Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to show user's details in OpenStack: GET /v3/users/{user_id} #2

Open
glarocca opened this issue Jul 26, 2021 · 2 comments
Open

Comments

@glarocca
Copy link
Collaborator

glarocca commented Jul 26, 2021

Short Description of the issue

Keystone policy in the EGI cloud providers does not allow users to perform the requested action: 'identity:get_user'

Summary of proposed changes

@sebastian-luna-valero
Copy link
Member

Potential solution: EGI-Federation/documentation#628

@enolfc
Copy link
Collaborator

enolfc commented Apr 10, 2024

Need to enforce configuration at sites via GGUS ticket.

I propose the following text:

Subject: Enable VO user auditing in OpenStack

Dear site admin,

In order to provide have a better control of the resources created by EGI users at your site we propose the use of an additional mapping configuration that allows selected EGI members belonging to the cloud.egi.eu VO and having an auditor role to have reader privileges for the OpenStack domain that supports EGI users. This mapping simplifies the process of releasing resources whenever they are no longer used for piloting VOs without the need of site administrators being involved.

The documentation is available at https://docs.egi.eu/providers/cloud-compute/openstack/aai/#keystone-federation-support and summarised below:

  1. A Group for mapping the auditor role (in the example below, egi-staff) needs to be created on the egi.eu domain (you may want to change the domain name to egi.eu before this - openstack domain set --name egi.eu $(openstack identity provider show -f value -c domain_id egi.eu)
# Support for https://operations-portal.egi.eu/vo/view/voname/cloud.egi.eu
$ openstack group create --domain egi.eu egi-staff
$ openstack role add --domain egi.eu --group egi-staff reader
  1. Add the mapping to your configuration (change the _egi-staff_group_ID_ to the id of the just created group above)
    {
        "local": [
            {
                "user": {
                    "name": "{0}",
                    "email": "{1}"
            },
            "group": {
                    "id": "_egi-staff_group_ID_"
                }
            }
        ],
        "remote": [
            {
                "type": "HTTP_OIDC_SUB"
            },
            {
                "type": "HTTP_OIDC_EMAIL"
            },
            {
                "type": "HTTP_OIDC_ISS",
                "any_one_of": [
                    "https://aai.egi.eu/auth/realms/egi"
                ]
            },
            {
                "type": "OIDC-eduperson_entitlement",
                "regex": true,
                "any_one_of": [
                    "^urn:mace:egi.eu:group:cloud.egi.eu:role=auditor#aai.egi.eu$"
                ]
            }
        ]
    }
  1. Update the mapping:
$ openstack mapping set --rules mapping.json egi-mapping

If there are issues preventing this configuration, please let us know so we can find the best way to support you

Thanks,

@CatalinCondurache, what do you think?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants