Activity log for bug #1788180

Date Who What changed Old value New value Message
2018-08-21 13:40:09 Georg Hoesch bug added bug
2018-08-21 13:41:04 Georg Hoesch description Setup description ------------------ Multinode deployment with kolla with keepalived and haproxy with SSL termination. nova-serialproxy is configured with base_url=wss:// because I want my users to connect through a secure channel. Problem description ------------------- Get a serial-proxy url with token like this (works fine): openstack console url show --insecure --serial <uuid> Connect to the url (in my case: simple python websocket): python serial.py wss://hostname:6083?token=<token> Result: nova-serialproxy closes the connection Log contains "Origin header protocol does not match this host." Expected result: connection works Problem analysis ---------------- haproxy accepts the wss:// connection and forwards the connection to the serialproxy process. HAproxy changes the Origin header to 'http' and adds a header 'X-Forwarded-Proto: https'. 'websocketproxy.py' accepts the connection and fails because the URL in 'Origin' has not the same scheme/protocol as issued in the 'console url show' command. AFAIK the behaviour of haproxy is ok and the serialproxy should offer a possiblity to check the value of 'X-Forwarded-Proto' as source protocol. Setup description ------------------ Multinode deployment with kolla with keepalived and haproxy with SSL termination. nova-serialproxy is configured with base_url=wss:// because I want my users to connect through a secure channel. Problem description ------------------- Get a serial-proxy url with token like this (works fine):   openstack console url show --insecure --serial <uuid> Connect to the url (in my case: simple python websocket):   python serial.py wss://hostname:6083?token=<token> Result:   nova-serialproxy closes the connection   Log contains "Origin header protocol does not match this host." Expected result:   connection works Problem analysis ---------------- haproxy accepts the wss:// connection and forwards the connection to the serialproxy process. HAproxy changes the Origin header to 'http' and adds a header 'X-Forwarded-Proto: https'. 'websocketproxy.py' accepts the connection and fails because the URL in 'Origin'has not the same scheme/protocol as issued in the 'console url show' command. AFAIK the behaviour of haproxy is ok and the serialproxy should offer a possiblity to check the value of 'X-Forwarded-Proto' as source protocol.
2018-08-21 13:41:55 Georg Hoesch description Setup description ------------------ Multinode deployment with kolla with keepalived and haproxy with SSL termination. nova-serialproxy is configured with base_url=wss:// because I want my users to connect through a secure channel. Problem description ------------------- Get a serial-proxy url with token like this (works fine):   openstack console url show --insecure --serial <uuid> Connect to the url (in my case: simple python websocket):   python serial.py wss://hostname:6083?token=<token> Result:   nova-serialproxy closes the connection   Log contains "Origin header protocol does not match this host." Expected result:   connection works Problem analysis ---------------- haproxy accepts the wss:// connection and forwards the connection to the serialproxy process. HAproxy changes the Origin header to 'http' and adds a header 'X-Forwarded-Proto: https'. 'websocketproxy.py' accepts the connection and fails because the URL in 'Origin'has not the same scheme/protocol as issued in the 'console url show' command. AFAIK the behaviour of haproxy is ok and the serialproxy should offer a possiblity to check the value of 'X-Forwarded-Proto' as source protocol. Setup description ------------------ Multinode deployment with kolla with keepalived and haproxy with SSL termination. nova-serialproxy is configured with base_url=wss:// because I want my users to connect through a secure channel. Problem description ------------------- Get a serial-proxy url with token like this (works fine):   openstack console url show --insecure --serial <uuid> Connect to the url (in my case: simple python websocket):   python serial.py wss://hostname:6083?token=<token> Result:   nova-serialproxy closes the connection   Log contains "Origin header protocol does not match this host." Expected result:   connection works Problem analysis ---------------- haproxy accepts the wss:// connection and forwards the connection to the serialproxy process. HAproxy changes the Origin header to 'http' and adds a header 'X-Forwarded-Proto: https'. 'websocketproxy.py' accepts the connection and fails because the URL in 'Origin'has not the same scheme/protocol as issued in the 'console url show' command. AFAIK the behaviour of haproxy is ok and the serialproxy should offer a possiblity to check the value of 'X-Forwarded-Proto' as source protocol.
2019-01-15 21:32:11 melanie witt tags console
2019-01-16 00:04:09 melanie witt nova: importance Undecided Medium
2019-01-16 00:04:09 melanie witt nova: status New Triaged
2019-01-16 00:04:09 melanie witt nova: assignee melanie witt (melwitt)
2019-01-16 00:35:00 OpenStack Infra nova: status Triaged In Progress
2019-01-22 23:12:13 OpenStack Infra nova: status In Progress Fix Released
2019-02-05 13:26:10 Matt Riedemann nominated for series nova/rocky
2019-02-05 13:26:10 Matt Riedemann bug task added nova/rocky
2019-02-05 13:26:21 Matt Riedemann nova/rocky: status New In Progress
2019-02-05 13:26:24 Matt Riedemann nova/rocky: importance Undecided Medium
2019-02-05 13:26:29 Matt Riedemann nova/rocky: assignee s10 (vlad-esten)
2019-02-07 02:20:37 OpenStack Infra nova/rocky: status In Progress Fix Committed