Lothian nick.loth...@gmail.comwrote:
For those that are interested, I've done a write-up of the results from
this: http://fifthvertex.com/2012/08/07/cloud-tools-survey/
Thanks for all those who responded.
Nick
On Thu, Jul 12, 2012 at 1:28 PM, Nick Lothian nick.loth...@gmail.comwrote:
Yes
For those that are interested, I've done a write-up of the results from
this: http://fifthvertex.com/2012/08/07/cloud-tools-survey/
Thanks for all those who responded.
Nick
On Thu, Jul 12, 2012 at 1:28 PM, Nick Lothian nick.loth...@gmail.comwrote:
Yes, I'll be happy to share results
On Wed
Yes, I'll be happy to share results
On Wed, Jul 11, 2012 at 6:33 PM, Nick Barcet nick.bar...@canonical.comwrote:
On 07/11/2012 05:18 AM, Nick Lothian wrote:
Hi,
I'm trying to understand how people are doing management of servers and
storage across multiple clouds (or perhaps it is only
Hi,
I'm trying to understand how people are doing management of servers and
storage across multiple clouds (or perhaps it is only me that has this
problem!).
I've created a short survey I'd appreciate any responses on:
http://www.surveymonkey.com/s/8PJCK9H
Responses via email are fine too!
No, I have custom code running on Android, and I'm testing failures in
curl by copying the JSON and headers that are sent to a shell.
Nick
On Fri, May 25, 2012 at 9:54 PM, Jay Pipes jaypi...@gmail.com wrote:
On 05/25/2012 05:48 AM, Nick Lothian wrote:
In case anyone else is running
That is the self-signed certificate problem.
The code here will download the certificate and install it in the
keystore for the JVM it is running in:
http://code.google.com/p/educationau-utils/source/browse/trunk/java/EdAuUtils/src/main/java/au/edu/educationau/opensource/ssl/InstallCert.java
In case anyone else is running into this problem: I was authenticating
without using a tenant ID. This seems to work on some implementations
(TryStack, Rackspace), but not in others (DevStack, HPCloud).
On Thu, May 3, 2012 at 2:08 PM, Nick Lothian nick.loth...@gmail.com wrote:
I'm having some
I think you should only need the token. Make sure there is no space
between X-Auth-Token: and your token value.
This works for me:
curl -k -X 'GET' -v
http://192.168.1.50:8774/v2/41d00832aebb4ac9ac847d7a0803445c/images/detail
-H 'X-Auth-Token:1a7c3ee51f56481f9ac601351cbf2f8b'
Nick
On Fri, May
On Sat, May 5, 2012 at 12:57 AM, Dolph Mathews dolph.math...@gmail.com wrote:
As a user with the admin role on
35357: http://paste.openstack.org/raw/15160/
Thanks!
This works for me, mostly.
keystone --os_username=admin --os_password=password
--os_auth_url=http://192.168.1.50:35357/v2.0/
are unavailable?
On Thu, May 3, 2012 at 4:32 PM, Rafael Durán Castañeda
rafadurancastan...@gmail.com wrote:
On 05/03/2012 06:38 AM, Nick Lothian wrote:
I'm having some trouble using the Keystone API.
When I run
keystone --os_username=admin --os_password=password --os_auth_url=
http
also providing a
tenant, so that behavior is by design as well. Try --os_tenant_name or
--os_tenant_id if using the client, or providing tenantName or tenantId
in your auth object for curl.
-Dolph
On Wed, May 2, 2012 at 11:38 PM, Nick Lothian nick.loth...@gmail.comwrote:
I'm having some
the curl, I assume you used the token retrieved from the admin
user with the /tokens/{token_id}/endpoints call?
-joe
On May 3, 2012, at 2:54 AM, Nick Lothian wrote:
My /etc/keystone/keystone.conf says:
[catalog]
template_file = /etc/keystone/default_catalog.templates
# dynamic, sql-based
I'm having some trouble using the Keystone API.
When I run
keystone --os_username=admin --os_password=password --os_auth_url=
http://192.168.1.50:5000/v2.0/ service-list
I get the following:
No handlers could be found for logger keystoneclient.v2_0.client
Unable to communicate with identity
, according to our experiments, the only
web browser that is not usable at all with this technology is Internet
Explorer, but we have tried it in Google Chrome, Safari and Firefox as
well and we didn't have any problems.
Cheers,
Javier Cerviño.
On 26 April 2012 06:28, Nick Lothian nick.loth
dirty, but works):
Embedded Flash Proxy
On Wed, Apr 25, 2012 at 3:09 AM, Nick Lothian nick.loth...@gmail.comwrote:
Yes, this will work if I know in advance what server I will be connecting
too.
However, it does remove the ability to support any cloud without
intervention
On Thu, Apr 26, 2012 at 5:49 AM, Adam Young ayo...@redhat.com wrote:
Let me try to summarize:
1. If you are running from a web browser, post requests to hosts or
ports other than the origin are allowed, but the headers cannot be
modified. This prevents the addition of the token from
JSONP is great, but won't work with POST requests.
I don't quite understand what Due to the redirect nature of the auth
system means, though.
If I use a custom Webkit browser allow cross domain XMLHttpRequests it
works fine - I do a POST to /v2.0/tokens, get the token and then use that.
What am
Javascript *can* set custom headers, but only by using XMLHttpRequest. That
cannot work cross-domain unless the appropriate CORS headers are set.
Hence this issue :)
On Apr 25, 2012 12:21 AM, Adam Young ayo...@redhat.com wrote:
On 04/24/2012 10:19 AM, Nick Lothian wrote:
JSONP is great
:
Jsonp sucks (get only) but might be the best choice. That's generally how
AWS supports these use cases, fwiw.
On Apr 24, 2012, at 7:49 AM, Sandy Walsh sandy.wa...@rackspace.com
wrote:
On 04/24/2012 11:19 AM, Nick Lothian wrote:
JSONP is great, but won't work with POST requests.
Hmm
...@rackspace.comwrote:
On 04/24/2012 11:19 AM, Nick Lothian wrote:
JSONP is great, but won't work with POST requests.
Hmm, good point.
I don't quite understand what Due to the redirect nature of the auth
system means, though.
If I use a custom Webkit browser allow cross domain
header.
According to the Chrome bug report [2] this issue may well be fixed
now so I need to retest.
Adrian
[1]
http://www.mail-archive.com/openstack@lists.launchpad.net/msg07219.html
[2] http://code.google.com/p/chromium/issues/detail?id=87338
On 23 April 2012 06:19, Nick Lothian nick.loth
21 matches
Mail list logo