Thursday, 2014-06-19

openstackgerritBrant Knudson proposed a change to openstack/keystone: Update sample config  https://review.openstack.org/10105800:02
openstackgerritBrant Knudson proposed a change to openstack/keystone: Document pkiz as provider in config  https://review.openstack.org/10105900:02
*** richm has left #openstack-keystone00:08
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: Imports to fix build warnings  https://review.openstack.org/9974500:12
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: Doc build fails if warnings  https://review.openstack.org/10106100:12
bknudson^ will help us keep our docstrings clean00:13
*** leseb has joined #openstack-keystone00:15
*** leseb has quit IRC00:20
*** praneshp has quit IRC00:28
*** diegows has joined #openstack-keystone00:37
jamielennoxayoung: do you have a v2 trust token handy?00:44
ayoungjamielennox, hmmm00:44
*** dims_ has quit IRC00:46
*** dims_ has joined #openstack-keystone00:48
jamielennoxayoung: guess not - i just figured you might have had one generated there that you were using for testing00:49
ayoungnah, had an 8 year old get out of bed on me00:51
ayoungthoughtthe ritual was completed00:51
ayoungjamielennox, I don't have one, but shouldn't be too hard to do00:51
jamielennoxayoung: yea, i'm pretty sure i know how to do it - but i'll have to do it manually with the client and i'm lazy00:53
ayoungshould have a script for it...let me check00:55
jamielennoxergh, can't use trust_id from the cmdline?00:59
*** dims_ has quit IRC01:05
openstackgerritA change was merged to openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/9626501:05
openstackgerritA change was merged to openstack/keystone: fix flake8 issues  https://review.openstack.org/10062801:05
openstackgerritA change was merged to openstack/keystone: Updated from global requirements  https://review.openstack.org/9907601:05
*** dims_ has joined #openstack-keystone01:07
*** diegows has quit IRC01:09
*** mberlin1 has joined #openstack-keystone01:11
*** mberlin has quit IRC01:13
jamielennoxayoung: did you find it - cause i'm getting this: http://paste.fedoraproject.org/110989/14050614/01:15
jamielennoxie, works for v3 not for v201:15
*** leseb has joined #openstack-keystone01:16
jamielennoxand i'm just wondering how long that's been the case01:16
ayoungjamielennox, what "works"01:16
ayoungor doesn't?  What am I looking at?01:17
jamielennoxsee output at the end of paste01:17
jamielennoxwhen i do the v2 i end up with an unscoped token, when i do v3 i get the trust scoped token01:17
ayoungthat top token is created with a trust?01:17
ayoungline 35?01:17
jamielennoxthe code i used is at the top01:18
ayoungDEBUG:keystoneclient.session:REQ: curl -i -X POST http://localhost:5000/v2.0/tokens -H "Content-Type: application/json" -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -d '{"auth": {"passwordCredentials": {"username": "bob", "password": "bob1"}, "trust_id": "0b16de31a8c64fd5b0054054db468a00"}}'01:18
jamielennoxyep01:19
ayoungjamielennox, I suspect the trust_id is in the wrong place in the top request, and it is getting ignored01:19
jamielennoxayoung: that means it's been broken since.... forever01:19
*** RockKuo_Office has joined #openstack-keystone01:21
*** leseb has quit IRC01:21
ayounglet me see...this is in /token/controller...01:22
ayoungtry disabling trusts and rerunning it01:23
ayoungCONF.trust.enabled01:23
ayoungit looks right01:23
*** browne has quit IRC01:24
jamielennoxAuthFailure trusts are disabled01:25
*** gokrokve has quit IRC01:25
jamielennoxoh - that's v301:25
jamielennoxno change on v201:25
jamielennoxso yes it's getting ignored01:25
*** gokrokve has joined #openstack-keystone01:25
*** dims_ has quit IRC01:26
*** dims_ has joined #openstack-keystone01:26
jamielennoxayoung: it's been a while since i've been through this code - but i don't see trust handling at all in the v2 path01:26
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/token/controllers.py#n16701:26
jamielennoxright but that's authenticate_token01:28
*** rodrigods_ has joined #openstack-keystone01:28
jamielennox        """Try to authenticate using an already existing token.01:28
ayounggit.openstack.org/cgit/openstack/keystone/tree/keystone/token/controllers.py#n167/trust01:28
ayoungjamielennox, yeah, so the old token gets validated, and it issues a new token01:28
*** gokrokve has quit IRC01:30
openstackgerritA change was merged to openstack/keystone: Properly invalidate cache for get_*_by_name methods  https://review.openstack.org/9708201:32
*** marcoemorais has quit IRC01:34
jamielennoxok, that's a bit odd and we should have a warning or something in client01:35
jamielennoxnew problems now01:36
*** dstanek_zzz is now known as dstanek01:36
jamielennoxayoung: ouch, ok that's a little bit broken01:39
jamielennoxin v3 you specify just a trust_id and it figures stuff out for you01:39
jamielennoxin v2 on the second request you need to specify the tenant that the trust is on01:40
ayoungor it just ignores it?01:41
jamielennoxayoung: so you have to do: http://paste.fedoraproject.org/110990/03142131/01:42
jamielennoxelse you get a None returned: https://github.com/openstack/keystone/blob/master/keystone/token/controllers.py#L19901:43
ayoung'{"auth": {"token": {"id": "eecfa8d90c99444c878d552e37455b2d"}, "tenantName": "demo", "trust_id": "0b16de31a8c64fd5b0054054db468a00"}}'01:43
jamielennoxif tenantId and tenantName are both None here: https://github.com/openstack/keystone/blob/master/keystone/token/controllers.py#L330-L347 you get a None back01:43
ayoungthat should probably be in the else block above01:44
jamielennoxanyway it kind of answers my question, trustor_user_id and impersonation values are not available in the returned v2 token01:46
*** CC has joined #openstack-keystone01:47
*** CC has joined #openstack-keystone01:47
ayoungthat is a bug01:48
*** hrybacki has quit IRC01:48
*** diegows has joined #openstack-keystone01:49
*** CC has left #openstack-keystone01:49
jamielennoxit returns trustee_user_id - but that's kind of useless because trustee_user_id == user_id01:50
jamielennoxok, want me to file that01:52
morganfainberghuh... wtf os x wont let me install passlib from pip now.01:52
morganfainbergayoung, did you see https://bugs.launchpad.net/keystone/+bug/1331406 ?01:53
ayoungjamielennox, yes, please01:53
uvirtbotLaunchpad bug 1331406 in horizon "can not login to Dashboard on devstack" [Critical,Confirmed]01:53
morganfainbergayoung, before i dive in, making sure we're not duplicating work.01:53
ayoung check_for_test_cookie is deprecated; ensure your login view is CSRF-protected.  ?01:54
ayoungah PKIZ01:54
morganfainbergayoung, aparantly this worked prior to PKIZ becomeing default01:54
ayoungnope, just saw it01:54
morganfainbergayoung, ok i can take a look (still have the PKIZ debug devstack near ready)01:54
* morganfainberg finishes running a test run for backport of the cache-invalidate code.01:55
morganfainbergi think i need to setup a local http cache for things like pypi01:56
jamielennoxayoung: https://bugs.launchpad.net/keystone/+bug/133188201:56
uvirtbotLaunchpad bug 1331882 in keystone "trustor_user_id not available in v2 trust token" [Undecided,New]01:56
ayoungmorganfainberg, guessing they are doing something funny with the token01:56
morganfainbergayoung, i'm sure it's something like that01:56
* morganfainberg looks athow much a small home server will cost.01:56
ayoungbuild it yourself!01:56
morganfainbergayoung, depends on if the corp discount brings it to < build it myself + pain and suffering :P01:57
morganfainbergayoung, but i am looking on newegg right now for parts :P01:57
ayounghttp://rwmj.wordpress.com/2014/04/17/caseless-virtualization-cluster-part-4/  morganfainberg01:57
ayounghttp://rwmj.wordpress.com/2014/04/16/caseless-virtualization-cluster-part-2/01:58
morganfainberginteresting01:58
ayoungTOTAL PRICE OF CLUSTER £130001:58
dstanekmorganfainberg: small home server? you work in the cloud :-)01:58
morganfainbergdstanek, doesn't make pypi more reliable... or apt01:59
morganfainbergdstanek, something i can locally cache/sync that for would be useful (and i don't have a few TB of space in my laptop to do it)01:59
*** gokrokve has joined #openstack-keystone01:59
ayoungmorganfainberg, I just bought a $300 Dell system for family use.  I suspect you would only need something like that01:59
morganfainbergayoung, thats kindof my thought01:59
morganfainbergayoung, going to look at the HP things i can buy.02:00
ayoungOh, sure, be that way02:00
* ayoung might try to funnel some machines through morganfainberg 02:00
morganfainbergayoung, :P02:00
morganfainbergayoung, LOL02:01
morganfainbergyeah some silly low power processor with fast storage and decent nic. 4-8gb of ram. shouldn't be hard to spec out02:01
morganfainbergthen the question is... Fedora or ubuntu02:01
dstanekWindows XP02:02
ayoungdstanek, Win8 these days02:03
ayounghttp://www.amazon.com/gp/product/B00HWML468/ref=oh_details_o04_s00_i00?ie=UTF8&psc=102:03
*** praneshp has joined #openstack-keystone02:04
ayounghttp://www.amazon.com/HP-EX485-MediaSmart-Home-Server/dp/B001OI2ZG4/ref=sr_1_2?s=electronics&ie=UTF8&qid=1403143457&sr=1-2&keywords=hp+home+server  looks like a comparable, but not as sleek02:04
ayoungmorganfainberg, the only thing I would make sure is that whatever CPU you get is 64bit with virtualization extensions.02:05
ayoungAnd that is most these days02:05
*** praneshp_ has joined #openstack-keystone02:07
morganfainbergayoung, yeah i was thinking looking for something w/ haswell02:08
morganfainbergayoung, i think those all have xvir and are 64bit02:08
*** rodrigods_ has quit IRC02:09
bknudsonI got this little diskstation thing that's worked well02:10
*** praneshp has quit IRC02:10
*** praneshp_ is now known as praneshp02:10
morganfainbergbknudson, ah thats an idea.02:10
bknudsonsynology ds411slim02:10
*** diegows has quit IRC02:12
morganfainbergayoung, http://httpstatusdogs.com/02:12
morganfainbergi like HTP 444 the best of those02:13
morganfainbergthough 420 is good02:13
ayoung++02:14
*** leseb has joined #openstack-keystone02:17
morganfainbergayoung, if you have a chance to +1 this https://review.openstack.org/#/c/95987/ [split repo] that would be great. or comment otherwise on it. since it was originally yours ;)02:17
ayoungmorganfainberg, what are we doing about circular?02:18
morganfainbergayoung, freeze the stuff in keystoneclient and all new work goes in middleware02:19
morganfainbergayoung, no circular deps in keystone -> middleware02:19
ayoungmorganfainberg, and we work splitbrain?02:19
morganfainbergayoung, keystoneclient middleware is moved to security maintenance only02:19
ayoungOK02:20
morganfainbergayoung, unless it's a security fix, no new code02:20
ayoungmorganfainberg, is that in there?02:20
morganfainbergayoung, yep02:20
jamielennoxmorganfainberg: this seems like the time to get rid of all those things we've tried to deprecate02:20
ayoungah...see it now02:20
ayoungjamielennox, +++++02:20
morganfainbergjamielennox, that is something i'm totally game to do02:20
jamielennoxmorganfainberg: sweet02:21
bknudsonit still needs to be backwards compatible02:21
morganfainbergbknudson, ++02:21
morganfainbergjamielennox, ^02:21
ayoungbknudson, to a degree, but all the internal auth_token functions should be hidden away02:21
bknudsonshould be able to switch from keystoneclient auth_token to middleware auth_token02:21
jamielennoxbknudson: why?02:21
jamielennoxbknudson: says who?02:21
morganfainbergbut i tried to keep it as non-specific as possible to avoid concerns of internal mechanisms, as long as it provides the same output from the input i don't really care what it looks like02:22
*** leseb has quit IRC02:22
morganfainbergjamielennox, same input should = same output to the underlying service02:22
morganfainbergjamielennox, but however the internal stuff works... is very up in the air.02:22
bknudsonwhat are we proposing to remove?02:22
jamielennoxmorganfainberg: sure - but we can change for example the config opts02:22
morganfainbergjamielennox, absolutely.02:22
bknudsonoh, the uri config02:23
jamielennoxbknudson: that's an example02:23
jamielennoxbut there's a lot of cruft in there02:23
morganfainbergjamielennox, we might need some compat in there , but largely we should be able to mitigate some cruft02:23
morganfainbergjamielennox, s/some/a lot/02:24
morganfainbergthere was a reason i specifed the initial release was going to be 1.0.0 of the middleware02:25
openstackgerritLi Ma proposed a change to openstack/keystone: Fix the typo and reformat the comments for the added option  https://review.openstack.org/9894202:25
morganfainbergayoung, /me is not looking forward to running havana tests :(02:29
ayoungmorganfainberg, for what?02:29
morganfainbergrunning master tests has spoiled me enough as is compared to even icehouse02:29
ayoungmiddleware should be Juno forward02:30
morganfainbergayoung, backport of the get_by_name cache invalidation bug02:30
ayoungah02:30
ayoungyeah...run_tests.sh for grizzly just now02:30
morganfainberghas to go back to H :(02:30
morganfainbergwell.. should go back to H02:30
ayounghad to remember to do the ramdisk hack02:30
morganfainbergoh i need to check on tox stuffs see if we're moving to newer tox yet02:30
morganfainbergi want to make our run_tests 100% a wrapper for tox, but can't w/o removing the --fast-fail option02:31
*** openstackgerrit_ has joined #openstack-keystone02:35
ayoungmorganfainberg, OK, think I reproduced the bug02:36
ayounghttps://bugs.launchpad.net/keystone/+bug/133140602:36
uvirtbotLaunchpad bug 1331406 in horizon "can not login to Dashboard on devstack" [Critical,Confirmed]02:36
morganfainbergayoung, ah cool sorry was waiting for this test run to finish before resetting my devstack02:37
ayoungmorganfainberg, devstack is still running, but horizon and glance are up02:37
ayoungI can get a token02:37
ayoung PKIZ_eJy1WEl3m8wS02:37
ayoungand I can glance image-list02:37
ayoungmorganfainberg, maybe not...glance setup is still progressing, downloading images, so no nova yet.  That might have been what failed...02:40
*** nsquare has joined #openstack-keystone02:41
ayoungmorganfainberg, wonder if it is a case of updateing keystone but not keystoneclient02:41
ayounghttp://fhornain.wordpress.com/2014/06/18/red-hat-to-acquire-enovance-a-leader-in-openstack-integration-services/02:42
ayoungwell well02:42
ayoungwhat do they do anyway?02:42
morganfainbergoh enovance02:43
morganfainbergcool.02:43
morganfainbergi think they're a competitor to like mirantis and metacloud, primairly focused on EU02:44
morganfainbergsmart folks over there02:44
ayoungcool.  does this mean I can stop looking at Ruby on rails code?02:44
morganfainbergLOL02:45
morganfainbergask chmouel, i think he's from enovance02:45
ayoungOooh,  if we got him, it was probably worth the purchase price02:46
morganfainberghmm... openstackgerrit *poke*02:47
morganfainbergok whatever.02:47
ayoungyeah, we got him!02:47
ayoungare they a services company?  Very little on their Pod thingy02:48
morganfainbergEnterprise Services / integration i think02:50
*** yfujioka has quit IRC02:50
ayoungYeah, even the Pod is a reference architecture...which sounds non-producty to me02:50
morganfainbergbased on what i know, good accquisition02:50
* ayoung still going to have to work with rails02:50
ayoung"For Red Hat, the acquisition kills two birds with one stone. First and foremost, bringing eNovance into the fold puts it in a better position to monetize OpenStack with a more comprehensive consultancy offering. And second, the deal buys it an expanded foothold in Europe, which has historically trailed behind the U.S. in technology adoption but is nonetheless witnessing rising interest in the cloud platform."02:50
morganfainbergah well02:50
morganfainbergcould be worse02:50
ayounghttp://siliconangle.com/blog/2014/06/18/red-hat-continues-openstack-push-with-latest-acquisition/?angle=silicon02:51
morganfainbergthe latter part i think is the big big win.02:51
morganfainbergyou could perform the former in a number of ways02:51
ayoungtaking a redicyouless amount of time to download the Fedora image.  Only 204M...18 minutes to go02:54
morganfainbergouch02:55
morganfainbergrestacking to try this out btw as well.02:55
morganfainbergthe bug ^02:55
morganfainberghad some cruft in my devstack02:56
ayoung eta 14m 9s02:57
ayounglet me take a look at the horizon auth code02:58
*** ncoghlan has joined #openstack-keystone02:58
morganfainbergwhy so slow download?02:58
*** nkinder_ has quit IRC02:58
morganfainbergthat django auth thing02:58
*** nkinder_ has joined #openstack-keystone02:59
ayoungquestion is what do they do with the token.  Yeah, might be that external library02:59
morganfainbergwell that was easy to duplicate03:00
*** gokrokve has quit IRC03:00
ayoungjamielennox, want to make the world a better place?   convert django_openstack_auth to using sessions03:01
morganfainbergayoung, so... changing the provider to PKI made it work again03:03
*** oomichi has quit IRC03:03
ayoungmorganfainberg, yeah, no surprise...question is "why"03:03
morganfainbergi'll bet.. sec03:04
jamielennoxayoung: there is a problem with using sessions in keystoneclient that i haven't fixed yet that has kind of prevented me doing that03:04
ayoungI see that glance can handle the tokens, so it isn't just auth_token type stuff03:04
ayoungjamielennox, I need that for the Kerberos work.  What is the problem and can Ihelp03:04
jamielennoxayoung: there are a couple of functions like changing your own password that call back to the client object to figure out the current user_id03:06
jamielennoxwhen you use the session that value isn't updated03:06
jamielennoxin the same way if you use a token directly there there is no value03:06
ayoungjamielennox, its in the token body.  So same issue as morganfainberg is dealing with for tracking?03:06
morganfainbergayoung, i think they are calling https://github.com/openstack/django_openstack_auth/blob/master/openstack_auth/utils.py#L8303:06
morganfainbergayoung, and well it's not the keystoneclient "one"03:07
morganfainbergso no PKIZ allowed03:07
ayoungmonkeys03:07
ayoungcowboys03:07
jamielennoxayoung: it's the reason for https://review.openstack.org/#/c/97681/3/keystoneclient/httpclient.py line 6903:07
ayoungbillions of blue blistering barnacles03:07
morganfainbergayoung, oh and they force a short-hash03:08
jamielennoxnobody has noticed this yet - and i haven't filed it - but if it's used for horizon they will03:08
morganfainbergayoung this would break if they used the configurable hash bknudson setup i think03:08
ayoungmorganfainberg, maybe, but I think they just use it to stash in memcached and the session03:08
morganfainbergthey explicitly hash to MD503:08
morganfainbergayoung, maybe03:09
morganfainbergayoung, anyway...03:09
morganfainbergthis is not a keystone bug it's a django_openstack_auth bug.03:09
morganfainbergayoung, hmm.03:10
morganfainbergayoung, maybe not /me keeps digging03:10
ayoungmorganfainberg, looks like it03:11
*** jcromer has quit IRC03:14
ayoungmorganfainberg, good for me to get some work in on this, as I need to contributee the kerberos fix here eventually03:14
morganfainbergayoung, ++ i'm still digging to see where exactly it's falling over03:14
morganfainbergbut we're on the right path03:14
morganfainbergit makes a _lot_ of assumptions here03:14
ayoungmorganfainberg, probably just that it is failing the "is asn1" tests an so not getting hashed03:15
morganfainbergmaybe03:16
ayoungPKIZ  != MII03:16
morganfainbergand i think i just confirmed this is going to fail if you hash with something other than MD503:16
ayoung        if utils.is_asn1_token(self.id):03:16
ayoung            self.id = hashlib.md5(self.id).hexdigest()03:17
morganfainbergyeah and it passed that token_id through03:17
ayoungthey hash to stick in memcached.03:17
ayoungthat is not exposed outside of horizon03:17
morganfainberghmm03:17
*** leseb has joined #openstack-keystone03:17
morganfainbergis this failing to write to the session because the key is too big then?03:19
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add trust users to AccessInfo and fixture  https://review.openstack.org/10073303:19
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Revocation event API  https://review.openstack.org/8116603:19
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add role ids to the AccessInfo  https://review.openstack.org/10077403:19
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add issued handlers to auth_ref and fixtures  https://review.openstack.org/10077503:19
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add OAuth data to AccessInfo  https://review.openstack.org/10077603:19
ayoungmorganfainberg, I've got a fix03:20
jamielennoxayoung: i just pushed revocation events to the end of that stack ^03:22
morganfainbergayoung, yeah i just changed it to always hash the id. it worked.03:23
morganfainbergayoung, ok i'm going to set this as invalid in keystone in LP.03:23
*** leseb has quit IRC03:23
ayoungjamielennox, I am in your debt.  I assume you can be paid off in alcohol?03:23
jamielennoxayoung: always03:23
ayoungI would say beer, but since next we meet in Paris...03:23
ayoungmorganfainberg, needs to only hash if the id is longer than...some threshold03:24
ayoungmaybe  64 chars?03:24
morganfainbergayoung, uh, go with 32 to be safe03:24
morganfainbergif it isn't a uuid, hash03:24
ayoungmorganfainberg, nah, its cookie length03:24
morganfainbergayoung, ok03:24
ayoungI think they can be 4k,  so 64 bytes should be OK as a cutoff.  But, what do we want to do for a hashing algorithm?03:25
ayoungShould I modify that now, too?03:25
ayoungsha256?03:26
ayounghow long is that?03:26
ayoung256?03:26
morganfainbergsha256 is 6403:26
morganfainbergprobably should use a "safe" hashing algo.03:27
morganfainbergok marked as invalid against keystone, and tagged to django-openstack-auth project03:27
*** rwsu has quit IRC03:27
ayoungsha256 it is03:30
ayoung        if len(self.id) > 64:03:30
ayoung            self.id = hashlib.sha256(self.id).hexdigest()03:30
ayoungmorganfainberg, OK, so django_openstack_auth ... how do I submit a patch to that?  Git hub pull request?03:31
morganfainberglooking03:31
morganfainbergayoung, it has a .gitreview file03:32
morganfainberglooks like gerrit03:32
*** dims_ has quit IRC03:32
*** gokrokve has joined #openstack-keystone03:33
*** zhiyan_ is now known as zhiyan03:34
*** gokrokve_ has joined #openstack-keystone03:36
*** gokrokve has quit IRC03:39
*** gyee has quit IRC03:41
ayoungjamielennox, what is keystoneclient.access.AccessInfo.factory(03:47
ayoungand why is it producing a token03:47
jamielennoxAccessInfo is the client abstraction between v2 and v3 tokens03:47
jamielennoxfactory just means check if it's v2 or v3 and create the appropriate object03:47
morganfainbergjamielennox, was told in -infra there might be some httpretty issues going on03:49
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Only emit disable notifications for project/domain on disable  https://review.openstack.org/9956903:51
ayoungmorganfainberg, https://bugs.launchpad.net/keystone/+bug/1331406  patch attached...I'm headed to bed03:52
uvirtbotLaunchpad bug 1331406 in horizon "can not login to Dashboard on devstack" [Critical,Confirmed]03:52
morganfainbergayoung, sumitted to gerrit?03:53
morganfainbergayoung, looks to be a gerrit review workflow03:53
morganfainbergayoung, i can submit [obv. keep your name on it as author] if you're really off to bed03:54
*** serverascode has quit IRC03:59
*** stevemar has joined #openstack-keystone03:59
*** ctracey has quit IRC04:00
morganfainbergayoung, https://review.openstack.org/#/c/10108904:02
*** serverascode has joined #openstack-keystone04:02
*** ctracey has joined #openstack-keystone04:03
*** jraim has quit IRC04:05
*** jraim has joined #openstack-keystone04:07
*** dtroyer_zz has quit IRC04:12
*** dims_ has joined #openstack-keystone04:16
*** leseb has joined #openstack-keystone04:18
*** dims_ has quit IRC04:20
*** leseb has quit IRC04:24
*** dstanek is now known as dstanek_zzz04:45
*** dims_ has joined #openstack-keystone04:46
*** henrynash has joined #openstack-keystone04:46
* morganfainberg should really go to bed...04:47
*** dims_ has quit IRC04:51
*** stevemar has quit IRC04:53
*** xianghui^ has quit IRC04:55
openstackgerritA change was merged to openstack/keystone: Fix the typo and reformat the comments for the added option  https://review.openstack.org/9894205:06
*** xianghui^ has joined #openstack-keystone05:08
*** leseb has joined #openstack-keystone05:19
*** leseb has quit IRC05:23
*** ajayaa has joined #openstack-keystone05:36
*** dims_ has joined #openstack-keystone05:47
*** dims_ has quit IRC05:51
*** harlowja is now known as harlowja_away05:54
*** morganfainberg has quit IRC05:57
*** morganfainberg has joined #openstack-keystone05:58
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/9700506:00
*** xianghui^ has quit IRC06:04
*** pheadron has joined #openstack-keystone06:05
*** xianghui^ has joined #openstack-keystone06:17
*** pheadron has quit IRC06:19
*** leseb has joined #openstack-keystone06:20
*** andreaf has joined #openstack-keystone06:22
*** leseb has quit IRC06:24
*** henrynash has quit IRC06:26
*** ncoghlan is now known as ncoghlan_afk06:38
*** ncoghlan_afk is now known as ncoghlan06:45
*** dims_ has joined #openstack-keystone06:47
*** dims_ has quit IRC06:52
*** marekd|away is now known as marekd06:55
*** leseb has joined #openstack-keystone06:56
*** afazekas is now known as __afazekas07:00
*** i159 has joined #openstack-keystone07:02
*** andreaf has quit IRC07:03
*** mhu has quit IRC07:03
*** mhu has joined #openstack-keystone07:03
*** gokrokve_ has quit IRC07:05
*** BAKfr has joined #openstack-keystone07:07
*** gokrokve has joined #openstack-keystone07:15
*** ajc_ has joined #openstack-keystone07:17
*** gokrokve has quit IRC07:19
*** baffle_ has joined #openstack-keystone07:24
openstackgerritMarek Denis proposed a change to openstack/python-keystoneclient: Scope unscoped saml2 tokens.  https://review.openstack.org/9970407:26
*** arunkant has quit IRC07:27
*** baffle has quit IRC07:27
*** arunkant has joined #openstack-keystone07:29
*** gokrokve has joined #openstack-keystone07:35
*** afazekas_ has joined #openstack-keystone07:40
*** gokrokve has quit IRC07:40
*** afazekas_ is now known as afazekas07:42
openstackgerritMarek Denis proposed a change to openstack/python-keystoneclient: Rename v3._AuthConstructor to v3.AuthConstructor  https://review.openstack.org/10112707:46
*** dims_ has joined #openstack-keystone07:48
*** dims_ has quit IRC07:54
*** chandan_kumar has quit IRC08:01
*** ncoghlan is now known as ncoghlan_afk08:02
openstackgerritMarek Denis proposed a change to openstack/python-keystoneclient: Add CRUD operations for Federated Protocols.  https://review.openstack.org/8382908:10
*** gokrokve has joined #openstack-keystone08:27
*** gokrokve has quit IRC08:32
*** henrynash has joined #openstack-keystone08:33
*** andreaf has joined #openstack-keystone08:37
*** xianghui^ has quit IRC08:45
*** dims_ has joined #openstack-keystone08:51
*** dims_ has quit IRC08:55
*** openstackgerrit has quit IRC09:14
*** fmarco76 has joined #openstack-keystone09:21
*** henrynash has quit IRC09:25
*** xianghui^ has joined #openstack-keystone09:28
*** gokrokve has joined #openstack-keystone09:28
*** fmarco76 has quit IRC09:32
*** gokrokve has quit IRC09:33
*** dims_ has joined #openstack-keystone09:52
*** oomichi has joined #openstack-keystone09:54
*** dims_ has quit IRC09:57
*** nsquare has quit IRC09:57
*** praneshp has quit IRC10:12
*** Ju_ has joined #openstack-keystone10:24
*** leseb has quit IRC10:25
*** gokrokve has joined #openstack-keystone10:29
*** gokrokve_ has joined #openstack-keystone10:31
*** gokrokve has quit IRC10:33
*** gokrokve_ has quit IRC10:35
*** ajayaa has quit IRC10:51
*** dims_ has joined #openstack-keystone10:52
*** zhiyan is now known as zhiyan_10:57
*** dims_ has quit IRC10:57
*** ajayaa has joined #openstack-keystone11:09
*** leseb has joined #openstack-keystone11:11
*** leseb has quit IRC11:15
*** dims_ has joined #openstack-keystone11:18
*** oomichi has quit IRC11:20
*** lbragstad has quit IRC11:23
*** leseb has joined #openstack-keystone11:28
*** gokrokve has joined #openstack-keystone11:32
*** RockKuo_Office has quit IRC11:35
*** gokrokve has quit IRC11:37
*** beav has quit IRC11:49
*** ajc_ has quit IRC11:50
*** ajc_ has joined #openstack-keystone11:50
*** dims_ has quit IRC11:54
*** ajc_ has quit IRC11:55
*** hrybacki has joined #openstack-keystone12:03
*** hrybacki has quit IRC12:03
*** hrybacki has joined #openstack-keystone12:04
*** juanmo has joined #openstack-keystone12:07
*** afazekas_ has joined #openstack-keystone12:08
*** afazekas has quit IRC12:09
*** jamielennox is now known as jamielennox|away12:18
*** ayoung has quit IRC12:20
*** wyllys has joined #openstack-keystone12:26
*** gokrokve has joined #openstack-keystone12:32
*** gokrokve has quit IRC12:37
*** erecio has joined #openstack-keystone12:44
*** henrynash has joined #openstack-keystone12:44
*** andreaf has quit IRC12:46
*** henrynash has quit IRC12:46
*** ozialien has quit IRC12:47
*** henrynash has joined #openstack-keystone12:48
*** afazekas_ has quit IRC12:58
ajayaaHi. How do I run unit tests in python-keystoneclient?13:00
ajayaatox -epy27 keystoneclient.tests fails with "ERROR:   py27: could not install deps"13:02
*** gordc has joined #openstack-keystone13:02
ajayaamarekd,13:03
marekdajayaa: hi13:03
ajayaamarekd, how are you running unit tests in python-keystoneclient13:04
ajayaa?13:04
marekdajayaa: regarding your question try tox with -r switch13:04
marekdtox -re py2713:04
marekdit will  try to reinstall the environment.13:04
*** afazekas_ has joined #openstack-keystone13:06
ajayaait fails with "IOError: [Errno 2] No such file or directory: '/home/aj/stack/python-keystoneclient/.tox/py27/build/httpretty/readme.rst'"13:07
marekdajayaa: did you try -r ?13:08
ajayaayes13:08
ajayaasame issue.13:08
marekdlet me try locally.13:08
marekdafter rebuilding the env i get the same error.13:09
ajayaadeleted .tox directory and tried. But same issue again13:09
marekdlooks like probmen with httpretty version.13:10
marekdyou can try using older version of httpretty13:10
ajayaayep.13:10
marekdso edit requirements.txt file.13:10
marekdand file a bug if nobody hasn't already done that.13:10
ajayaaI think test-requirements.txt13:10
ajayaa:)13:10
marekd...yes one of those files.13:11
*** richm has joined #openstack-keystone13:20
*** andreaf has joined #openstack-keystone13:24
*** joesavak has joined #openstack-keystone13:26
marekdajayaa: let me know if older version of httpretty works.13:29
*** gokrokve has joined #openstack-keystone13:33
ajayaamarekd: https://github.com/gabrielfalcao/HTTPretty/pull/17513:36
*** Gippa has joined #openstack-keystone13:37
ajayaamarekd, https://github.com/gabrielfalcao/HTTPretty/pull/17513:37
*** gokrokve has quit IRC13:37
*** raildo has joined #openstack-keystone13:39
*** d0ugal has quit IRC13:39
*** d0ugal_ has joined #openstack-keystone13:39
*** d0ugal_ is now known as d0ugal13:40
marekdajayaa: thanks.13:44
*** anteaya has quit IRC13:51
*** anteaya has joined #openstack-keystone13:53
*** zhiyan_ is now known as zhiyan13:54
*** stevemar has joined #openstack-keystone13:57
*** ayoung has joined #openstack-keystone14:03
*** ajayaa has quit IRC14:04
*** gokrokve has joined #openstack-keystone14:04
*** amirosh has joined #openstack-keystone14:10
*** dstanek_zzz is now known as dstanek14:11
*** ajayaa has joined #openstack-keystone14:16
*** topol has joined #openstack-keystone14:19
*** Gippa has quit IRC14:24
*** bklei has joined #openstack-keystone14:27
nkinder_morganfainberg: is there a review for adding a tracking id to tokens yet?14:29
*** dstanek is now known as dstanek_zzz14:30
*** rwsu has joined #openstack-keystone14:34
*** dstanek_zzz is now known as dstanek14:35
*** dims has joined #openstack-keystone14:37
*** ajayaa has quit IRC14:43
*** afazekas_ has quit IRC14:50
*** dstanek is now known as dstanek_zzz14:52
morganfainbergnkinder_, there is not14:55
nkinder_morganfainberg: ok, I'm not blind then :)14:55
morganfainbergnkinder_, nope,just the initial ksc work to redact / add the tracking id14:55
*** ajayaa has joined #openstack-keystone14:56
nkinder_morganfainberg: yeah, I saw that one14:57
morganfainbergnkinder_, the rough part is that it'll need to be a new keystoneclient release to get that out there in either case.14:58
morganfainbergand there are some other change that should likely go in as well redacting other information, jamielennox|away has more specifics.14:58
*** dtroyer has joined #openstack-keystone14:59
*** joesavak has quit IRC15:01
*** jsavak has joined #openstack-keystone15:01
*** david-lyle has joined #openstack-keystone15:02
*** david-lyle has quit IRC15:03
*** david-lyle has joined #openstack-keystone15:04
*** ajayaa has quit IRC15:05
stevemarmarekd, ping15:10
marekdstevemar: hey there.15:10
boris-42morganfainberg hi there15:10
marekdi think i might have fixed the ports problem...15:10
morganfainbergboris-42, hello!15:10
stevemarmarekd, so about this non standard port15:10
boris-42morganfainberg one question keystone v2 is deprecateted?15:10
stevemarmarekd, oh?15:10
boris-42morganfainberg I mean everybody should switch to v3 ?15:10
morganfainbergboris-42, V2 is not deprecated.15:11
marekdstevemar: iam stuck at the meeting and was almost done on my other machine just beforehand15:11
boris-42morganfainberg oh so15:11
morganfainbergboris-42, we do want everyone on v315:11
marekdlet me get back to the office, try it out again and then i will reply you.15:11
hrybackiAre all of the tempest tests for keystone contained within .../tempest/api/identity ?15:11
boris-42morganfainberg so I mean it's hard in rally to support both without nasty code15:11
morganfainbergboris-42, but until everyone can support V3 we can't deprecate v215:11
stevemarmarekd, ok :)15:11
morganfainbergboris-42, V3 is where any/all new development goes15:11
marekdstevemar: we had a openstack summit summary here, so others can also feel the spirit :-)15:12
boris-42morganfainberg yep15:12
morganfainbergboris-42, and everyone should be moving to V3 if at all possible.15:12
boris-42morganfainberg so it soft deprecation15:12
morganfainbergyeah, the official stance is v2 will not receive any updates unless it's for V2 -> V3 interop/migration support15:12
morganfainbergs/official/as official as we can make it/15:13
boris-42morganfainberg ok thanks for help15:13
morganfainbergboris-42, sure thing15:13
morganfainbergboris-42, also soon apache gate! very soon, i can taste it15:13
stevemarmarekd, I like this new intern news!15:13
marekdstevemar: ah yeah...15:13
stevemarmarekd, TEST ALL THE IDPS15:14
marekdstevemar: sth like that...15:14
boris-42morganfainberg nice!!15:14
boris-42morganfainberg I hope to see better graph!=)15:14
marekdstevemar: i don't see any other way than seting them up ;/15:14
marekdstevemar: let's see how it all works when he is here....15:15
morganfainbergboris-42, yeah the only thing that doesn't _really_ work at the moment is the grenade upgrade15:15
marekdBTW are we still failing all python-keystoneclient tests due to httpretty bug?15:16
morganfainbergboris-42, but if you wanted to check out the graph yourself, you could use https://review.openstack.org/#/c/100747/15:16
morganfainbergmarekd, not sure where we stand on that.15:16
morganfainberglooks like it15:17
boris-42morganfainberg so apache will be in default gate?15:17
morganfainbergthis is an upstream httpretty (new version) issue15:17
marekdmorganfainberg: :( is rollbacking to the older version works as a local workaround?15:17
boris-42morganfainberg great so we won't need to change anything15:17
morganfainbergboris-42, yes.15:17
boris-42in rally job for keystone15:17
boris-42and we will be able to compare instantly before/after=)15:18
morganfainbergmarekd, yeah that should work locally, going to go poke global requirments i think today unless jamielennox|away is doing something else.15:18
morganfainbergboris-42, yep.15:18
marekdmorganfainberg: thanks.15:18
morganfainbergin face https://review.openstack.org/#/c/101214/15:19
morganfainbergfact*15:19
*** ajayaa has joined #openstack-keystone15:22
*** Gippa has joined #openstack-keystone15:28
*** ajayaa has quit IRC15:31
*** Ju_ has quit IRC15:36
*** amirosh has quit IRC15:38
*** Gippa has quit IRC15:42
*** nsquare has joined #openstack-keystone15:45
*** lbragstad has joined #openstack-keystone15:48
marekdstevemar: ok, replied with configs.15:53
marekdstevemar: let me know if it works, ok?15:53
*** ncoghlan_afk is now known as ncoghlan15:59
*** joesavak has joined #openstack-keystone16:01
*** wyllys has quit IRC16:01
*** jsavak has quit IRC16:03
marekddstanek_zzz: something you asked for: https://review.openstack.org/#/c/101127/16:03
marekdjamielennox|away: ^^ you may want to take a look as well.16:04
*** david-lyle has quit IRC16:04
*** marcoemorais has joined #openstack-keystone16:06
*** BAKfr has quit IRC16:06
*** david-lyle has joined #openstack-keystone16:07
*** packet has joined #openstack-keystone16:09
*** ncoghlan is now known as ncoghlan_afk16:09
stevemarmarekd, thx dude16:18
*** __afazekas is now known as afazekas16:22
*** wyllys has joined #openstack-keystone16:33
*** amirosh has joined #openstack-keystone16:45
*** gokrokve has quit IRC16:49
*** nsquare has quit IRC16:49
*** gyee has joined #openstack-keystone16:51
*** joesavak has quit IRC16:53
*** zhiyan is now known as zhiyan_16:54
*** KanagarajM has joined #openstack-keystone16:57
*** hrybacki_ has joined #openstack-keystone17:03
*** KanagarajM has quit IRC17:03
*** david-lyle has quit IRC17:03
*** david-lyle has joined #openstack-keystone17:05
*** harlowja_away is now known as harlowja17:05
*** hrybacki has quit IRC17:06
*** rodrigods_ has joined #openstack-keystone17:07
*** hrybacki_ has quit IRC17:07
*** amirosh has quit IRC17:11
*** nsquare has joined #openstack-keystone17:14
*** richm has quit IRC17:15
*** amirosh has joined #openstack-keystone17:15
*** gokrokve has joined #openstack-keystone17:18
*** amirosh has quit IRC17:19
*** i159 has quit IRC17:21
*** hrybacki has joined #openstack-keystone17:22
*** amirosh has joined #openstack-keystone17:23
*** gordc has quit IRC17:29
*** praneshp has joined #openstack-keystone17:30
*** richm has joined #openstack-keystone17:32
*** KanagarajM has joined #openstack-keystone17:32
*** thedodd has joined #openstack-keystone17:35
*** richm has quit IRC17:36
*** richm has joined #openstack-keystone17:38
*** KanagarajM has quit IRC17:51
*** rodrigods_ has quit IRC17:55
*** gordc has joined #openstack-keystone17:56
*** doddstack has joined #openstack-keystone17:59
*** thedodd has quit IRC18:00
*** andreaf_ has joined #openstack-keystone18:05
ayounggyee, morganfainberg, dstanek_zzz https://review.openstack.org/#/c/95989/   can we get that one through please?  Lot of work queued up behind it18:08
*** david-lyle has quit IRC18:08
*** lbragstad has quit IRC18:08
*** dims has quit IRC18:08
*** bklei has quit IRC18:08
*** rodrigods has quit IRC18:08
*** amerine has quit IRC18:08
*** gokrokve has quit IRC18:08
*** gyee has quit IRC18:08
*** andreaf has quit IRC18:08
*** tellesnobrega has quit IRC18:08
*** jdennis has quit IRC18:08
*** rushiagr has quit IRC18:08
*** hrybacki has quit IRC18:08
*** marcoemorais has quit IRC18:08
*** mhu has quit IRC18:08
*** harlowja has quit IRC18:08
*** mgagne has quit IRC18:08
*** dolphm has quit IRC18:08
*** zigo has quit IRC18:08
*** Ephur has quit IRC18:08
*** zhiyan_ has quit IRC18:08
*** chmouel has quit IRC18:08
*** shufflebot has quit IRC18:08
*** uvirtbot has quit IRC18:08
*** rodrigods_ has joined #openstack-keystone18:10
*** hrybacki has joined #openstack-keystone18:10
*** gokrokve has joined #openstack-keystone18:10
*** david-lyle has joined #openstack-keystone18:10
*** gyee has joined #openstack-keystone18:10
*** marcoemorais has joined #openstack-keystone18:10
*** lbragstad has joined #openstack-keystone18:10
*** dims has joined #openstack-keystone18:10
*** bklei has joined #openstack-keystone18:10
*** mhu has joined #openstack-keystone18:10
*** rodrigods has joined #openstack-keystone18:10
*** Ephur has joined #openstack-keystone18:10
*** tellesnobrega has joined #openstack-keystone18:10
*** amerine has joined #openstack-keystone18:10
*** harlowja has joined #openstack-keystone18:10
*** mgagne has joined #openstack-keystone18:10
*** jdennis has joined #openstack-keystone18:10
*** rushiagr has joined #openstack-keystone18:10
*** dolphm has joined #openstack-keystone18:10
*** uvirtbot has joined #openstack-keystone18:10
*** chmouel has joined #openstack-keystone18:10
*** shufflebot has joined #openstack-keystone18:10
*** zigo has joined #openstack-keystone18:10
*** zhiyan_ has joined #openstack-keystone18:10
*** dickson.freenode.net sets mode: +o dolphm18:10
*** jraim has quit IRC18:12
*** jraim has joined #openstack-keystone18:12
*** jraim has quit IRC18:12
*** jraim has joined #openstack-keystone18:12
*** gyee has quit IRC18:12
*** joesavak has joined #openstack-keystone18:13
*** thiagop has joined #openstack-keystone18:13
*** david-lyle has quit IRC18:14
*** lbragstad has quit IRC18:14
*** dims has quit IRC18:14
*** bklei has quit IRC18:14
*** rodrigods has quit IRC18:14
*** amerine has quit IRC18:14
*** rodrigods_ has quit IRC18:14
*** gokrokve has quit IRC18:14
*** tellesnobrega has quit IRC18:14
*** jdennis has quit IRC18:14
*** rushiagr has quit IRC18:14
*** hrybacki has quit IRC18:14
*** marcoemorais has quit IRC18:14
*** mhu has quit IRC18:14
*** harlowja has quit IRC18:14
*** mgagne has quit IRC18:14
*** dolphm has quit IRC18:14
*** zigo has quit IRC18:14
*** Ephur has quit IRC18:14
*** zhiyan_ has quit IRC18:14
*** chmouel has quit IRC18:14
*** shufflebot has quit IRC18:14
*** uvirtbot has quit IRC18:14
*** rodrigods_ has joined #openstack-keystone18:16
*** hrybacki has joined #openstack-keystone18:16
*** gokrokve has joined #openstack-keystone18:16
*** david-lyle has joined #openstack-keystone18:16
*** marcoemorais has joined #openstack-keystone18:16
*** lbragstad has joined #openstack-keystone18:16
*** dims has joined #openstack-keystone18:16
*** bklei has joined #openstack-keystone18:16
*** mhu has joined #openstack-keystone18:16
*** rodrigods has joined #openstack-keystone18:16
*** Ephur has joined #openstack-keystone18:16
*** tellesnobrega has joined #openstack-keystone18:16
*** amerine has joined #openstack-keystone18:16
*** harlowja has joined #openstack-keystone18:16
*** mgagne has joined #openstack-keystone18:16
*** jdennis has joined #openstack-keystone18:16
*** rushiagr has joined #openstack-keystone18:16
*** dolphm has joined #openstack-keystone18:16
*** uvirtbot has joined #openstack-keystone18:16
*** chmouel has joined #openstack-keystone18:16
*** shufflebot has joined #openstack-keystone18:16
*** zigo has joined #openstack-keystone18:16
*** zhiyan_ has joined #openstack-keystone18:16
*** dickson.freenode.net sets mode: +o dolphm18:16
*** wyllys has left #openstack-keystone18:16
*** rodrigods_ has quit IRC18:25
bknudsonis there a bug for httpretty issue?18:25
*** leseb has quit IRC18:29
*** leseb has joined #openstack-keystone18:29
morganfainbergbknudson, uhmm.18:33
*** dims has quit IRC18:33
morganfainbergnot sure18:33
*** rodrigods has quit IRC18:33
*** amerine has quit IRC18:33
*** bklei has quit IRC18:33
*** rodrigods has joined #openstack-keystone18:33
*** dims has joined #openstack-keystone18:33
lbragstadbknudson: not seeing anything come up in search18:33
*** bklei has joined #openstack-keystone18:33
*** amerine has joined #openstack-keystone18:33
morganfainbergbknudson, https://review.openstack.org/#/c/101214/ is the fix to global reqs18:34
bknudsonkeytoneclient is blocked by it18:34
*** leseb has quit IRC18:34
*** browne has joined #openstack-keystone18:35
ayoungstevemar, thanks18:39
dolphmbknudson: yes18:39
ayounggyee ducked out... morganfainberg can you please pull the trigger on https://review.openstack.org/#/c/95989/18:40
ayoungI promise you  a handful of code reviews in exchange ...shameless horse trader that I am18:40
bknudsonhttps://bugs.launchpad.net/openstack-ci/+bug/133226618:40
uvirtbotLaunchpad bug 1332266 in openstack-ci "httpretty 0.8.1 fails to install, causing job failure" [Undecided,New]18:40
morganfainbergayoung, just got back from coffee and was following up on the django one first.18:41
ayoungah, yeah that is higher priority18:41
morganfainbergayoung, yeah i can look at that one now.18:41
stevemarbknudson, it took me waaaaay too long to figure out how to add a test for hacking18:43
bknudsonstevemar: it's magic18:44
stevemarbknudson, it's super magic, straight up voodoo18:44
morganfainbergayoung minor nit, why did the build_external_auth_request move?18:46
morganfainbergayoung, just wierd diff magic?18:46
morganfainbergayoung, https://review.openstack.org/#/c/95989/8/keystone/tests/test_v3.py looks like it shouldn't have moved.18:46
*** dstanek_zzz is now known as dstanek18:46
ayoungmorganfainberg, I think I had removed it and then added it back in.18:47
ayoungI can reorder that...clean up the patch18:47
morganfainbergok nah18:47
morganfainbergjust was making sure i wasn't missing something18:47
*** amirosh has quit IRC18:49
ayoungmorganfainberg, It is probably worth reposting. Here is the cleaned up version  http://paste.fedoraproject.org/111259/20379414/18:50
morganfainbergayoung, ok.18:50
morganfainbergayoung, if you wish to repost, please do :)18:50
ayoungmorganfainberg, pep8 check, and then new version18:51
morganfainbergayoung, ++18:51
morganfainbergotherwise LGTM18:51
ayoungstevemar, can I carry your +2 forward?  All I did was move the test function back to where it was origianlly18:52
ayounghttps://review.openstack.org/#/c/95989/8..9/keystone/tests/test_v3.py,cm18:53
morganfainbergayoung, ah that looks better actually18:54
*** david-lyle has quit IRC18:54
stevemarayoung, still looks good18:54
dstanekmarekd: i have a few more questions when you are around18:55
marekddstanek: ok, so i can be around :-)18:55
ayoungOK...lets let it pass gate and I am willing to +a it myself with your blessings18:55
dstanekmarekd: nice!18:55
marekdi am guessing it's my plugin, right?18:56
dstanekmarekd: https://review.openstack.org/#/c/83829 - and the mapping in the docstring18:56
dstanekwhat actually calls the methods on the protocol instance?18:56
dstaneki'm wondering if mapping can just be added to the method signatures so that it is more obvious18:57
marekdwhen you add the protocol18:57
marekdyou should send mapping_id in the request body.18:58
marekddstanek: ^^18:58
marekdand  AFAIR kwargs represents what you are going to send...18:58
marekdso when you call the method you want to add mapping_id as parameter, but it should go to kwargs.18:58
dstanekwhy in kwargs?18:59
marekdbecause later you take kwargs, and basically pass this dict as a request body.18:59
morganfainbergayoung, ok last question, do we have a test now where REMOTE_USER is set but the external plugin isn;t loaded (and KRB one isn't either)?18:59
ayoungmorganfainberg, yes19:00
marekddstanek: HTTP request body.19:00
ayoungah...no19:00
ayoungthat might already exist, for disable19:00
bknudsonyou can run tox -e cover to see what's covered by tests19:00
morganfainbergayoung, yeah that was what i was looking for19:00
bknudsonor not covered19:00
morganfainbergayoung, if we do have it, great, if not, it's something we should have to make sure we get the right response.19:00
*** ekarlso has quit IRC19:01
ayoungmorganfainberg, sure19:01
dstanekmarekd: is there anything in kwargs besides that id?19:01
marekdand when PUT/PATCH API call looks like : https://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3-os-federation-ext.md#update-the-attribute-mapping-for-an-identity-provider-and-protocol-combination-patch-os-federationidentity_providersidp_idprotocolsprotocol_id19:01
ayoungmorganfainberg, I think it would be in test_auth if it was anywhere19:01
morganfainbergayoung, test_v3auth right?19:01
marekddstanek: heh, that's the whole thing :-)19:01
marekddstanek: which i don't really like .19:02
marekddstanek: many methods/something in the middle also use kwargs as a parameters aggregator and simply pop params.19:02
ayoungmorganfainberg, maybe, or just test_auth19:02
marekddstanek: but i think the most competent person here about that is jamielennox|away19:02
*** diegows has joined #openstack-keystone19:02
marekd;/19:03
ayoungit existing in V2 as well19:03
morganfainbergisn't test_auth v2?19:03
morganfainbergright but this change affects only v3 and plugins19:03
morganfainbergyou're doing a pass vs a raised exception with REMOTE_USER looking up external plugin now19:03
morganfainbergyour change has no bearing on v2 in that regard.19:04
dstanekmarekd: ok, i'm going to looks at this a little more - we used kwargs in so many places :-(19:04
* morganfainberg isn't seeing that test.19:04
ayoungmorganfainberg, nah, V2 was different, didn't need the method names19:04
marekddstanek: in my patch?19:04
morganfainbergexactly19:04
*** ekarlso has joined #openstack-keystone19:04
dstanekmarekd: no in general19:04
ayoungso...yeah, would be test_v3_auth only19:05
*** juanmo1 has joined #openstack-keystone19:05
marekddstanek: ah yes, it caused me a lot of headaches ;/19:05
dstanekmarekd: i like kwargs for situations where you don't know what will be passed in because you're wrapping and will just pass through19:05
*** juanmo has quit IRC19:05
marekddstanek: understood,19:05
dstanekmarekd: i'd rather let Python do it's thing as much as possible in making sure required things are passed through19:06
morganfainbergayoung, if you make it an add-on patch to this one i can approve this one19:06
marekddstanek: but here it looks like: "i don't know whats inside, and i can hope the method in the middle will take away everything that shouldn't be there"19:06
ayoungmorganfainberg, ++19:06
morganfainbergayoung, but i'd like to see that test in the queue before we approve this19:06
ayoungmorganfainberg, fair enough19:07
dstanekmarekd: but you're trying to document what you expect in the kwargs, which to me implies that you know - and kwargs is just a shortcut19:07
dstanekayoung: in https://review.openstack.org/#/c/95989/7/keystone/auth/controllers.py your comment confuses me - why would that env var trigger the exception19:09
*** wyllys has joined #openstack-keystone19:09
ayoungmorganfainberg, don't ack that patch...I think it might be broken19:11
morganfainbergayoung, k.19:11
wyllyshas anyone looked into the issues with the user-create operation with an AD LDAP backend?19:13
ayoungmorganfainberg, It might not be any worse than things are now, but if REMOTE_USER is set, and external is not, I think it will give out an unscoped token19:13
ayoungwyllys, can't use subtree and do it19:13
wyllyswhy?19:13
ayoungwhere would you put the newly created user?  Which subtree?19:13
wyllyscn=Users19:14
marekddstanek: look what's the convention here: https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/base.py#L30919:14
wyllysperhaps not a subtree19:14
bknudsonI'm surprised that anyone using AD would want to create users with keystone19:14
marekddstanek: and later how functions like _build_url look like19:14
ayoungbknudson, they are running tests19:14
bknudsondoesn't AD have tools to create uses?19:14
wyllyssure AD does.19:14
ayoungand those test s create temporary users19:14
wyllysbut its conceivable to use an openstack front end UI to manage basic user operations19:15
wyllyscode as of today seems broken in that area.19:16
wyllystries to create users with no password but with userAccountStatus of 512 (NORMAL), AD wont allow that.19:16
wyllysalso, keystone sends SHA hash of password, when it should be unicode utf16le encoded and let AD handle the hashing (“unicodePwd” attribute).19:17
nkinder_wyllys: most people seriously using AD don't want to create users outside of their normal AD provisioning process19:17
nkinder_wyllys: keystone does have CRUD operations for users, but the main use case for them is when the SQL backend is used (there are exceptions to this of course)19:18
wyllysprobly so. i fell down this rabbithole a couple of days ago and thgis is where i ended up.19:18
nkinder_wyllys: it's a hole best avoided :)19:18
wyllystoo late:)19:18
ayoungwyllys, it works with OpenLDAP, too19:19
wyllysopenldap has slightly different schema, i think.19:19
nkinder_wyllys: you start to push knowledge of all of your required LDAP schema into keystone at that point, and it gets ugly19:19
wyllysuglie-ER19:19
wyllyslol19:19
nkinder_wyllys: more than slightly different19:19
ayoungI know people have gotten it to work, but I have not actually touched AD myself.19:19
*** nsquare has quit IRC19:19
ayoungI'm allergic to AD.  I have a Doctor's note saying I'm not allowed.19:19
wyllysi got managed to get everything else working - roles can be added/deleted. user can be deleted OK, too.19:20
wyllysmain issue is initial user creation and password changes.19:20
nkinder_wyllys: keystone should be sending the clear password to any LDAP server when you attempt to set a new password (not a hash)19:20
wyllysnkinder_: yes19:21
wyllysit should but its not19:21
nkinder_wyllys: what version of Keystone are you using?19:21
wyllys2014.1.119:21
nkinder_wyllys: I ripped out some LDAP hashing code in Keystone a little while back...19:21
*** nsquare has joined #openstack-keystone19:21
morganfainbergayoung, that doctor's note looks a lot like the "notes" you get here in california for "medical" use of stuff (not that I'd know, I don't do that)19:21
wyllysfor AD it should send unicode - base64.b64encode(unicode("\"AnExamplePassword1!\"").encode('utf-16-le'))19:21
nkinder_wyllys: https://bugs.launchpad.net/keystone/+bug/130879319:22
uvirtbotLaunchpad bug 1308793 in keystone "Remove LDAP password hashing code" [Medium,Fix released]19:22
nkinder_nkinder_: looks like that's only for Juno19:22
ayoungmorganfainberg, here is a picture of my Doctor  http://37.media.tumblr.com/Ml35wy8Lxn6u5mt4YOUSCZlbo1_250.jpg19:22
nkinder_boy, I'm talkin gto myself already...19:23
wyllysIf user create and password stuff is not going to be fixed for AD, then it should at least be documented.19:23
nkinder_wyllys: well, it could be proposed for a backport19:23
nkinder_IMHO, it is broken19:24
wyllysimho also.19:24
nkinder_that said, there is more work needed for AD passwords since they use unicodePassword vs userpassword like normal LDAP servers19:24
wyllysi think i could make it work, though, but its not clear that its valuable to anyone since its an odd use case.19:24
wyllysright19:24
ayoungmorganfainberg, OK, so the problem pre-exists19:25
ayoungand the question is, if there is a REMOTE_USER  but nothing to handle it, why does the authenticate call not fail19:25
nkinder_wyllys: even with my fix, we would just treat unicodePassword like userPassword and send the plain password across19:25
wyllysnkinder_ it needs to be unicode/UTF-le-16 encoded for AD.19:26
morganfainbergdolphm, jamielennox|away, topol, stevemar, dstanek, gyee, did we want to pyush for the middleware split this week? or should i wait for next week and re-ask?19:26
nkinder_wyllys: oh, I know.  It won't work otherwise19:26
wyllysright19:26
nkinder_wyllys: I've had to deal with that before working on 389 DS19:26
wyllysthat’d probably require another config option so the ldap code would know how to handle it.19:26
topolo/ whats up?19:26
ayoungmorganfainberg, check me on this  http://paste.fedoraproject.org/111276/40320595/   fails with  raise mismatch_error19:27
ayoungMismatchError: <bound method Auth.authenticate of <keystone.auth.controllers.Auth object at 0x43ec410>> returned None19:27
ayoungthat is against master19:27
ayoungah, wait19:28
ayoungI wonder if the config is not getting wiped19:28
*** nsquare has quit IRC19:28
ayoungyeah, the AUTH_METHODS collection is already populated19:29
ayoungprobaly by the setup19:29
morganfainbergtopol, dolphm, etc oh nvm we merged the spec19:29
morganfainbergcool, i'll get that split ready for tomorrow's infra review19:30
topolyay, any specs pressing for a review or can I go back to reviewing keystone patches?19:30
stevemartopol, review keystone2keystone... if you are brave enough19:30
stevemaror the middleware one, that one is cool too19:30
marekdstevemar: lol19:30
topolhas dolphm noticed its takes a longtime to get blueprints in compared to the previous model? I saw dims when I was in Boston and we were chatting about that19:31
marekdstevemar: btw did the port 5000 work?19:31
morganfainbergtopol, well we also are just getting our footing for this spec process19:32
stevemarmarekd, i'm trying it out now... gave the latest SP metadata to our IdP  guy19:32
morganfainbergtopol, i think K will be easier (especially since we can pre-load the BPs)19:32
topolmorganfainberg, I agree and understand19:32
topolmorganfainberg how does pre-load help?19:33
marekdstevemar: sure.19:33
dstanekstevemar: did they update the k2k based on the IRC meetings?19:33
marekddstanek: nope :/19:33
*** leseb has joined #openstack-keystone19:33
dstanekbummer...19:34
morganfainbergtopol, before we hit the summit we can have specs laoded for review19:34
morganfainbergbefore even we hit the start of K119:34
marekdbtw, how regions work today?19:35
marekdhow much they separate?19:35
morganfainbergmore time to work on them less pressure to get them in / moving so we hit our other deadlines19:35
dolphmtopol: we're certainly raising the bar, but otherwise i agree with morganfainberg19:35
marekdcan vms easily communicate between them?19:35
dolphmmarekd: the definition of a region is up to the deployer, so there's no hard answer19:36
topoldolphm, morganfainberg, can we reduce the detail so it doesnt make us too waterfall-ish? and we remain more agile?19:36
marekddolphm: ok. Cause i think in the k2k bp there might be a number of questions how to make things like networking transparent...19:36
dolphmtopol: that's an interesting thought - what in the template demands too much detail?19:37
joesavak+119:37
morganfainbergtopol, interesting, i'd like to see how some smaller BPs (not so wide sweeping) look before we gut too much of it19:37
* morganfainberg has to go to lunch19:38
morganfainbergbe back shortly19:38
joesavakthey are all things we need to think about - but iterating on the spec and knowing when it's enough to start to code is important19:38
marekdjoesavak: +119:38
morganfainbergjoesavak, ++19:38
marekdjoesavak: but i think we are still missing the main, high level architecture.19:38
*** leseb has quit IRC19:38
dolphmjoesavak: you can start writing code as early as you want, as long as you acknowledge you might have to throw away that work early if there's a change in direction of the spec19:38
joesavakmarekd - for k2k going the bursting region route, i agree. it needs tweaks.19:38
marekddolphm: ++19:39
joesavakgotcha dolphm19:39
stevemarmarekd, did you need to add the <LocationMatch /v3/OS-FEDERATION/websso> location?19:39
topolmorganfainberg, dolphm, so on my BP, what the CADF looks like I would like to iterate on with stakeholders. So if someone asks for it in detailed that makes me waterfall19:39
marekdstevemar: oh, no :(( remove it.19:40
stevemarj19:40
stevemark19:40
joesavakl19:40
joesavakm19:40
dolphmtopol: link?19:40
stevemarn19:40
marekdthis was my test and forked patch for our internal hck.19:40
*** hrybacki has quit IRC19:40
dolphmo?19:40
*** hrybacki has joined #openstack-keystone19:40
joesavakohhhh.19:40
topoldolphm, its the one that already merged. People didnt push me on it but they could have19:40
*** hrybacki has quit IRC19:41
stevemartopol, shhhh, dont say that too loud19:41
dolphmtopol: when i'm reading the specs, the two biggest things i care about are "why" (the use case), and the impact. the details of how should be left for the code IMO19:41
*** hrybacki has joined #openstack-keystone19:41
topoldolphm, ++++19:41
dolphmand the biggest benefit i've seen of specs so far is forcing everyone to think about the impact early on19:42
topoldolphm, so perhaps that should be placed at the top of the template so folks don't go overboard asking for more19:42
bknudsonget rid of the sections we don't care about19:42
topolbknudson +++19:42
topolyou all smelling my cooking19:42
marekdjoesavak: that said, i sometimes start to think that "100% transparency for the user" in the k2k is not always the best idea :P Suppose they want to run some scalable software and expect machines to communicate excessively. I am not sure we can work on every issue to make two clouds at some point work like one hybrid one. Am I fearing correctly?19:43
dolphmbknudson: like what?19:43
*** rodrigods has quit IRC19:43
dolphmbknudson: topol: ooh, let me propose a change of wording19:43
bknudsondolphm: if we only care about the use case and the impact then can remove the other sections19:44
dolphmbknudson: almost the entire thing is already impact19:44
bknudsone.g., Implementation and Testing19:44
joesavakmarekd - 100% transparency is possible, 50% transparency is possible. 0% transparency is posisble - all depending on how the identity provider & service provider trusts are setup19:44
dolphmbknudson: implementation is just assignees and work items - both of those are useful to me, at least19:45
bknudson"Here is where you cover the change you propose to make in detail." -- so it's expecting details of the implementation19:45
dolphmbknudson: more so near a milestone when i need to know if a bp is completed19:45
marekdjoesavak: the thing is i am starting to talk about networking for instance.19:45
dolphmbknudson: that's what i'm tweaking now19:45
marekdjoesavak: suppose we have 100% transparency from the authn&authz level.19:45
joesavakmarekd - identity federation is the first step to increasing the transparency level - seeing that 2 different "openstack networks" or "openstack cells" across different service providers don't talk the same klingon19:46
*** hrybacki has quit IRC19:46
joesavakknowing is 1/2 the battle. (GI Joe), and identity federation allows us to know what blockers in other services there are to providing seamless k2k, n2n, s2s, and other openstack-initial 2 openstack-initial federation19:47
marekdjoesavak: baby steps baby steps...right?19:47
joesavakyup19:47
marekdjoesavak: so i am in :-)19:47
joesavakscore.19:48
dolphmtopol: bknudson: morganfainberg: https://review.openstack.org/#/c/101304/19:49
henrynashmorganfainberg, dolphm, dstanek, ayoung: so question on making the hash algorithm configurable for the multi-baclen uuids…..a) do we want to make it configurable at all (default should be sha256), b) if it is configurable, are we thinking config param to select from a few support values (e.g. sha1, sha224, sha256) or to provide a pluggable backend where providers could substitute their own19:50
henrynash?19:51
*** leseb has joined #openstack-keystone19:51
ayounghenrynash, yeah, we want configurable, in case sha256 is broken at some point19:52
ayoungof course, if you change it, then all of the backend data is now trash19:53
henrynashayoung: and configurable so we have a pluggable hash provider backend or just a choice of built in values?19:53
henrynashayoung: (agreed)19:53
ayounghenrynash, well, if it is a provider, then we can swap out hash for something else in the future19:53
ayoungbut that might be overkill19:54
ayoungthen again, you can never have too much overkill19:54
henrynashayoung: that’s my dileman……so it overkill….I’m also wary of locking in high secuirty hask algorithms in case there are limitatins of exports etc..19:54
*** juanmo has joined #openstack-keystone19:55
ayounghenrynash, plugin means a code change.  Hash means a config change.  RIght?19:55
*** juanmo1 has quit IRC19:56
henrynashayoung: I;m thinking we could have a hash driver, where we provide sha256 (and maybe sha1) but someone could provide a shaxxx driver if they wanted19:56
ayounghenrynash, best of both worlds?19:56
*** leseb has quit IRC19:56
henrynashayoungL it would be a super simple driver….receieva  dict ad hash all teh contents19:56
ayoungshaxxx sounds like something naughty19:57
dolphmtopol: bknudson: morganfainberg: and some additional clarity on what i think the problem description should convey https://review.openstack.org/#/c/101307/19:57
henrynashayoung: the dark net?19:57
*** nsquare has joined #openstack-keystone19:57
*** gyee has joined #openstack-keystone20:00
dstanekayoung, henrynash: what is being hashed that we fear the hashing algorithm being broken?20:03
henrynashayoung, dolphm, morganfainberg, dtsanek: new version of multi-backend uuid spec: https://review.openstack.org/#/c/100497/ and new version of pre-cursor move of ID generation from controller to manager: https://review.openstack.org/#/c/100833/20:03
ayoungdstanek, the userid is produced as the hash of the components20:04
ayoungif you change the algo, you can't reporduce the userids20:04
henrynashdstanek: I agree that it is debatable whether the output of the hash should be considered “sensitive data"20:04
dstanekayoung: right, but why are we worried about the security of the hashing algorithm? are we hashing something that is secret?20:05
*** marcoemorais has quit IRC20:05
dstanekhenrynash: it can't be sensitive if it's an ID right?20:05
ayounghenrynash, this is not rational.  It is based on compliance rules, which are just applied across the board20:05
dstanekby definition we'll hand that out20:05
*** marcoemorais has joined #openstack-keystone20:05
henrynashdstanek: so the wording in the updated spec….for most installations it really is just about chosing an algorithm that has minimal collision risk for the number of bytes we have available20:06
dolphmdstanek: henrynash: technically you could theoretically force a collision and compromise someone's identity20:06
dstanekdolphm: what is compromised? they shouldn't be able to use the account without creds and we shouldn't allow dup IDs20:08
dolphmdstanek: well we're doing it for groups too, right?20:09
bknudsonI think you can put a user id in a policy file, in which case they'd be getting their permissions20:09
henrynashdstanek, dolphml I’m trying to think of case when the security aspect is the issue…I can imagine that possibly being true for the default domain (since the ID of that domain is the same in all clouds), but for other domains since we are hashing in a uuid domain_id, I can’t really see how anyone can deduce much20:09
henrynashdolphm: true20:09
dstanekdolphm: not sure about groups - i'll have to chew on that20:10
*** david-lyle has joined #openstack-keystone20:10
dstanekbknudson: even if you put a userid in the policy how will the attacker claim that are that user?20:10
dstanekthe can't get a token with that id because they don't have the creds20:11
bknudsonthey'd have to get their mapping in the table first20:11
dstanekbknudson: if we don't allow dups then they couldn't20:12
dstanekand i don't think we can allow dups because that means that a collision is a compromise20:12
bknudsonI don't think we allow dups since the user ID would be the primary key20:12
bknudsonisn't the map user ID -> domain ID + domain user ID20:13
henrynashI guess ayoung’s point is that we’ve all seen teh directives that say “stop using hasing algorithm XYZ it’s been shown to be insecure”…and if we don;t have a way of chaning it (even though our use is not so much abou secuirty) we could cause people to have issues with supporting OpenStack20:13
dstaneki'm not sure about groups though20:13
dstanekhenrynash: that's when the hashing related to security - storing password, transmitting signatures, etc. - nobody is complaining that we are using uuid for ids20:16
*** arun_kant has joined #openstack-keystone20:16
dstaneki'm not saying that we shouldn't make it configurable only that we need to make sure the security impact is accurate20:16
henrynashdstanek: agreed20:17
dstanekfor example, if it is configurable we need to explain what attacks are possible20:17
*** jgriffith has joined #openstack-keystone20:18
jgriffithAnybody able to help me understand why I suddenly can't access any API's on my OpenStack system that's been running for a year?20:19
jgriffithSuddenly getting "authorizaton failed" for any of the services20:19
henrynashdtsanek: off to think abou that….20:20
bknudsonjgriffith: did a certificate expire?20:21
jgriffithbknudson: possibly... this isn't *my* system20:21
jgriffithand there's a couple hundred tokens in the DB20:21
jgriffitha number of them expired20:21
jgriffithbknudson: given I can access keystone xxxx with my creds the token expire makes sense20:22
jgriffithhow do I fix that :)20:22
bknudsonjgriffith: I wasn't thinking a token had expired, but maybe keystone's PKI certificate.20:23
*** wyllys has quit IRC20:23
jgriffithOh...20:23
jgriffithhmm...20:23
jgriffithhints on how/what to check?20:23
bknudsonjgriffith: do you have access to the logs? although with the poor logging we do I'm not sure it would help20:24
jgriffithbknudson: I do have access20:25
jgriffithyes20:25
jgriffithbknudson: lemme turn on debug logging and try again20:25
jgriffithsee if anything good shows up20:25
*** marcoemorais has quit IRC20:26
*** marcoemorais has joined #openstack-keystone20:26
*** wyllys has joined #openstack-keystone20:28
jgriffithhmm... that certainly dumps info to logs20:28
*** topol has quit IRC20:35
jgriffithbknudson: I'm at a bit of a loss... anything inparticular I can look for in the logs?20:46
bknudsonjgriffith: are there complaints from openssl about certificate expiratin?20:46
jgriffithchecking20:46
*** erecio has quit IRC20:47
bknudsonthese would be in nova or whatever service you're accessing20:47
jgriffithbknudson: that's what's weird... nothing much in nova-api log20:47
jgriffithhttp://pastebin.com/AwEhEQYz20:48
bknudsonjgriffith: I'd think it was weird, too, but we really do a poor job of logging20:48
jgriffithhehe.. I have a new appreciation for our users20:48
jgriffithI should've worked from home today :)20:49
*** ncoghlan_afk is now known as ncoghlan20:51
jgriffithbknudson: according to the team that owns this system they did nothing20:51
jgriffithbknudson: so the expired cert theory makes sense20:51
jgriffithbknudson: how would I go about updating/fixing that20:52
*** packet has quit IRC20:52
bknudsonjgriffith: the pki certs are generated with keystone-manage pki_setup20:52
*** leseb has joined #openstack-keystone20:52
bknudsonjgriffith: then you'll want to get rid of the certs that are cached by the auth_token middleware20:52
bknudsonjgriffith: hmm, looks like by default the certificate valid days is 10 years20:54
bknudsonso maybe that's not it20:55
jgriffithbknudson: I just ran certificates/signing20:55
jgriffithsays valid til today20:55
jgriffithso taht seems to be our issue20:55
jgriffithhttp://pastebin.com/FU7GvcpM20:56
*** leseb has quit IRC20:57
*** praneshp has quit IRC20:58
dolphmstevemar: you missed the other one ;) https://review.openstack.org/#/c/101307/20:58
bknudsonmaybe the default changed or they ran some commands themselves to generate it20:58
*** juanmo has quit IRC20:59
jgriffithbknudson: maybe.. but this is "old" setup20:59
jgriffithbknudson: Grizzly20:59
*** wyllys has quit IRC20:59
stevemardolphm, d'oh!20:59
jgriffithMy initial response was "this is a great time to upgrade" :)20:59
stevemardolphm, approved, awesome sauce21:00
ayoungjgriffith, use a real CA, and real certs, and not pki/ssl setup, if you have access to one21:00
bknudsonjgriffith: grizzly is out of support so there's no security updates21:00
bknudsonunless you're paying someone to backport21:00
jgriffithbknudson: they pay me for the Cinder stuff :)21:01
*** ncoghlan is now known as ncoghlan_afk21:01
jgriffithayoung: so can I just regenerate/update whatever they had before easily?  IE they can get by for another year ;)21:02
*** praneshp has joined #openstack-keystone21:02
ayoungjgriffith, I think the quote is "if you are not part of the solution, there is big money in prolonging the problem"21:03
dolphmstevemar: danke!21:03
jgriffithayoung: LMAO21:03
* dolphm is MIA tomorrow, see everyone monday21:03
jgriffithayoung: problem is it's "my employer" so I'm not "really" making money on it :)21:03
jgriffithie SolidFire internal OpenStack cluster21:03
jgriffithI convinced the automation team to dump vmware a couple years ago and go openstack21:04
ayoungjgriffith, I think quote now is doubly valid21:04
jgriffithooops :)21:04
jgriffithkarma sucks21:04
jgriffithLOL.. good point21:04
ayoungnah...good call21:04
bknudsondolphm: enjoy your time off21:04
* jgriffith goes to ask boss for a raise21:04
jgriffithayoung: bknudson this look like the right idea?21:05
jgriffithhttp://www.blackmesh.com/blog/openstack-refusing-authentication-psh21:05
bknudsonjgriffith: tell them that everyone else is deploying from master21:05
jgriffithbknudson: ha!21:05
ayoungstevemar, morganfainberg so...assuming that I've knocked out the pep8 issues, and it passes gate, are you guys good with https://review.openstack.org/#/c/95989/  and the new test    https://review.openstack.org/#/c/101302/4  ?21:05
jgriffithbknudson: funny, I was just talkign to someone last night about how I don't hear that so much anymore21:05
jgriffithalthough personally I like it21:06
dstanekquestion for all ya guys: is it worth the effort to make this more technically accurate using AST instead of string matching https://review.openstack.org/9301321:07
dstaneki've actually already done most of the work, but not that I see this i'm wondering if i should finish or just let this slide through21:07
bknudsonjgriffith: maybe valid_days was broken in grizzly... there were a bunch of changes to the openssl code at one point21:07
jgriffithbknudson: so long ago who can remember21:08
jgriffithI cringe when people ask about Havana :)21:08
ayoungjgriffith, so you know what you need to do?21:08
stevemarayoung, likely would be good with it21:09
bknudsonor maybe valid_days is still broken. should check it21:09
ayoungstevemar, can you ACK the test patch21:09
ayoungstevemar, the Kerberos method name one is only a rebase, so no real change21:09
jgriffithayoung: I'm going to try and follow that blog post I found21:10
jgriffithsee how it goes21:10
jgriffithhow bad could it end up :)21:10
ayoungjgriffith, my blog?21:10
bknudsonjgriffith: oh, that's not your blog... I thought it might be21:10
ayoungyou need to regen the certs on Keystone first, and then wipe out the files in the remote servers, and they should get refetched21:10
jgriffithayoung: I used yours to verify it was hosed21:10
jgriffithayoung: yeah... working that now21:11
bknudsonjgriffith: I wouldn't suggest "just replace their copies of the appropriate files" -- should be able to delete the files and auth_token will fetch them again21:11
jgriffithayoung: bknudson thanks to both of you!21:11
*** joesavak has quit IRC21:11
ayoungyeah what bknudson said is right21:11
ayoungregenerate the files on keystone, then test one server at a time21:11
bknudsonjgriffith: e.g., these guys: /var/lib/cinder/cacert.pem , just remove them21:11
ayoungI'd recommend starting with glance image-list21:11
ayoungand cinder list21:12
jgriffithok.. thos are all removed21:12
ayoungand the like, make sure all of the services work with the new certs21:12
ayoungjgriffith, well, they were removed.  If you remved them before you regenerated the certs, and someone else hit the server, they were refechced21:12
ayoungrefetched21:12
jgriffiththey're lib/CA/xxxx21:12
jgriffithahhhh21:13
*** praneshp has quit IRC21:13
*** jimbaker has quit IRC21:21
*** david-lyle has quit IRC21:23
*** dims has quit IRC21:23
*** morganfainberg is now known as morganfainberg_Z21:24
*** dims has joined #openstack-keystone21:24
*** praneshp has joined #openstack-keystone21:27
*** jamielennox|away is now known as jamielennox21:29
bkleijamielennox any chance you could take another peek at https://review.openstack.org/#/c/92390?21:30
jamielennoxbklei: sure - will do21:31
bkleigracias!21:31
*** openstackgerrit has joined #openstack-keystone21:34
*** topol has joined #openstack-keystone21:47
*** bklei has quit IRC21:48
*** david-lyle has joined #openstack-keystone21:50
*** leseb has joined #openstack-keystone21:53
*** leseb has quit IRC21:55
*** leseb has joined #openstack-keystone21:55
*** morganfainberg_Z is now known as morganfainberg21:55
*** dims has quit IRC21:58
*** leseb has quit IRC21:59
*** topol has quit IRC22:01
jgriffithayoung: bknudson sorry to keep bugging :(22:01
jgriffithayoung: bknudson any pointers on this: http://paste.openstack.org/show/84538/22:01
ayounglooking22:02
jgriffithdo I need to nuke everything in that dir before running?22:02
ayoungjgriffith, permissions?22:02
*** lbragstad has quit IRC22:02
jgriffithshouldnt think so... I'm root22:02
ayoungwho owns /etc/keystone/ssl and subdirs22:02
*** oomichi has joined #openstack-keystone22:02
jgriffithkeystone is owner22:03
ayoungfailed to update database22:03
ayoungTXT_DB error number 222:03
ayounglet me see...22:03
jgriffithayoung: ohhh...22:04
jgriffithayoung: so, my new signing_cert that gets generated though is root/root22:04
jgriffithayoung: you think it get's unhappy because of the mismatch there?22:04
ayoungjgriffith, is it the pki_setup that is failing, or keystone run afterwards?22:05
bknudsonI think there's an option to pki_setup for the user ID22:05
jgriffithpki_setup22:05
ayoungyou are supposed to add a special flag if it is run as root22:05
jgriffithOh?22:05
ayoungbut that might not have been there in grizzly22:05
*** dims has joined #openstack-keystone22:06
jgriffithhmm... well heck22:06
*** jimbaker has joined #openstack-keystone22:09
jgriffithayoung: looking at the code the keystone/cli seems to pass keystone_user_id and group ot openssl.configure22:10
ayoungjgriffith, hang on,  solving other probklem elsewhere22:10
jgriffithno worries22:10
*** henrynash has quit IRC22:12
*** henrynash has joined #openstack-keystone22:15
*** nsquare has quit IRC22:19
openstackgerrithenry-nash proposed a change to openstack/keystone-specs: Always use a hash based Public ID for cross backend identifiers  https://review.openstack.org/10049722:22
*** henrynash has quit IRC22:23
ayoungmorganfainberg, is it practical to break this in Horizon?22:24
morganfainbergayoung, horizon needs to use the ids as given by keystone22:24
morganfainbergi have no idea how to get there from here22:24
ayoungmorganfainberg, its going to break your logging the tracking ids too22:25
morganfainbergyep22:25
ayoungis there truely no session data in Horizon?22:25
morganfainbergas david lyle?22:25
morganfainbergask*&22:25
morganfainberg#openstack-horizon22:26
*** andreaf_ has quit IRC22:26
bknudsonhorizon has session data22:27
bknudsonit's provided by django22:27
bknudsonI think there's an ossn about it22:27
bknudsonhttps://review.openstack.org/#/c/99420/22:28
jgriffithayoung: bknudson so I hacked some things up and can now run pki_setup, but the expiration date is still the "old" date?22:29
jgriffithis there something else that feeding that in?22:30
jgriffithsuppose I could just change the date on the systems :)22:30
jgriffithha!22:33
ayoungjgriffith, hmmmm22:33
jgriffithayoung: figured it out22:34
jgriffithayoung: at least generating things22:34
ayoungwhew.  thought I was going to have to start looking at Grizzly code22:34
jgriffithnow to get them in place and hope it all works22:34
jgriffith:)22:34
jgriffithSo I just hacked the keystone/common/openssl a bit to do what I want22:34
*** openstackgerrit has quit IRC22:34
jgriffithor what i *think* I want :)22:34
jgriffithso in theory, just shutdown services, load the new cert.pem in each one and go22:35
*** 20WAAHXAJ has joined #openstack-keystone22:36
*** doddstack has quit IRC22:37
bknudsonred hat ci is a tough cookie! http://people.redhat.com/~iwienand/101347/22:37
ayoungbknudson, I see nothing in that log that says what failed.22:40
bknudsonone of them says "Cannot open: http://dl.fedoraproject.org/pub/epel/beta/7/x86_64/epel-release-7-0.1.noarch.rpm. Skipping."22:41
bknudsonone says "[ERROR] /home/stack/devstack/functions-common:599 git call failed: [git clone git://git.openstack.org/openstack/cinder.git /opt/stack/cinder]"22:41
bknudsonfatal: Unable to look up git.openstack.org (port 9418) (Temporary failure in name resolution)22:42
bknudsonso maybe a dns prob22:42
ayoungmorganfainberg, I just realized that, even with PKIZ, we don't have the tokens small enough to fit in a cookie.  But...if they only stored unscoped tokens, they should be small enough22:43
ayoungsession cookies again22:43
morganfainbergayoung, *sigh*22:43
ayoungmorganfainberg, No, not sigh.  This is good22:43
ayoungthis is the reason to do it22:43
morganfainbergno that it's an issue at all22:43
morganfainbergsession tokens = good22:43
morganfainbergbut this being an issue at all is annoying22:44
ayoungmorganfainberg, I am pretty sure the Horizon guys did what they did on my suggestion back when I implemented PKI tokens.22:44
ayoungIt was the only way to work around the limitations back then.22:44
ayounganyway...headed home, and I'm a think about session tokens when I get there22:44
morganfainbergk22:45
*** hrybacki has joined #openstack-keystone22:48
*** ayoung has quit IRC22:49
*** openstack has joined #openstack-keystone22:50
morganfainbergjamielennox, ping have a question22:59
morganfainbergjamielennox, 2014-06-19 22:23:29.001 6918 WARNING keystoneclient.middleware.auth_token [-] Configuring admin URI using auth fragments. This is deprecated, use 'identity_uri' instead.22:59
morganfainbergjamielennox, this is the unversioned endpoint stuff, right?23:00
*** nsquare has joined #openstack-keystone23:01
morganfainbergjamielennox, nvm got it23:02
dstanekmorganfainberg: first impressions? http://dpaste.com/1RTPWBT23:06
morganfainbergdstanek, looking23:09
morganfainbergdstanek, at a glance it seems kinda straightforward23:10
*** gordc has quit IRC23:10
morganfainbergdstanek, can look at it more in depth a bit later middle of trying to split/re-merge all the repos/tress for middleware split23:11
jgriffithbknudson: I've got everything working again *except* Nova23:11
jgriffithany ideas what I may have missed?23:11
dstaneki have to comment on it a little more and clean out the duplication, but it's the code i wrote to detect LOG.debug(_(23:11
jgriffithie is there anything special for Nova?23:11
dstanekmorganfainberg: no need to go into detail, but why you have time think about that vs. https://review.openstack.org/#/c/93013/9/keystone/hacking/checks.py23:12
dstaneks/why/when/23:12
morganfainbergdstanek, ++ will do23:12
*** hrybacki has quit IRC23:13
morganfainbergdstanek, btw, ouchy brain hurts from using git subtree split23:13
morganfainbergand then remerging into a completely separate tree23:13
*** hrybacki has joined #openstack-keystone23:13
jamielennoxmorganfainberg: no, it's just auth_host, auth_port, auth_protocol -> identity_uri23:14
morganfainbergjamielennox, yeah i saw that. am elbow deep in get repo split/merge/split/remergeing23:14
morganfainbergjamielennox, my brain didn't put 2 and 2 together till i looked at the code23:15
dstanekmorganfainberg: haha, been there and never want to do it again23:16
morganfainbergdstanek, i've gotten most of the middleware and tests shuffled around, keeping all history - i might opt to lose the history on the keystone middleware tests vs the ksc middleware tests.23:18
hrybackiDo each of the components have people that actually work on documentation or is that a sort of pipe dream?23:19
jgriffithmorganfainberg: ping23:22
morganfainbergjgriffith, pong23:22
jgriffithmorganfainberg: so our ssl cert expired today :(23:22
jgriffithI've managed to generate a new one and get all the services back up except nova23:22
jgriffithIt just occured tome...23:23
morganfainbergjgriffith, oh icky :( ssl no fun23:23
jgriffithI'll need to update certs on every single nova node won't I?23:23
jgriffithI mean, sure it's just a copy over, but that sucks23:23
jgriffithespecially since I don't really *know* all of the nodes :(23:23
morganfainbergjgriffith, that sounds correct23:23
morganfainbergjgriffith, =/23:23
jgriffithor is there a different way to do this that I don't know23:24
jgriffithboooo... morganfainberg23:24
morganfainbergjgriffith, wait this for token validation?23:24
jgriffithI was hoping you'd say... Oh no, just use this tool :)23:24
jgriffithnah.. my ssl cert expired this am23:24
morganfainbergjgriffith, i .. think the middleware will download the cert from keystone on restart23:24
jgriffithOh?23:24
jgriffithjust reboot all the compute nodes?23:24
morganfainbergjgriffith, for token validation signing cert23:24
jgriffithOhhh... caveat!23:25
dstanekhrybacki: what do you mean by components?23:25
jgriffithI'm on grizzly23:25
morganfainbergjgriffith, hhhhmm23:25
jgriffithmorganfainberg: yes, toek validation signing cert23:25
morganfainbergjgriffith, what version of keystoneclient ?23:25
morganfainbergjgriffith, because the middleware comes from there (well newer versions) not from keystone itself23:25
jgriffithmorganfainberg: hmm.. good question23:25
morganfainbergjgriffith, not sure when we converted that over23:25
jgriffithwhy don't we have "keystone/cinder/... --version"23:25
morganfainbergjgriffith, oh but os-simple-cert.23:26
*** hrybacki has quit IRC23:26
morganfainberguh. you might need to copy the certs out23:26
morganfainbergeven w/ all the magic logic.23:26
jgriffithcrumbs23:26
jgriffithI thought that might be the case23:26
morganfainbergjgriffith, i uh haven't looked at grizzly code in a while /me is embarassed not to have a better answer23:26
jgriffithmorganfainberg: don't be... it's grizzly code :)23:27
morganfainberg2 questions: are you sourcing the middleware from keystoneclient or keystone?23:27
jgriffithI appreciate the help23:27
jgriffithmorganfainberg: ok... until today I had never looked at keystone23:27
morganfainbergjgriffith, lol no worries23:27
jgriffithso.... I am embarassed to say I probably don't know what you're asking :)23:27
jgriffithI did:  keystone-manage pki_setup23:27
morganfainbergjgriffith, in the nova-api paste, does it load auth_token_middleware form keystone.middleware or keystoneclient.middleware23:28
jgriffithcopied the new cert files to /var/lib/cinder|quantum|nova23:28
morganfainbergthe safest bet is likey copying the certs in place (at least that way you're sure).23:28
jgriffithpaste.filter_factory = keystoneclient.middleware.auth_token:filter_factory23:28
morganfainbergok so that is good23:29
morganfainberglet me look at keystone grizzly for a sec23:29
*** hrybacki has joined #openstack-keystone23:29
jgriffithmorganfainberg: awesome23:29
jgriffithI'll start writing a script to copy this out to 25 nodes :)23:29
*** 20WAAHXAJ has quit IRC23:29
jgriffithjust incase23:29
morganfainbergjgriffith, ok so, i don't see the simple_cert contrib in grizzly23:30
*** dstanek is now known as dstanek_40423:30
morganfainbergjgriffith, i would recommend copy the cert out23:30
jgriffithwhahwahwahwahhhhhh23:30
morganfainbergdstanek_404, wouldn't dstanek_410 be more appropriate23:31
jgriffithmorganfainberg: okie-dokie23:31
jgriffithmorganfainberg: thanks for the help23:31
*** openstackgerrit has joined #openstack-keystone23:31
jgriffithall of you today...  appreciate it23:31
morganfainbergjgriffith, sure thing23:31
*** ayoung has joined #openstack-keystone23:34
dstanek_404morganfainberg: 410 implies for good....are you looking into a crystal ball and seeing my future?23:34
dstanek_404morganfainberg: this is making me not want to get into that car23:34
morganfainbergdstanek_404, well i mean "NotFound" vs "Gone" strictly speaking, i still found you23:35
dstanek_404lol, be back later23:35
morganfainbergdstanek_404, cheers23:35
ayoungmorganfainberg, I'm in dad mode, but I think the solution is that we need to set up caching in Horizon.  I suspect Dogpile is the right solution.  So, for devstack, they get a kvs cache23:35
ayoungand with that...I'm in23:35
*** ayoung is now known as ayoung_DadMode23:35
morganfainbergayoung, see ya in a bit man23:35
*** leseb has joined #openstack-keystone23:36
*** arun_kant has quit IRC23:37
*** hrybacki has quit IRC23:39
*** leseb has quit IRC23:41
*** hrybacki has joined #openstack-keystone23:47
*** amerine has quit IRC23:50
*** daneyon has joined #openstack-keystone23:52
*** daneyon has quit IRC23:52
*** daneyon has joined #openstack-keystone23:53
jgriffithmorganfainberg: sighh... that didn't work23:55
morganfainbergjgriffith, :( it didn't?23:55
jgriffithmorganfainberg: nope, I'm rather confused23:55
jgriffithmorganfainberg: my nova-api log has: 2014-06-19 17:50:41.788 20888 INFO nova.osapi_compute.wsgi.server [-] 172.26.75.32 "GET /v2/1551a3b25f624b9baa1efcf44790a422/servers/detail HTTP/1.1" status: 401 len: 464 time: 0.941421023:55
morganfainbergjgriffith, after copying... you might need to restart the nova-api?23:55
*** david-lyle has quit IRC23:56
jgriffithmorganfainberg: yeah, I did that assuming I hit all of them23:56
morganfainbergi don't think it loads the cert on each request... or.. huh maybe it does with popen23:56
jgriffithUnless there's something else causing the 401?23:56
morganfainbergwhere is auth_token looking for the cert for nova? i assume you got it in the right place (don't doubt your script, but sometimes it's a typo ro something)23:57
jgriffithmorganfainberg: fair :)23:57
jgriffithI dumped it to /var/lib/nova/CA/23:57
morganfainbergthe [auth_token] or [keystone_auth_token] section of the config (i forget which) will say it's looking someplace specific23:58
morganfainbergusually23:58
jgriffithmorganfainberg: sighh... I hope they're not all different or I might cry :)23:58
jgriffithcluster-ssh to the rescue23:58
morganfainbergjgriffith, i hope so too!23:58
*** dims has quit IRC23:58
morganfainbergcrying = bad23:58
jgriffithLOL23:59
jgriffithhmm.. which conf file?23:59
jgriffithI don't see those (grizzly)23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!