Activity log for bug #1371161

Date Who What changed Old value New value Message
2014-09-18 14:48:00 Dmitry Nikishov bug added bug
2014-09-18 14:49:02 Dmitry Nikishov affects fuel mos
2014-09-18 14:50:55 Timur Sufiev tags customer-found customer-found horizon
2014-09-18 14:51:05 Timur Sufiev mos: assignee MOS Horizon (mos-horizon)
2014-09-18 15:00:50 Timur Sufiev mos: assignee MOS Horizon (mos-horizon) Paul Karikh (pkarikh)
2014-09-18 15:00:59 Dmitry Mescheryakov nominated for series mos/5.1.x
2014-09-18 15:00:59 Dmitry Mescheryakov bug task added mos/5.1.x
2014-09-18 15:00:59 Dmitry Mescheryakov nominated for series mos/5.0.x
2014-09-18 15:00:59 Dmitry Mescheryakov bug task added mos/5.0.x
2014-09-18 15:00:59 Dmitry Mescheryakov nominated for series mos/6.0.x
2014-09-18 15:00:59 Dmitry Mescheryakov bug task added mos/6.0.x
2014-09-18 15:01:24 Dmitry Mescheryakov mos/5.0.x: assignee Paul Karikh (pkarikh)
2014-09-18 15:01:30 Dmitry Mescheryakov mos/6.0.x: assignee Paul Karikh (pkarikh)
2014-09-18 15:01:32 Dmitry Mescheryakov mos/5.0.x: milestone 5.0.3
2014-09-18 15:01:36 Dmitry Mescheryakov mos/6.0.x: milestone 6.0
2014-09-18 15:01:40 Dmitry Mescheryakov mos/5.1.x: importance Undecided High
2014-09-18 15:01:42 Dmitry Mescheryakov mos/6.0.x: importance Undecided High
2014-09-18 15:01:46 Dmitry Mescheryakov mos/5.0.x: importance Undecided High
2014-09-18 15:01:51 Dmitry Mescheryakov mos/5.0.x: status New Confirmed
2014-09-18 15:01:53 Dmitry Mescheryakov mos/5.1.x: status New Confirmed
2014-09-18 15:01:55 Dmitry Mescheryakov mos/6.0.x: status New Confirmed
2014-09-18 15:02:00 Dmitry Mescheryakov mos/5.1.x: milestone 5.1.1
2014-09-18 15:13:18 Dmitry Nikishov description I'm making customizations of MOS 5.1 for a certain client, and one of their requests was to use Active Directory as Keystone's backend. The AD is read only. They don't use default 'admin' role. The define their own name for the admin role (lets say 'customadmin'). After the modification of policy.json for all the services, CLI works fine. However, Horizon does not recognize 'customadmin' as admin. Once user with role 'customadmin' authenticates, admin tab is missing. This issue is caused by hardcoded "openstack.roles.admin" permission in Horizon's code. It can be fixed by the following command: grep -Irl "openstack.roles.admin" /usr/share/openstack-dashboard/openstack_dashboard/ | xargs sed -i 's/openstack.roles.admin/openstack.roles.customadmin/g' && service apache2 restart (See https://bugs.launchpad.net/horizon/+bug/1161144) Once this command is executed, admin panel appears, though the user can't access any of it's entries (volumes, instances and so on). Horizon displays error message that says: "You do not have permission to access the resource". Other cloud with all the same configuration except that it uses default 'admin' role name for the admin role, works like a charm. Update: after a deep dive into horizon's code, I have a hack that allows to access these pages: remove "admin=True" in the tenant_list() here: https://github.com/openstack/horizon/blob/stable/icehouse/openstack_dashboard/api/keystone.py#L257 But I'm sure, it can be solved a better way. I'm making customizations of MOS 5.1 for a certain client, and one of their requests was to use Active Directory as Keystone's backend. The AD is read only. They don't use default 'admin' role. They define their own name for the admin role (lets say 'customadmin'). After the modification of policy.json for all the services, CLI works fine. However, Horizon does not recognize 'customadmin' as admin. Once user with role 'customadmin' authenticates, admin tab is missing. This issue is caused by hardcoded "openstack.roles.admin" permission in Horizon's code. It can be fixed by the following command: grep -Irl "openstack.roles.admin" /usr/share/openstack-dashboard/openstack_dashboard/ | xargs sed -i 's/openstack.roles.admin/openstack.roles.customadmin/g' && service apache2 restart (See https://bugs.launchpad.net/horizon/+bug/1161144) Once this command is executed, admin panel appears, though the user can't access any of it's entries (volumes, instances and so on). Horizon displays error message that says: "You do not have permission to access the resource". Other cloud with all the same configuration except that it uses default 'admin' role name for the admin role, works like a charm. Update: after a deep dive into horizon's code, I have a hack that allows to access these pages: remove "admin=True" in the tenant_list() here: https://github.com/openstack/horizon/blob/stable/icehouse/openstack_dashboard/api/keystone.py#L257 But I'm sure, it can be solved a better way.
2014-11-07 17:27:51 Paul Karikh mos/5.0.x: status Confirmed In Progress
2014-11-07 17:27:53 Paul Karikh mos/5.1.x: status Confirmed In Progress
2014-11-07 17:27:55 Paul Karikh mos/6.0.x: status Confirmed In Progress
2014-11-17 12:03:53 Timur Sufiev mos/5.0.x: status In Progress Triaged
2014-11-18 11:50:43 Timur Sufiev mos/5.1.x: milestone 5.1.1 5.1.2
2014-11-20 10:15:27 Timur Sufiev mos/5.0.x: status Triaged Won't Fix
2014-11-20 10:15:45 Timur Sufiev mos/5.0.x: assignee Paul Karikh (pkarikh)
2014-11-20 10:15:49 Timur Sufiev mos/5.0.x: milestone 5.0.3
2014-11-20 10:38:28 Timur Sufiev mos/5.0.x: milestone 5.0.3
2014-12-01 15:39:00 Timur Sufiev mos/6.0.x: status In Progress Fix Committed
2015-01-19 13:41:11 Paul Karikh mos/5.1.x: status In Progress Fix Committed