Federation with OpenID Connect disables some default auth methods in Keystone

Bug #1935811 reported by Takashi Kajinami
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tripleo
Fix Released
Low
Takashi Kajinami

Bug Description

Description
===========

Originally reported in https://bugzilla.redhat.com/show_bug.cgi?id=1981269

When environments/enable-federation-openidc.yaml is included to use federation with OpenID Connect, keystone accepts the following auth methods
 - password
 - token
 - openid

However the list doesn't include some methods which are enabled by default and results in disabling some methods like application_credential.

Steps to reproduce
==================
- Deploy overcloud with OpenID Connect Federation enabled
- Check keystone.conf

Expected result
===============
- Defualt auth methods are kept enabled

Actual result
=============
- Some of the defualt auth methods like application_credential are disabled

Environment
===========
- The issue was initially found in stable/train, but the logic causing the issue still exists in master.

Logs & Configs
==============

summary: - Federation with OpenID Connect disables some auth methods in Keystone
+ Federation with OpenID Connect disables some default auth methods in
+ Keystone
Changed in tripleo:
status: New → In Progress
Revision history for this message
Takashi Kajinami (kajinamit) wrote :
description: updated
Changed in tripleo:
importance: Undecided → Low
assignee: nobody → Takashi Kajinami (kajinamit)
description: updated
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tripleo-heat-templates (master)

Reviewed: https://review.opendev.org/c/openstack/tripleo-heat-templates/+/800439
Committed: https://opendev.org/openstack/tripleo-heat-templates/commit/62b17c21b8a8e392b14f48266c48c46f6100e24e
Submitter: "Zuul (22348)"
Branch: master

commit 62b17c21b8a8e392b14f48266c48c46f6100e24e
Author: Takashi Kajinami <email address hidden>
Date: Mon Jul 12 17:28:33 2021 +0900

    Keystone: Keep default auth methods in OpenIDC Federation

    The enable-federation-openidc.yaml environment file defines enabled
    auth methods but its current contents doesn't include all of
    the default items like application_credential.
    This change ensures that all default methods are still enabled when
    federation with OpenIDC is used.

    Closes-Bug: #1935811
    Change-Id: I7e168dda4419953abb1002b3180c8f512b59d7f1

Changed in tripleo:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tripleo-heat-templates (stable/wallaby)

Fix proposed to branch: stable/wallaby
Review: https://review.opendev.org/c/openstack/tripleo-heat-templates/+/803284

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tripleo-heat-templates (stable/wallaby)

Reviewed: https://review.opendev.org/c/openstack/tripleo-heat-templates/+/803284
Committed: https://opendev.org/openstack/tripleo-heat-templates/commit/943d15ea8c21f1935de280a4650dc45ce2b4063b
Submitter: "Zuul (22348)"
Branch: stable/wallaby

commit 943d15ea8c21f1935de280a4650dc45ce2b4063b
Author: Takashi Kajinami <email address hidden>
Date: Mon Jul 12 17:28:33 2021 +0900

    Keystone: Keep default auth methods in OpenIDC Federation

    The enable-federation-openidc.yaml environment file defines enabled
    auth methods but its current contents doesn't include all of
    the default items like application_credential.
    This change ensures that all default methods are still enabled when
    federation with OpenIDC is used.

    Closes-Bug: #1935811
    Change-Id: I7e168dda4419953abb1002b3180c8f512b59d7f1
    (cherry picked from commit 62b17c21b8a8e392b14f48266c48c46f6100e24e)

tags: added: in-stable-wallaby
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/tripleo-heat-templates 15.1.0

This issue was fixed in the openstack/tripleo-heat-templates 15.1.0 release.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.