, no access token validation with statically configured certificates will be performed.
#OIDCOAuthVerifyCertFiles ([<kid>#]<filename>)+

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.