Wednesday, 2014-05-07

*** praneshp has quit IRC00:28
*** bknudson has joined #openstack-keystone00:28
*** richm has quit IRC00:30
*** dstanek has joined #openstack-keystone00:43
*** dstanek has quit IRC00:47
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: auth_token middleware hashes tokens with configurable algorithm  https://review.openstack.org/8039800:55
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: auth_token hashes PKI token once  https://review.openstack.org/9249900:55
morganfainbergbknudson, cool, those were the only two things i found in the code that looked suspect00:56
morganfainbergbknudson, otherwise it's def looking solid.00:56
morganfainbergbknudson, +2 once jenkins weighs in (not that I expect any issues)00:58
bknudsonmorganfainberg: I'm glad somebody complained about it.00:58
bknudsonmorganfainberg: and they complained about it after I'd looked at the test code enough that I have some idea what's going on.00:58
morganfainbergbknudson, took me a bit to get through it (not hard code). I wanted to make sure i gave it a serious once over.00:59
morganfainberghehe00:59
morganfainbergit's def. a good change.01:00
ayoungbknudson, strange to pass in the token_id.  Why?01:02
morganfainbergayoung, which part?01:02
bknudsonayoung: because we'd already calculated it01:02
ayoungmorganfainberg, the auth_token hashes PKI token once  https://review.openstack.org/9249901:02
bknudsonand it's somewhat expensive01:03
*** dstanek has joined #openstack-keystone01:03
morganfainbergbknudson, ++01:03
ayoung verified = self.verify_signed_token(user_token, token_id)?01:03
*** david-lyle has joined #openstack-keystone01:03
bknudsonwhen we verify the token we check against the revocation list and cms decode01:04
ayoungOK...I get it01:04
ayoungcaught me off guard.   I wouldn't have written the verify_signed_token  with the check inside it that way.  I would have pulled it out.01:04
ayoungBUt not really anything wrong with it as is01:04
bknudsonayoung: it's a pile of spaghetti01:04
morganfainbergayoung, ah i see why that would catch you off guard01:05
ayoungbknudson, yeah, it needs a good refactoring.  Too miuch is done in middleware01:05
ayoungmiddleware really should be a binding to a well organized set of classes.01:05
ayoungand very little logic01:05
morganfainbergayoung, ++01:05
*** diegows has quit IRC01:06
ayoungI should have made all of those methods private.  But part of me still thinks it stinks that Python's "private" methods are nothing be a naming convention01:06
ayounghard to refactor public APIs01:06
morganfainbergayoung, i think we decided auth_token_middleware was 100% private? or are you referencing something else?01:07
ayoungNah, Its all naming conventions these days.01:07
morganfainbergah right01:07
morganfainbergi wish there was something better than _ or __ (limited use)01:08
*** amcrn has quit IRC01:08
bknudsonwe could go with _PRIVATE_HANDS_OFF_01:11
*** marcoemorais has quit IRC01:12
gyeejamielennox, ping01:13
jamielennoxgyee: hi01:14
gyeejamielenoox, I have a couple of questions for  https://review.openstack.org/#/c/8592001:14
jamielennoxgyee: yep01:14
ayoungbknudson, or we could code in a language that gave support for types and type checking and information hiding and all that.  But then the world would end.01:15
gyeefirst of all, where are all the shell changes01:15
gyeejamielennox, I was hoping for an example of how to use OCS01:15
jamielennoxgyee: there are none, if you don't use a session then the old behaviour is maintained01:15
gyeelike how to add the common args01:15
jamielennoxgyee: novaclient and OSC are imlemented completely seperately01:16
*** gokrokve_ has quit IRC01:21
*** xianghui has joined #openstack-keystone01:24
morganfainbergayoung, we could do some shaaaaaaaaady things with metaclasses :P01:24
ayoungmorganfainberg, We already do.01:24
morganfainbergayoung, no i mean horribly shady vs "well thats just how we do it here"01:25
gyeejamielennox, so if keystoneclient session and auth is used, there will be lost functionality with _original_only?01:25
jamielennoxright _original_only will bar it from use01:25
ayoungmorganfainberg, Python is better than bash.  It is better than Perl.  As far as scripting, type free, dynamic, interpreted languages go, it is about as good as we are going to get.01:26
morganfainbergayoung, true01:26
ayoungAnd I've almost come to accept that.01:26
*** rodrigods_ has quit IRC01:26
morganfainbergayoung, if this project was written in perl, i don't think i'd have any sanity left01:26
ayoungBut I can't help feel I'm being asked to cut down the tallest tree in the forest.  With a herring.01:26
morganfainbergayoung, need a shrubbery as well01:26
ayoungmorganfainberg, sooo.....if I leave in this line events = self.list(since=self._last_fetch)  in the revoke code, my scripts fail to show the token revoked.  If I take out the last_fetch part, they pass.01:27
ayoungI put in a delay in the script between when I trigger the event and when I test for revocation.  I needed a 1 second delay  to even get it to wrok ar all, which kindof makes sense01:28
ayoungbut with the last_fetch in there, even a 5 second delay made no difference.01:28
ayoungI think there is a bug in the last_fetch logic01:28
morganfainbergayoung, overwriting the current set with the last_fetch set (now omitting the event since it's old)?01:29
ayoungSo...I'm going to resubmit the client, to include the brokenness.  And I'll resubmit the scripts.  And File a bug.  I am fairly certain the bug is in the server code, but, not sure01:29
morganfainbergayoung, ah. i'll take a closer look at that specific code path01:30
ayounglet me resubmit the client code first.  I need to untangle some things with the scripts before I resubmit that01:31
morganfainbergayoung, ++01:31
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Revocation event API  https://review.openstack.org/8116601:33
ayoungjamielennox, OS_SERVICE_ENDPOINT or OS_ENDPOINT?01:39
jamielennoxSERVICE_ENDPOINT in ksclient i think01:40
jamielennoxi can't remember though01:40
*** rodrigods_ has joined #openstack-keystone01:48
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Plugin loading from config objects  https://review.openstack.org/7954201:49
*** gokrokve has joined #openstack-keystone01:52
*** david-lyle has quit IRC01:57
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Remove _factory methods from auth plugins  https://review.openstack.org/8198501:57
*** sbfox has joined #openstack-keystone01:58
*** morganfainberg is now known as morganfainberg_Z02:04
*** mberlin1 has joined #openstack-keystone02:13
*** mberlin has quit IRC02:13
*** gokrokve_ has joined #openstack-keystone02:41
*** gokrokve has quit IRC02:44
*** topol has joined #openstack-keystone02:47
*** harlowja is now known as harlowja_away02:50
*** praneshp has joined #openstack-keystone02:51
*** praneshp_ has joined #openstack-keystone02:52
*** zhiyan_ is now known as zhiyan02:53
*** praneshp has quit IRC02:56
*** praneshp_ is now known as praneshp02:56
*** harlowja_away has quit IRC02:58
*** rodrigods_ has quit IRC03:08
*** dstanek has quit IRC03:11
*** dstanek has joined #openstack-keystone03:14
*** dims has quit IRC03:30
*** gyee has quit IRC03:34
*** sbfox has quit IRC03:42
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Example Initialization scripts  https://review.openstack.org/8268703:52
openstackgerritayoung proposed a change to openstack/python-keystoneclient: revocation_events script  https://review.openstack.org/9189503:52
openstackgerritayoung proposed a change to openstack/python-keystoneclient: regions sample script  https://review.openstack.org/9189403:52
*** ayoung has quit IRC03:54
*** sbfox has joined #openstack-keystone03:54
*** dstanek has quit IRC04:14
*** dstanek has joined #openstack-keystone04:31
*** stevemar has joined #openstack-keystone04:47
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Remove _factory methods from auth plugins  https://review.openstack.org/8198504:50
*** chandan_kumar has joined #openstack-keystone04:50
*** dstanek has quit IRC05:00
*** bach has joined #openstack-keystone05:18
*** amerine has quit IRC05:23
*** topol has quit IRC05:26
*** amerine has joined #openstack-keystone05:28
*** spligak has quit IRC05:38
*** sudorandom has quit IRC05:39
*** dstanek has joined #openstack-keystone05:45
*** bach has quit IRC05:48
*** dstanek has quit IRC05:55
*** spligak has joined #openstack-keystone05:55
*** tomoiaga has joined #openstack-keystone05:56
*** bach has joined #openstack-keystone05:57
*** nkinder has quit IRC05:59
*** nkinder has joined #openstack-keystone06:00
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/9028806:01
*** dstanek has joined #openstack-keystone06:01
openstackgerritSergey Nikitin proposed a change to openstack/keystone: Check that the user is dumb moved to the common method  https://review.openstack.org/8851706:05
*** ukalifon1 has joined #openstack-keystone06:20
*** dstanek has quit IRC06:20
*** jaosorior has joined #openstack-keystone06:38
*** sbfox has quit IRC06:45
*** stevemar has quit IRC06:55
*** dstanek has joined #openstack-keystone06:59
*** leseb has joined #openstack-keystone07:04
*** dstanek has quit IRC07:04
*** praneshp has quit IRC07:04
*** leseb has quit IRC07:19
*** leseb has joined #openstack-keystone07:25
*** zhiyan is now known as zhiyan_07:26
*** marekd|away is now known as marekd07:33
openstackgerritJuan Antonio Osorio Robles proposed a change to openstack/keystone: Refactor tests regarding required attributes  https://review.openstack.org/9253508:18
*** bach has quit IRC08:24
*** andreaf has joined #openstack-keystone08:58
*** sudorandom has joined #openstack-keystone09:12
*** chandan_kumar has quit IRC09:17
*** chandan_kumar has joined #openstack-keystone09:23
*** leseb has quit IRC09:28
openstackgerritOlga Kopylova proposed a change to openstack/keystone: Pagination for api request to users list  https://review.openstack.org/6415909:28
*** leseb has joined #openstack-keystone09:29
*** chandan_kumar has quit IRC09:46
*** gokrokve_ has quit IRC09:50
*** gokrokve has joined #openstack-keystone09:50
*** gokrokve has quit IRC09:50
openstackgerritMarek Denis proposed a change to openstack/python-keystoneclient: Implement SAML2 ECP authentication  https://review.openstack.org/9216609:53
*** chandan_kumar has joined #openstack-keystone10:00
*** dims has joined #openstack-keystone10:10
*** dims has quit IRC10:10
*** dims has joined #openstack-keystone10:10
*** leseb has quit IRC10:28
*** leseb has joined #openstack-keystone10:29
*** leseb has quit IRC10:33
*** gabriel-bezerraa is now known as gabriel-bezerra10:34
*** gokrokve has joined #openstack-keystone10:38
*** gokrokve has quit IRC10:43
*** diegows has joined #openstack-keystone10:59
*** dims has quit IRC11:11
*** leseb has joined #openstack-keystone11:29
*** leseb has quit IRC11:34
*** gokrokve has joined #openstack-keystone11:37
*** jamielennox is now known as jamielennox|away11:40
*** gokrokve has quit IRC11:42
*** bach has joined #openstack-keystone11:44
*** vhoward has joined #openstack-keystone11:45
*** topol has joined #openstack-keystone11:58
*** d0ugal_ has joined #openstack-keystone12:06
*** d0ugal_ has quit IRC12:09
*** xianghui has quit IRC12:10
*** bach has quit IRC12:11
*** bach has joined #openstack-keystone12:11
*** leseb has joined #openstack-keystone12:29
*** gokrokve has joined #openstack-keystone12:38
*** gokrokve has quit IRC12:42
*** dstanek has joined #openstack-keystone12:46
*** dstanek has quit IRC12:46
-openstackstatus- NOTICE: Zuul is stuck due to earlier networking issues with Gerrit server, work in progress.13:02
*** ChanServ changes topic to "Zuul is stuck due to earlier networking issues with Gerrit server, work in progress."13:02
*** florentflament has joined #openstack-keystone13:07
*** dstanek has joined #openstack-keystone13:08
*** ChanServ changes topic to "Potential mid-cycle hackathon dates: July 9, 10, 11 (Wed-Fri)"13:11
-openstackstatus- NOTICE: Zuul is processing changes now; some results were lost. Use "recheck bug 1317089" if needed.13:11
*** lbragstad has joined #openstack-keystone13:11
*** leseb has quit IRC13:18
*** leseb_ has joined #openstack-keystone13:18
*** joesavak has joined #openstack-keystone13:21
*** ayoung has joined #openstack-keystone13:24
*** dstanek_zzz has joined #openstack-keystone13:29
*** dstanek has quit IRC13:29
*** dstanek_zzz is now known as dstanek13:29
*** dstanek has quit IRC13:29
*** dstanek has joined #openstack-keystone13:29
*** gokrokve has joined #openstack-keystone13:38
*** gokrokve has quit IRC13:43
*** tellesnobrega has joined #openstack-keystone13:44
*** jsavak has joined #openstack-keystone13:57
*** joesavak has quit IRC13:58
*** gokrokve has joined #openstack-keystone14:04
*** topol has quit IRC14:07
*** stevemar has joined #openstack-keystone14:12
*** lbragstad has quit IRC14:13
*** lbragstad has joined #openstack-keystone14:15
*** shakamunyi has joined #openstack-keystone14:16
*** thedodd has joined #openstack-keystone14:17
*** daneyon has joined #openstack-keystone14:23
*** dims has joined #openstack-keystone14:25
*** d0ugal has quit IRC14:34
*** bvandenh has joined #openstack-keystone14:36
*** jsavak has quit IRC14:36
*** mberlin1 has quit IRC14:40
*** topol has joined #openstack-keystone14:41
openstackgerritJuan Antonio Osorio Robles proposed a change to openstack/keystone: Refactor tests regarding required attributes  https://review.openstack.org/9253514:42
*** daneyon has quit IRC14:43
*** daneyon has joined #openstack-keystone14:43
*** d0ugal has joined #openstack-keystone14:47
*** d0ugal has quit IRC14:47
*** d0ugal has joined #openstack-keystone14:47
*** daneyon has quit IRC14:49
*** daneyon has joined #openstack-keystone14:50
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Regions Management  https://review.openstack.org/7909614:53
*** mberlin has joined #openstack-keystone14:54
*** vhoward has left #openstack-keystone14:55
*** joesavak has joined #openstack-keystone15:00
*** david-lyle has joined #openstack-keystone15:15
*** richm has joined #openstack-keystone15:19
*** shakamunyi has quit IRC15:20
*** jaosorior has quit IRC15:21
*** shakamunyi has joined #openstack-keystone15:23
*** bvandenh has quit IRC15:29
*** jsavak has joined #openstack-keystone15:37
*** joesavak has quit IRC15:38
*** gyee has joined #openstack-keystone15:40
dolphmsergey nikitin pinged the list on april 17th about an LDAP gate job, with no response. was there a conversation here or anything? that'd be great to have15:45
dolphmthread: http://lists.openstack.org/pipermail/openstack-dev/2014-April/033027.html15:46
*** tomoiaga has quit IRC15:51
*** dolphm changes topic to "Sunday summit meetup @ http://www.parkbaratlanta.com/ (5 min walk from conference) | Potential mid-cycle hackathon dates: July 9, 10, 11 (Wed-Fri)"15:53
*** ukalifon1 has quit IRC15:55
*** joesavak has joined #openstack-keystone15:59
*** jsavak has quit IRC16:01
*** chandan_kumar has quit IRC16:03
gyeedolphm, what's the time for the Sunday meetup?16:03
*** dstanek is now known as dstanek_zzz16:08
*** marcoemorais has joined #openstack-keystone16:10
*** andreaf has quit IRC16:11
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: auth_token hashes PKI token once  https://review.openstack.org/9249916:15
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: auth_token middleware hashes tokens with configurable algorithm  https://review.openstack.org/8039816:15
*** praneshp has joined #openstack-keystone16:19
*** dstanek_zzz is now known as dstanek16:30
*** gokrokve has quit IRC16:40
*** leseb_ has quit IRC16:42
*** leseb has joined #openstack-keystone16:47
*** leseb has quit IRC16:47
*** leseb_ has joined #openstack-keystone16:47
*** jaosorior has joined #openstack-keystone16:51
*** chandan_kumar has joined #openstack-keystone16:54
*** gokrokve has joined #openstack-keystone16:54
*** harlowja has joined #openstack-keystone16:58
*** dstanek is now known as dstanek_zzz17:04
*** jsavak has joined #openstack-keystone17:05
*** florentflament has quit IRC17:05
*** joesavak has quit IRC17:07
*** bach_ has joined #openstack-keystone17:13
*** bach has quit IRC17:13
*** gokrokve has quit IRC17:21
dolphmgyee: i land at ~10a, and it sounds like people are trickling in all day, so i might go there when they open (noon)17:22
gyeedolphm, sounds good, I'll try to look for you guys there then17:26
*** sbfox has joined #openstack-keystone17:29
dolphmgyee: what time do you land?17:31
*** morganfainberg_Z is now known as morganfainberg17:32
*** morganfainberg is now known as needscoffee17:33
*** needscoffee is now known as morganfainberg17:33
morganfainbergdolphm, i haven't heard convo on LDAP gate job17:34
morganfainbergdolphm, there should be one17:34
dolphmmorganfainberg: i know we talked about it once, but i don't recall a blocker...17:34
morganfainbergdolphm, gyee, i land ~5pm-ish on sunday17:34
gyeedolphm, 6pm, taking the redeye17:34
dolphmmorganfainberg: http://www.parkbaratlanta.com/17:34
dolphmgyee: ack17:34
morganfainbergdolphm, sounds good to me17:35
morganfainbergdolphm, there is the qa matrix dev session at the summit17:35
morganfainbergdolphm, prob should attend that (I'm planning on it) if we're really interested in things like expanding testing (e.g. LDAP gate job)17:36
dolphmmorganfainberg: ++17:36
gyeemorganfainberg, OpenLDAP gate?17:36
*** praneshp_ has joined #openstack-keystone17:37
morganfainberggyee, probably. i mean, Active Directory gate might be hard to setup17:37
morganfainberg:P17:37
*** praneshp has quit IRC17:37
*** praneshp_ is now known as praneshp17:37
gyeemorganfainberg, LDAP performance need some work17:38
morganfainberggyee, ++17:38
gyeeI have some POC code using ldappool17:38
gyeebut ldappool needs some update too17:38
gyeemorganfainberg, but if we cache user_id to user DN mapping, couple that with connection pooling, performance will be awesomer17:39
*** gokrokve has joined #openstack-keystone17:39
morganfainberggyee, i also approve of the word "Awesomer" in this context :)17:40
ayoungI land Sunday night 9 ish17:40
gyeeayoung, you bringing your running gear, we can jog around the olympic park17:41
ayoungFreeIPA Gate FTW.  We can do Kerberos too17:41
ayounggyee, ++17:41
gyeeayoung, FreeIPA as a cert provider to Barbican right?17:42
ayoungthat too17:42
morganfainbergayoung, ++ i like the idea of that, please show up to the test matrix sessions :)17:42
gyeeor is it standalone17:42
ayoungmorganfainberg, what slot?17:42
morganfainbergayoung, sec.17:42
morganfainbergayoung, http://junodesignsummit.sched.org/event/fd84ec7ddc3252270fb73e8e9e09cfba17:43
ayoungmorganfainberg, will do17:43
morganfainbergoh look at that17:44
*** bach_ has quit IRC17:44
morganfainbergthere is a whole session on Kite!17:45
morganfainberghttp://junodesignsummit.sched.org/event/f17f40205979d37158c12dacbc39e21d17:45
*** bach has joined #openstack-keystone17:45
morganfainbergayoung, ^ PKI messaging probably will be involved there somehow?17:46
ayoungmorganfainberg, yep....gonna be spread thin17:46
morganfainbergayoung, yeah. already trying to resolve which sessions are more important to get to17:47
gyeemorganfainberg, I am having a hard time trying to figure out which party to attend :D17:48
dolphmi shuffled 4 of our sessions around last night to accommodate the federation overlap as best as possible17:48
morganfainberggyee, yeah. there is also a Metacloud party i'm supposed to invite people to (not on the official schedule) ;)17:49
dolphmmorganfainberg: what day?17:50
gyeemorganfainberg, I presume there's a secret hand gesture to get into one of those?17:50
morganfainberggyee, lol17:50
morganfainbergdolphm, same day as redhat party, let me get the details17:51
ayoungmorganfainberg, Wednesday night I am disappearing an meeting up with College friends17:52
morganfainbergWednesday, May 14, 2014 from 8:30 PM to 11:30 PM17:52
dolphmwed = core party?17:52
morganfainbergayoung, better plan than conference-related party imo17:53
dolphm<i>sponsored by HP</i>17:53
*** packet has joined #openstack-keystone17:53
morganfainbergdolphm, hah, given the choice i'd say i need to go to the core party17:53
gyeemorganfainberg, its very easy to choose between frat party and core party :)17:54
morganfainberghuh wonder if I RSVPd for that...17:54
morganfainberg(core party)17:54
dolphmmorganfainberg: going head to head with the red hat party... risky17:54
dolphmmorganfainberg: i RSVP'd twice, you can have one of mine17:55
morganfainbergdolphm, haha i'm pretty sure I RSVPd but...17:55
dolphmeventbright.somethign17:55
morganfainbergeh worst case i can chase down Mark and bug him.17:55
dolphmeventbrite.com17:55
morganfainbergdolphm, i sent an email to mark, i'm sure i'll get it all sorted :)17:59
*** packet has quit IRC17:59
*** dims has quit IRC18:01
ayoungmorganfainberg, looks like Tuesday is Loaded.  I only have Keystone stuff on Wed and THurs, but Tues I am going from dawn til dusk, with double bookins on at least two sessions18:01
ayoung318:01
ayoungI'll probably drop "Future of Python Support" cuz that resoves down to "Py33 when we can toss eventlet"18:01
*** joesavak has joined #openstack-keystone18:02
dolphmsounds like py3 support in nova is hopeless18:02
ayoungWe can drop 2.6, I think, for RH, too, as we have collections now, but I'm sure there will be many people from RH that can address that18:02
*** marcoemorais has quit IRC18:02
ayoungdolphm, anything more than Eventlet?18:03
morganfainbergdolphm, wow, hopeless?18:03
dolphmayoung: just an incredibly tight coupling with eventlet18:03
morganfainbergdolphm, yeah.18:04
*** marcoemorais has joined #openstack-keystone18:04
morganfainbergdolphm, there have been some grumblings that other projects should support deployments in mod_wsgi and/or gunicorn type stuff18:04
dolphm:D18:04
dolphmthey should! because, you know, that's what wsgi is for18:04
*** jsavak has quit IRC18:05
morganfainbergdolphm, it would be really cool if you could run all of openstack under mod_wsgi (e.g. devstack: /identity /compute /storage ....)18:06
morganfainbergdolphm, i'd totally dig that deployment model.18:06
dolphmmorganfainberg: ++18:07
*** sbfox has quit IRC18:07
*** joesavak has quit IRC18:08
*** dstanek_zzz is now known as dstanek18:13
ayoungmorganfainberg, what a great idea18:15
ayounghttps://wiki.openstack.org/wiki/URLs18:15
*** morganfainberg has quit IRC18:15
*** andreaf_ has joined #openstack-keystone18:15
*** andreaf_ has quit IRC18:16
*** morganfainberg has joined #openstack-keystone18:16
*** andreaf has joined #openstack-keystone18:16
ayoungmorganfainberg, what a great idea18:17
ayounghttps://wiki.openstack.org/wiki/URLs18:17
* ayoung should update that18:17
*** morganfainberg has quit IRC18:18
*** morganfainberg_Z has joined #openstack-keystone18:19
*** morganfainberg_Z is now known as morganfainberg18:20
ericvwIt appears that on trusty, the python-ldap version has moved (or has been removed) the 'LDAP_CONTROL_PAGE_OID' variable, which is causing errors using keystone (icehouse) on trusty.  A quick search on launchpad doesn't reveal anything, but I am happy to make some changes/fixes for this.  It appears between precise and trusty the version of python-ldap has18:22
ericvwadvanced, I am still tracking down what happened to this variable...18:22
ayoungmorganfainberg, can I get a Hell Yeah (or a hell no)  https://review.openstack.org/#/c/79096/  trying to clear out some ofthe client work, and jaypipes deserves his region support18:23
morganfainbergayoung, sec trying to fix my login to gerrit, then yes you can18:24
dolphmericvw: what version of python-ldap is installed?18:24
ayoungmorganfainberg, thanks18:24
ayoungericvw, we just saw a similar problem.  Are you running out of pip for python-ldap or from packages?  it might not be quite the same problem18:25
ericvw2.4.10-1build118:25
ericvwaccording to `apt-cache show python-ldap`18:25
morganfainbergayoung, i think your docstrings aren't valid RST.18:25
ayoungmorganfainberg, passes tox -edocs?18:25
morganfainbergayoung, checking the rendering now. but it looks off18:26
ericvwayoung, trusty's packages18:26
morganfainbergayoung, http://docs-draft.openstack.org/96/79096/11/check/gate-python-keystoneclient-docs/a91ff75/doc/build/html/api/keystoneclient.v3.html#module-keystoneclient.v3.regions18:26
morganfainbergayoung, i think the param bits are off. in update18:27
*** bvandenh has joined #openstack-keystone18:27
morganfainbergayoung, it should end up looking like http://docs-draft.openstack.org/96/79096/11/check/gate-python-keystoneclient-docs/a91ff75/doc/build/html/api/keystoneclient.v3.html#keystoneclient.v3.client.Client18:27
morganfainbergayoung, i don't think the -edocs will fail, it'll just make for bad rendering with the RST you have18:28
morganfainbergayoung, if you want me to take a swing at the RST i'll do that really quickly instead of a -1.18:29
morganfainbergotherwise it looks good18:29
openstackgerritAndreas Jaeger proposed a change to openstack/keystone: Fix version links to docs.openstack.org  https://review.openstack.org/9265318:31
ayoungparam :region:18:31
ayounghmm18:31
ayounglooks it18:31
ayoung* id:    good   and    param :id:    bad ?  morganfainberg ?18:31
ayoungmorganfainberg, I just looked at projects.py18:31
ayounghttp://git.openstack.org/cgit/openstack/python-keystoneclient/tree/keystoneclient/v3/projects.py#n2418:31
ayoungBut that is not a param list...18:32
morganfainbergayoung, i think you need :param id:18:32
morganfainberglet me load it up and check18:32
morganfainbergayoung, (also getting lag on IRC atm)18:32
stevemarmorganfainberg, ahhh, i should have caught that!18:34
ayoungstevemar, morganfainberg how do I run that in my own tree?  tox -edocs does not seem to be producing html18:34
ayoungpython setup.py build_sphinx18:35
ayoungwould it be  something there ?  Some param that says :gen html?18:35
stevemarayoung it should be in keystone_dir/doc/build/html/index.html18:35
ayoungstevemar, client18:35
ayoungstevemar, so I can build it using the makefile, but not by tox?18:35
stevemarayoung, tox should produce it too18:35
*** bvandenh has quit IRC18:36
morganfainbergayoung, http://paste.openstack.org/show/79448/ that looks like the diff needed to fix the RST18:36
ayoungmorganfainberg, how did you test that?18:37
morganfainbergayoung, at least that looks better (haven't run the doc build locally)18:37
morganfainbergayoung, advantage to this IDE it does some of the work for me.18:37
stevemarayoung, firefox doc/build/html/api/modules.html -> click on your new guy18:37
morganfainbergayoung, but i need to do the build here first18:37
ayoungmorganfainberg, I'm running PyCharm18:38
morganfainbergayoung, if you click on the function dev, and hover there is a lightbulb icon that pops up and if you click on that it allows you to inject the docstring18:38
morganfainbergayoung, the params into the docstring18:38
morganfainbergayoung, http://imgur.com/7C6wRS918:40
morganfainbergthe diff i posted only covered create not update *oops*18:41
morganfainbergayoung, and i confirmed the diff looks like it renders more correctly18:42
morganfainbergayoung, want me to post that fix and +1 for the code?18:42
ayoungstevemar, BTW, dolphm recommended I remove Optional for all those where the defaults are specified in the param list.  He's right18:43
morganfainbergah.18:44
stevemarayoung, so if description defaults to None, then it's not optional?18:44
morganfainbergstevemar, or it's implied to be optional because there is a default18:45
morganfainbergstevemar, no need to specifically call it out18:45
stevemarmorganfainberg, alrighty18:46
stevemarmorganfainberg, i'm not hard to convince, just like consistency :)18:46
ayoungstevemar, also, thje indentation is necessary for the rst transform to HTML.18:47
ayoungstevemar, it there is a value in the param list, it is optional by definition18:47
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Regions Management  https://review.openstack.org/7909618:48
morganfainbergayoung, yeah that looks better.18:49
morganfainbergbknudson, https://review.openstack.org/#/c/80398/ +2 on that. looks good.18:51
morganfainbergbknudson, thanks for eliminating the re-calculation of the hash18:51
bknudsonmorganfainberg: no problem18:52
bknudsonayoung: do we need to sign the revocation list? would it be unsecure to send it without encryption?18:53
ayoungbknudson, its coming from a trusted source.  We would only need to sign if we wanted offline verification18:53
*** dstanek is now known as dstanek_zzz18:54
bknudsonayoung: so for example I changed auth_token recently to optionally check the revocation list18:54
ayoungbknudson, so, we can add it in the future, but it does not need to be there out the door.  Ideally, any one of our APIs should be deliverable in the same format as the tokens:  Signed, and compressed18:54
bknudsonbecause we can't get the revocation list without pki_setup18:54
bknudsonbut would it be ok to change the revocation list to not be signed instead?18:55
*** BAKfr has joined #openstack-keystone19:03
morganfainbergdolphm, do i need my real name in the .mailmap file?19:05
morganfainbergdolphm, or is email sufficient if name is correct?19:05
dolphmmorganfainberg: i think all the name is used for there is to map multiple email addresses together (you could use a uuid)19:06
morganfainbergdolphm, hm.19:07
dolphmmorganfainberg: err, maybe i'm thinking of something else19:07
dolphmmorganfainberg: are you talking about this? https://github.com/openstack/keystone/blob/master/.mailmap19:07
morganfainbergdolphm, yes19:07
dolphmmorganfainberg: looks like not everyone has a name anyway19:08
morganfainberghehe19:08
morganfainbergdolphm, i'll just use email address, looks like the name is only needed for typo/name correction itself19:09
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add mailmap entry  https://review.openstack.org/9266519:10
openstackgerritMorgan Fainberg proposed a change to openstack/python-keystoneclient: Add mailmap entry  https://review.openstack.org/9266919:12
*** henrynash has quit IRC19:14
ayoungstevemar, WTF is /opt/stack/python-keystoneclient/keystoneclient/openstack/common/apiclient/client.py:docstring of keystoneclient.openstack.common.apiclient.client.HTTPClient.client_request:11: WARNING: Block quote ends without a blank line; unexpected unindent.19:18
ayoungbknudson, it would be OK to make the revocation list not be signed.19:19
bknudsonayoung: https://review.openstack.org/#/c/73879/19:20
*** diegows_ has joined #openstack-keystone19:21
ayoungbknudson, which change?19:21
stevemarayoung thats already there from before, https://bugs.launchpad.net/python-keystoneclient/+bug/131552319:21
uvirtbotLaunchpad bug 1315523 in python-keystoneclient "Building keystoneclient docs generates several warnings" [Low,In progress]19:21
mfischWhat time is the informal Sunday meetup?19:21
ayoungstevemar, I know, I am trying to fix those19:21
ayoungmfisch, when ever I get there.  Aint a party without me19:22
stevemarayoung, they are in oslo, and bknudson has a fix for them already in place19:22
ayoungstevemar, nah, fixing things in KClient19:22
* mfisch calls his Redhat sales rep to get GPS tracking on ayoung 19:22
ayoungstevemar, ahhhh19:22
* ayoung bangs head19:22
stevemarayoung, ahhhh ;)19:22
*** leseb_ has quit IRC19:22
stevemarlove facepalm moments19:23
ayounggit branch -D docs-cleanup19:23
ayoungstevemar, I need to do something to keep busy while waiting for jenkins19:23
ayoungstevemar,  and reviews on https://review.openstack.org/#/c/71181/  and https://review.openstack.org/#/c/81166/19:24
stevemarayoung, likewise https://review.openstack.org/#/c/81980/19:25
*** henrynash has joined #openstack-keystone19:25
ayoungstevemar, getting out my red pen....19:25
stevemarby all means!19:25
ayoungah, yeah, I've looked at that a few times, but always when it iwas in transition...19:25
ayoungstevemar, so...how do you see that working?  You had a script for it, right?19:26
stevemaryeah, or through openstackclient19:27
ayoungstevemar, care to post?  fpaste would be fine19:28
stevemarayoung, marked as abandoned for now: https://review.openstack.org/#/c/80193/19:29
ayoungstevemar, BRING IT BACK!19:29
ayoungI'll rebase it ontop of my setup/teardown, if you don't ming19:29
ayoungmind19:30
stevemarwhere is the defibrillator19:30
stevemarsure19:30
stevemarit depends on the auth patch too (which needs a rebase as well)19:30
ayoungright....sequencing here is awkward19:31
ayoungstevemar, so...I need a token already in order to do oauth, or is that an artifact of the client?19:32
ayoungoh, wait19:32
ayoungline 93 ist19:32
ayoungish19:32
*** amcrn has joined #openstack-keystone19:33
*** andreaf has quit IRC19:34
ayoungstevemar, what does verifier = client.oauth1.request_tokens.authorize(request_key, roles)   actually verify?  I create a verifier, and the role assingment goes away does the verifier go away, too?19:34
stevemarayoung, the authorize action associated roles with the request token, and returns a verifier (pin). the request token and verifier are exchanged for an access token (long lived)19:38
ayoungstevemar, I remember discussing this back when oauth went in, but...for trusts the rule was that we verified role assignments when the user tried to get a token.  In Oauth, when are the role assignments verified for the origianl user?19:39
ayoungis it just when I request an access token, or is it when the verifiedr and request token are generated?  Both?19:40
stevemarayoung, it's been a while, it might be both,19:41
ayoungstevemar, OK...just wondering19:41
stevemardefinitely in the authroize stage for sure19:41
stevemarbecause in that function, there is code to lookup the user's roles to see if he even has the roles to authorize19:42
openstackgerritFlorent Flament proposed a change to openstack/python-keystoneclient: Allow keystone_authtoken middleware to use v3 API  https://review.openstack.org/8862019:42
ayoungstevemar, it needs to be when the user would actually get a Keystone token.  Anything earlier is nice-to-have but not necessary.19:42
openstackgerritAndreas Jaeger proposed a change to openstack/keystone: Fix version links to docs.openstack.org  https://review.openstack.org/9265319:45
*** dims has joined #openstack-keystone19:47
ayoungstevemar, any reason the short commit message should not read "oauth client API?"19:49
stevemarayoung, i have no reason for that19:51
*** jaosorior has quit IRC19:51
stevemars/keystoneclient/oauth client API ?19:52
ayoungstevemar, I mean, this is it, right?  Ther might be fixes, but this really is the client support, no?19:52
stevemarayoung, this, and the auth function (different patch - https://review.openstack.org/#/c/81981/5) need to go in, but thats it19:54
ayoungstevemar, Ah, OK...I can see the reason for splitting.  It looks good so far, but if there is another iteration, add oauth to the oneliner, ok?19:55
stevemarto the commit title?19:55
stevemarayoung, anyone can edit the commit message from gerrit now, just click the little notepad/pencil/edit button,19:57
ayoungtrue19:57
ayoungbut its your patch.  I'll let you craft it19:57
ayoungstevemar, what happend before 0.6?   oauthlib>=0.619:57
stevemarayoung, no oauth1.0b server support19:58
ayoung++19:58
stevemarayoung, it's a big chunk of stuff, so feel free to hold off on +A'ing it if you want19:59
ayoungstevemar, it looks pretty clean and straight forward.  I'm not really worried about security violations coming from the client19:59
openstackgerritSteve Martinelli proposed a change to openstack/python-keystoneclient: Add request/access token and consumer support for oauth client API  https://review.openstack.org/8198019:59
* stevemar agrees19:59
ayoungdoes't write anything to disc...20:00
stevemarayoung, this was already approved at one point before, too, btw. we had to take it out because it broke stable/havana builds20:00
ayoungstevemar, make it "Oauth request/access token and consumer support"20:01
ayoungDrop "add"  and "for keystoneclient"  for obvious reasons.  Ican't seem to edit the commit message20:01
openstackgerritSteve Martinelli proposed a change to openstack/python-keystoneclient: OAuth request/access token and consumer support for oauth client API  https://review.openstack.org/8198020:02
*** joesavak has joined #openstack-keystone20:05
lbragstadgyee: I can address my comments here if you want, since they are minor nits.20:06
lbragstadhttps://review.openstack.org/#/c/84945/920:06
ayoungUm...I just went to review, and it jumped to workflow +120:09
dolphmmirantis party on wed just took the cake for me20:10
*** browne has joined #openstack-keystone20:10
dolphmAndretti Indoor Karting & Games20:10
dolphmw00t20:10
ayoungI'm guessing that means approved, since it looks like it is scheduled.20:10
ayoungstevemar, I +2 +A ed it.  It looks really good.20:11
stevemarayoung, woo hoo20:13
stevemardolphm, looks like we found a replacement for the mario kart tourney20:13
*** topol has quit IRC20:16
gyeelbragstad, thanks, I'll push a patch shortly20:17
*** raildo has joined #openstack-keystone20:26
*** bach has quit IRC20:26
*** shakamunyi has quit IRC20:27
*** browne has quit IRC20:27
ayoungbknudson, what triggers WARNING: Block quote ends without a blank line; unexpected unindent.20:28
bknudsonayoung: the doc format says that things need to be indented and there needs to be a blank line after the end of the indented part20:28
bknudsonayoung: so there's a line that's indented 4 chars and the next line is indented 0 chars20:29
bknudsonayoung: so this would be for a preformatted section or list20:29
ayoungOK...I think I figured which it was complaining about.20:30
bknudsonayoung: the line number is the line in the docstring20:32
ayoungbknudson, yeah, but it was the block before it that was wrong.  Adding a space above it made it go away20:32
*** amcrn has quit IRC20:39
*** jamielennox|away is now known as jamielennox20:39
*** bach has joined #openstack-keystone20:43
gyeejamielennox, ping20:55
*** bach has quit IRC20:55
jamielennoxdolphm: can you look at your comment on https://review.openstack.org/#/c/91216/ i think that should be an easy one to get through20:55
ayounggyee, too early20:55
jamielennoxgyee: for like 2 minutes20:55
ayoungHeh, guess I was wrong20:55
gyeeheh20:55
gyeejamielennox, am looking at https://review.openstack.org/#/c/8592020:55
gyeemostly good20:55
gyeejust a few more questions20:55
*** shakamunyi has joined #openstack-keystone20:56
jamielennoxsure20:56
gyeejamielennox, I see proxy_token, proxy_tenant_id, etc in here https://review.openstack.org/#/c/85920/2/novaclient/v3/client.py20:56
gyeeSession don't care about these?20:56
gyeetimings, bypass_url, os_cache20:57
jamielennoxgyee: i really couldn't find them used20:57
jamielennoxno i don't have timings20:57
jamielennoxi expected at some point we'd need that in session20:57
jamielennoxi *think* i can actually pull that info out of the requests.Resonpse20:58
*** bach has joined #openstack-keystone20:58
jamielennoxgyee: anyway the sort of overall point is that all of those things are CLI constructs20:58
gyeejamielennox, that's fine, you may want to drop a note in there indicating that you are aware of these args and they may not be needed in Session20:58
jamielennoxand i get that the way some things are defined i'll need to add them, but i was going for minimal to start with20:59
gyeejamielennox, also for CLI, what's our direction moving forward?20:59
gyeeare we expect to integrate with OSC20:59
jamielennoxOSC20:59
jamielennoxi don't know what nova's stance is exactly20:59
jamielennoxbut IMO it should always be OSC21:00
gyeeseem like quite a bit of refactoring work21:00
jamielennoxthe test's you mean?21:00
gyeeyeah, that too21:00
jamielennoxgyee: sure, but it's the  best way i could see of testing both clients21:01
gyeejamielennox, beside nova, are you plan on do the same for the other clients? I am in the process of doing the same thing, just want to make sure we don't double the work21:01
jamielennoxgyee: i had a go and cinder in the past, but i did it in such a way that i tried to integrate the old methods with the new21:02
jamielennoxgyee: the nova way is better, just chop off the old and run the new stuff side-by-side21:02
openstackgerritguang-yee proposed a change to openstack/keystone: Make sure all the auth plugins agree on the shared identity attributes.  https://review.openstack.org/8494521:02
jamielennoxgyee: i think i have a glance patch somewhere21:03
jamielennoxgyee: actually no, i don't have glance because glance uses httplib21:03
jamielennoxgyee: i gotta run, i'll be back in about 2 hrs, we can make up a list if you like - i'm hoping the summit will help me push these21:04
gyeejamielennox, there's a glance one but needs to be amended https://review.openstack.org/#/c/82126/21:04
jamielennoxhmm that's in shell21:05
gyeejamielennox, sounds good, lets hookup in the summit to see if we can divide up the work21:05
jamielennoxgyee: for that one, we need to pass my auth plugin from conf one, then we can look at an auth plugin from oslo.conf CLI21:05
gyeeyeah, lemme amend that one21:05
jamielennox(actually that's not oslo.config)21:06
jamielennoxanyway, back later21:06
*** shakamunyi has quit IRC21:07
*** bach has quit IRC21:10
*** morganfainberg has quit IRC21:11
*** morganfainberg has joined #openstack-keystone21:11
*** gokrokve_ has joined #openstack-keystone21:11
*** morganfainberg has quit IRC21:13
*** morganfainberg has joined #openstack-keystone21:13
*** bach has joined #openstack-keystone21:13
*** morganfainberg has quit IRC21:14
*** gokrokve has quit IRC21:15
*** bach has quit IRC21:15
*** morganfainberg has joined #openstack-keystone21:17
*** joesavak has quit IRC21:20
*** bach has joined #openstack-keystone21:22
*** bach has quit IRC21:26
*** bach has joined #openstack-keystone21:27
*** chandan_kumar has quit IRC21:37
*** thedodd has quit IRC21:39
*** thedodd has joined #openstack-keystone21:40
*** shakamunyi has joined #openstack-keystone21:41
*** bach has quit IRC21:47
*** bach has joined #openstack-keystone21:47
*** gokrokve_ has quit IRC22:02
*** gokrokve has joined #openstack-keystone22:03
*** dims_ has joined #openstack-keystone22:05
*** dims has quit IRC22:08
*** thedodd has quit IRC22:10
*** stevemar has quit IRC22:11
*** bach has quit IRC22:12
*** bach has joined #openstack-keystone22:24
openstackgerritA change was merged to openstack/python-keystoneclient: OAuth request/access token and consumer support for oauth client API  https://review.openstack.org/8198022:33
morganfainbergsooo.. this just merged: https://review.openstack.org/#/c/91797/ once the ACLs roll out, we can abandon/unabandon as cores for our project(s)22:37
*** bach has quit IRC22:38
*** bach has joined #openstack-keystone22:40
*** bach has quit IRC22:40
*** bach has joined #openstack-keystone22:41
*** rwsu has quit IRC22:42
*** gokrokve has quit IRC22:45
gyeemorganfainberg, nice, that means we can restore any patch?22:48
morganfainberggyee, it means we can restore any patch in keystone from abandoned state22:48
morganfainbergor keystoneclient, or identity-api22:48
morganfainbergnot just the owner22:48
morganfainberggyee, :)22:49
gyeenice!22:50
*** shakamunyi has quit IRC22:51
*** dims_ has quit IRC22:53
*** boris-42 has quit IRC22:57
*** boris-42 has joined #openstack-keystone22:58
*** david-lyle has quit IRC22:59
*** bach has quit IRC22:59
*** rodrigods_ has joined #openstack-keystone23:01
*** david-ly_ has joined #openstack-keystone23:03
*** bach has joined #openstack-keystone23:10
*** gokrokve has joined #openstack-keystone23:10
*** henrynash has quit IRC23:12
*** bach has quit IRC23:15
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: auth_token accepts un-signed revocation list  https://review.openstack.org/9272623:20
morganfainbergbknudson, is that for a usecase where you are sure no MITM attack(s) could occur?23:21
openstackgerritBrant Knudson proposed a change to openstack/keystone: Allow configuring for un-signed revocation list  https://review.openstack.org/9272723:22
bknudsonmorganfainberg: isn't that every use case?23:22
bknudsonmorganfainberg: if you've got MITM attacks going on you're going to have some pretty major problems alreadY?23:22
morganfainbergbknudson, well i mean, if we're signing data from keystone isn't that the point? eliminate MITM attacks (not tokens, different case there)23:23
bknudsonmorganfainberg: that's a good question... why was it signed to begin with?23:23
bknudsonwas it unprotected?23:23
morganfainbergbknudson, no TRL had to be protected23:24
morganfainbergbknudson, the revocation events should be unprotected23:24
bknudsonare revocation events signed?23:24
morganfainbergbknudson, good question *looks*23:24
bknudsonmorganfainberg: I don't see the revocation events reponse being signed.23:26
morganfainbergbknudson, neither do i23:26
bknudsonmorganfainberg: maybe because it doesn't contain token IDs?23:26
*** dims_ has joined #openstack-keystone23:27
bknudsonbut our token IDs aren't protected if you're not using https anyways23:27
morganfainbergbknudson, hm. i think we might need to ask ayoung about this one23:27
morganfainbergbknudson, maybe the assumption is running https is the right answer.23:28
morganfainbergbknudson, which case, sure signing might be overkill (if you could validate the cert)23:28
*** dims_ has quit IRC23:30
*** dims has joined #openstack-keystone23:30
*** dims has quit IRC23:31
*** dims has joined #openstack-keystone23:34
gyeemorganfainberg, more scary than that, https cert is different from signing cert23:38
gyeejamielennox, you back?23:39
morganfainberggyee, i don't see that as being horrific, as long as it's planned to be that way23:39
gyeemorganfainberg, I am not saying is required, but we should offer the capability as each deployment is different23:40
*** dims has quit IRC23:40
morganfainberggyee, we should provide a mechanism to deploy explicit verification certs to any auth_token_middleware instead of needing to ask keystone for the cert23:41
*** dims has joined #openstack-keystone23:41
morganfainberggyee, as it stands, i think you could use the same SSL cert for https and signing tokens/trl/etc23:41
ayoungmorganfainberg, you can.23:41
morganfainbergayoung, we can?23:41
ayoungbut you should not23:41
morganfainbergayoung, didn't think that was an option in auth_token23:41
gyeemorganfainberg, oh absolutely!23:41
ayoungwhy not?  So long as you put the certs in the signing_dir, it will never fetch them from Keystone23:41
gyeefingerprint validation at the very least23:41
morganfainbergayoung, i thought the signing dir was tmpdir managed23:42
morganfainbergayoung, i might be mis-remembering23:42
ayoungmorganfainberg, only by defualt.  But it is a config option23:42
morganfainbergayoung, ah. ok then.23:42
ayoungthe thing is, its the CA cert that is suspect23:42
ayoungbut getting the other certs from Keystone makes sense, and in fact we are going to want to be able to do that for more than just one signing cert23:43
ayoungbut...I need to step away for a moment23:43
morganfainbergayoung, some environments will want strict controls over the certs deployed both for auth_token and for the signing. but that would likely be the exception23:43
morganfainbergayoung, ++ don't disagree. but some environments are oddly strict about things.23:43
*** dims has quit IRC23:45
ayoungmorganfainberg, its trickier than that.  we want to be able to map a certificate to an entity in OpenStack.  It can't just "oh, yeah, this cet validates the docuemtn"23:45
*** bach has joined #openstack-keystone23:45
*** dims has joined #openstack-keystone23:46
*** dims has quit IRC23:48
*** dims has joined #openstack-keystone23:48
*** dims has quit IRC23:49
*** dims has joined #openstack-keystone23:50
jamielennoxgyee: yea,23:51
gyeejamielennox, I am still skeptical about session23:52
jamielennoxgyee: oh?23:52
jamielennoxin general?23:52
gyeejamielennox, how do I know which auth plugin to use23:52
gyeebased on auth_version, auth_url?23:52
jamielennoxgyee: who is 'I' in that23:52
gyeewhat if the auth_url is unversioned?23:52
jamielennoxthe user, the client..23:53
gyeethe client23:53
jamielennoxso the client - it doesn't23:53
gyeeright now, the way to integrate with keystoneclient is23:53
jamielennoxtaking eg novaclient, it does not care what auth plugin you use23:53
gyee1) construct an auth plugin, 2) construct a session23:53
gyee3) pass both session and auth plugin23:53
jamielennoxall it knows is i send requests through this object and they are authenticated on the way23:53
gyeehow does the client know whether to construct a v3 auth plugin or v2 auth plugin?23:54
jamielennoxgyee: why does the client care? are you talking about the CLI here?23:54
*** david-ly_ has quit IRC23:55
gyeeright23:55
gyeehow does CLI know which plugin to use?23:55
jamielennoxi'm thinking we specify it23:55
jamielennox--os-auth-plugin XXXX23:55
gyeeoh23:55
gyeehow does the CLI get a list of supported plugins?23:56
jamielennoxprobably and for compatibility if you pass --os-username and --os-password without --os-auth-plugin then it should know what to do23:56
gyeemore specifically, the correct name to use23:56
jamielennoxthey are all stevedore plugins23:56
jamielennoxhttps://review.openstack.org/#/c/79542/6/setup.cfg23:57
gyeejamielennox, I am trying to figure out how to make the client CLIs support v3 auth23:57
jamielennoxso i define 4 plugins there v2password, v3password, v2token, v3token23:57
jamielennoxand for situations where you don't care about v2 or v3 you use https://review.openstack.org/#/c/81147/23:58
jamielennoxwhich will be just 'password'23:59
gyeeI think I like the last one23:59
gyeeas it automatically discovery the proper one to use23:59
jamielennoxgyee: right, but we need to have the first ones available and have the last one a wraer around it23:59
openstackgerritBrant Knudson proposed a change to openstack/keystone: Allow configuring for un-signed revocation list  https://review.openstack.org/9272723:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!