Hi
I have a script that runs against AWS and uses the older cloudformation
commands (i.e cfn-describe-stack or cfn-create-stack . What is the
recommended way of porting this script to run against openstack so it can
utilize the same / similar cfn templates and use compatible heat commands?
Basicia
Hi,
I did a git clone of python-novaclient but I do not see the changes
mentioned in https://review.openstack.org/#/c/13036/ . Jenkins says changes
have been merged to git repository and build successful. Yet I do not see
these changes when I look at
http://git.openstack.org/cgit/openstack/python
is using requests module
instead, is this bug still relevant? I will add this comment to the
original bug report.
Regards
AL
On Sat, Sep 14, 2013 at 9:01 AM, Henry Gessau wrote:
> On Sat, Sep 14, at 11:34 am, Avi L wrote:
>
> > I did a git clone of python-novaclient but I do
Hi Chandan,
devstack by default logs everything to standard output and you can use
screen to view the logs. Here are some steps that I had documented in my
blog for debugging devstack logs:
Redirect devstack output to log files :
http://www.datauniv.com/blogs/2013/06/20/how-to-debug-devstack/
Us
Hi,
I understand that the LDAP provider in keystone can be used for
authenticating a user (i.e validate username and password) , and it also
authorize it against roles and tenant. However this requires AD schema
modification. Is it possible to use AD only for authentication and then use
keystone's
P,
> and everything else via SQL.
>
>
> On Wednesday, November 13, 2013, Avi L wrote:
>
>> Hi,
>>
>> I understand that the LDAP provider in keystone can be used for
>> authenticating a user (i.e validate username and password) , and it also
>> authorize it agai
in keystoneclient ($ keystone help
> user-role-add) -- the assignment would be persisted in SQL. openstackclient
> supports assignments to groups as well if you switch to
> --identity-api-version=3
>
> On Wed, Nov 13, 2013 at 3:08 PM, Avi L wrote:
>
>> Oh ok so in this case ho
sing ldap for the Identity section. The
credential and Assignment points to sql.
On Thu, Nov 14, 2013 at 10:17 AM, Avi L wrote:
> Thanks for your help. So in this case the uid parameter to user-role-add
> will be any of the AD attribute that I specify in the keystone.conf file ,
> i.e sA
Just to clarify I am running keystone user-list with keystonerc file
sourced and containing the correct credentials for test123,
On Thu, Nov 14, 2013 at 4:37 PM, Avi L wrote:
> I have installed openstack-keystone-2013.2-0.11.b3.el6.noarch rpm and I
> added a active directory user &q
Hi,
On Fri, Nov 15, 2013 at 2:58 PM, Adam Young wrote:
> On 11/14/2013 07:37 PM, Avi L wrote:
>
> I have installed openstack-keystone-2013.2-0.11.b3.el6.noarch rpm and I
> added a active directory user "test123" with role admin and tenant admin
> successfully.
>
&g
On Fri, Nov 15, 2013 at 3:01 PM, Adam Young wrote:
> On 11/15/2013 11:15 AM, Ben Nemec wrote:
>
> This list is for development discussion only. Since this sounds like a
> question specific to RHEL, might I suggest you ask it on
> http://openstack.redhat.com/forum/ ?
>
>
> Nah, this is legit.
>
On Mon, Nov 18, 2013 at 6:51 AM, Adam Young wrote:
>
>
> ADMIN Token does no authentication against the back end. It is a
> bootstrap method for setting up Keystone, nothing else. It should be
> disabled as soon as you can authenticate via AD.
>
> I don't think you have successfully authenticat
12 matches
Mail list logo