Value Type of http_connect_timeout is Wrong
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| | keystonemiddleware |
Medium
|
Masahito Muroi | ||
| | python-keystoneclient |
Undecided
|
Unassigned | ||
| | python-keystoneclient (Ubuntu) |
Undecided
|
Unassigned | ||
| | Trusty |
Undecided
|
Unassigned | ||
| | Vivid |
Undecided
|
Unassigned | ||
Bug Description
[Impact]
we can't configure http_connect_
To be able to configure the value, keystoneclient and keystonemiddleware should change the type of the config to Int.
[Test Case]
- Edit the [keystone_
http_connect_
- Restart the service
- If debug is enabled the following entries should be printed on log:
- 2015-08-10 13:50:16.372 11612 INFO urllib3.
2015-08-10 13:50:16.403 11612 DEBUG urllib3.
Without the patch the read timeout is set to an incorrect boolean value.
[Regression Potential]
The change is minimal. That said, however, since the timeout value has only been set to limited values in the past, the fix enables a wider range of timeout values. This needs to be considered as part of the SRU testing.
Related branches
- Corey Bryant: Approve on 2015-08-07
-
Diff: 145 lines (+123/-0)4 files modifieddebian/changelog (+17/-0)
debian/patches/CVE-2015-1852.patch (+79/-0)
debian/patches/fix-1368545.patch (+25/-0)
debian/patches/series (+2/-0)
- Ubuntu Server Developers: Pending requested 2015-08-07
-
Diff: 52 lines (+33/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/fix-1368545.patch (+25/-0)
debian/patches/series (+1/-0)
- Corey Bryant: Approve on 2015-08-07
-
Diff: 209 lines (+159/-1)7 files modifieddebian/changelog (+24/-0)
debian/control (+1/-0)
debian/patches/CVE-2014-7144.patch (+24/-0)
debian/patches/CVE-2015-1852.patch (+81/-0)
debian/patches/fix-1368545.patch (+25/-0)
debian/patches/series (+3/-0)
debian/rules (+1/-1)
- Ubuntu Server Developers: Pending requested 2015-08-11
-
Diff: 54 lines (+34/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/fix-1368545.patch (+26/-0)
debian/patches/series (+1/-0)
- Ubuntu Server Developers: Pending requested 2015-08-11
-
Diff: 209 lines (+159/-1)7 files modifieddebian/changelog (+24/-0)
debian/control (+1/-0)
debian/patches/CVE-2014-7144.patch (+24/-0)
debian/patches/CVE-2015-1852.patch (+81/-0)
debian/patches/fix-1368545.patch (+25/-0)
debian/patches/series (+3/-0)
debian/rules (+1/-1)
| Morgan Fainberg (mdrnstm) wrote : | #2 |
This should be fixed as it is the same bug as bug 1353315
| Masahito Muroi (muroi-masahito) wrote : | #3 |
This bug isn't the same bug as bug 1353315. Same error occurs after patching the fix.
Error messages are:
2014-09-11 11:23:11.069 TRACE nova self.app = self.loader.
2014-09-11 11:23:11.069 TRACE nova File "/opt/stack/
2014-09-11 11:23:11.069 TRACE nova return deploy.
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova return loadobj(APP, uri, name=name, **kw)
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova return context.create()
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova return self.object_
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova **context.
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova val = callable(*args, **kw)
2014-09-11 11:23:11.069 TRACE nova File "/opt/stack/
2014-09-11 11:23:11.069 TRACE nova app = loader.
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova name=name, global_
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova return self.object_
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova **context.
2014-09-11 11:23:11.069 TRACE nova File "/usr/lib/
2014-09-11 11:23:11.069 TRACE nova val = callable(*args, **kw)
2014-09-11 11:23:11.069 TRACE nova File "/opt/stack/
2014-09-11 11:23:11.069 TRACE nova return _load_pipeline(
2014-09-11 11:23:11.069 TRACE nova File "/opt/stack/
2014-09-11 11:23:11.069 TRACE nova app = filter(app)
2014-09-11 11:23:11.069 TRACE nova File "/usr/local/
2014-09-11 11:23:11.069 TRACE nova return AuthProtocol(app, conf)
2014-09-11 11:23:11.069 TRACE nova File "/usr/local/
2014-09-11 11:23:11.069 TRACE nova self._session = self._session_
2014-09-11 11:23:11.069 TRACE nova File "/usr/local/
| Changed in keystonemiddleware: | |
| status: | New → Confirmed |
| importance: | Undecided → Medium |
| Dolph Mathews (dolph) wrote : | #4 |
There's a patch in review for this somewhere (I've certainly reviewed it). Does anyone have a link?
| Changed in keystonemiddleware: | |
| assignee: | nobody → Masahito Muroi (muroi-masahito) |
| Changed in keystonemiddleware: | |
| status: | Confirmed → In Progress |
Reviewed: https:/
Committed: https:/
Submitter: Jenkins
Branch: master
commit c1eef68186ede3c
Author: Masahito Muroi <email address hidden>
Date: Tue Oct 7 20:57:46 2014 +0000
Changing the value type of http_connect_
The value type of http_connect_
is changed from Bool to Int value. Python treats
a value more than 1 as True but oslo config defines
Boolean values as 'true, '1', 'yes' and 'on'.
So http_connect_
Change-Id: I53075cc04d0cce
Closes-bug: #1368545
| Changed in keystonemiddleware: | |
| status: | In Progress → Fix Committed |
| Alvaro Lopez (aloga) wrote : | #6 |
FWIW, the original patch was here: https:/
I do not know why it made the gate tests fail, being the very same patch.
| Alvaro Lopez (aloga) wrote : | #7 |
Nevermind, I realized that this was against keystonemiddleware, not python-
| Changed in keystonemiddleware: | |
| milestone: | none → 1.3.0 |
| Changed in keystonemiddleware: | |
| status: | Fix Committed → Fix Released |
| Jorge Niedbalski (niedbalski) wrote : | #8 |
| tags: | added: sts |
| Jorge Niedbalski (niedbalski) wrote : | #10 |
| Jorge Niedbalski (niedbalski) wrote : | #11 |
| Jorge Niedbalski (niedbalski) wrote : | #12 |
| Corey Bryant (corey.bryant) wrote : | #13 |
Fixes required for Ubuntu:
icehouse (trusty) - python-
juno (utopic) - python-
kilo (vivid) - python-
liberty (wily) - python-
| description: | updated |
| no longer affects: | python-keystonemiddleware (Ubuntu Trusty) |
| no longer affects: | python-keystonemiddleware (Ubuntu Vivid) |
| no longer affects: | python-keystonemiddleware (Ubuntu) |
The attachment "Trusty Patch" seems to be a debdiff. The ubuntu-sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. If the attachment isn't a patch, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are member of the ~ubuntu-sponsors, unsubscribe the team.
[This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issue please contact him.]
| tags: | added: patch |
| Changed in python-keystoneclient (Ubuntu): | |
| status: | New → In Progress |
| Changed in python-keystoneclient (Ubuntu Trusty): | |
| status: | New → In Progress |
| Changed in python-keystoneclient (Ubuntu Vivid): | |
| status: | New → In Progress |
| Sebastien Bacher (seb128) wrote : | #15 |
Could somebody add a testcase for the SRU?
| description: | updated |
| Brian Murray (brian-murray) wrote : | #16 |
This doesn't seem to be fixed in wily yet.
| Brian Murray (brian-murray) wrote : | #17 |
From #ubuntu-release:
11:52 < coreycb> bdmurray, ugh, we're behind it didn't
11:53 < coreycb> bdmurray, it's in the branch but not
| Launchpad Janitor (janitor) wrote : | #18 |
This bug was fixed in the package python-
---------------
python-
* d/p/fix-
* d/p/fix-
* d/p/oauth-
request headers.
-- Corey Bryant <email address hidden> Wed, 12 Aug 2015 09:30:59 -0400
| Changed in python-keystoneclient (Ubuntu): | |
| status: | In Progress → Fix Released |
Hello Masahito, or anyone else affected,
Accepted python-
Please help us by testing this new package. See https:/
If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-
Further information regarding the verification process can be found at https:/
| Changed in python-keystoneclient (Ubuntu Trusty): | |
| status: | In Progress → Fix Committed |
| tags: | added: verification-needed |
| Changed in python-keystoneclient (Ubuntu Vivid): | |
| status: | In Progress → Fix Committed |
| Chris J Arges (arges) wrote : | #20 |
Hello Masahito, or anyone else affected,
Accepted python-
Please help us by testing this new package. See https:/
If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-
Further information regarding the verification process can be found at https:/
| Corey Bryant (corey.bryant) wrote : | #21 |
python-
python-
| tags: |
added: verification-done removed: verification-needed |
| Corey Bryant (corey.bryant) wrote : | #22 |
That should say: python-
| Launchpad Janitor (janitor) wrote : | #23 |
This bug was fixed in the package python-
---------------
python-
* debian/
http_
-- Jorge Niedbalski <email address hidden> Fri, 07 Aug 2015 10:50:46 -0300
| Changed in python-keystoneclient (Ubuntu Trusty): | |
| status: | Fix Committed → Fix Released |
| Chris J Arges (arges) wrote : Update Released | #24 |
The verification of the Stable Release Update for python-
| Launchpad Janitor (janitor) wrote : | #25 |
This bug was fixed in the package python-
---------------
python-
* debian/
http_
-- Jorge Niedbalski <email address hidden> Fri, 07 Aug 2015 11:53:37 -0300
| Changed in python-keystoneclient (Ubuntu Vivid): | |
| status: | Fix Committed → Fix Released |


The middleware code in python- keystoneclient is frozen and will not see any bug fixes or new development unless it is a security vulnerability fix. The code in python- keystoneclient is being maintained strictly for compatibility reasons (not breaking existing deployments).