Tuesday, 2014-08-19

*** hrybacki has joined #openstack-keystone00:00
*** oomichi has joined #openstack-keystone00:00
openstackgerritMorgan Fainberg proposed a change to openstack/identity-api: Update revoke-ext  https://review.openstack.org/11485700:11
*** yasukun has joined #openstack-keystone00:18
*** harlowja is now known as harlowja_away00:29
*** yasukun has quit IRC00:31
*** yasukun has joined #openstack-keystone00:31
*** marcoemorais has quit IRC00:35
*** yasukun has quit IRC00:36
*** yasukun has joined #openstack-keystone00:36
*** rwsu has quit IRC00:37
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add extra guarding to revoke_by_audit_id methods  https://review.openstack.org/11514700:39
*** cjellick has quit IRC00:41
*** cjellick has joined #openstack-keystone00:42
openstackgerritRichard Megginson proposed a change to openstack/keystone: ldap/core deleteTree not always supported  https://review.openstack.org/7489700:44
*** ncoghlan_afk is now known as ncoghlan00:45
*** cjellick has quit IRC00:46
*** ayoung has quit IRC00:49
*** ayoung has joined #openstack-keystone00:49
*** rwsu has joined #openstack-keystone00:50
*** stevemar has joined #openstack-keystone00:50
*** andreaf_ has joined #openstack-keystone00:54
*** marcoemorais has joined #openstack-keystone00:55
*** harlowja_away is now known as harlowja00:56
*** andreaf has quit IRC00:56
*** Kui has joined #openstack-keystone00:59
*** yasukun_ has joined #openstack-keystone01:01
*** yasukun has quit IRC01:03
*** gokrokve has joined #openstack-keystone01:10
*** jdennis1 has quit IRC01:15
*** gokrokve has quit IRC01:17
*** gokrokve has joined #openstack-keystone01:18
*** gokrokve has quit IRC01:22
*** bknudson has quit IRC01:23
*** gokrokve has joined #openstack-keystone01:25
*** jdennis has joined #openstack-keystone01:26
*** yasukun_ has quit IRC01:28
*** shakamunyi has joined #openstack-keystone01:34
*** shikui_ has joined #openstack-keystone01:39
*** Kui has quit IRC01:42
*** oomichi has quit IRC01:48
*** mitz has quit IRC01:48
*** stevemar has quit IRC01:50
*** stevemar has joined #openstack-keystone01:52
*** gokrokve_ has joined #openstack-keystone01:56
*** oomichi has joined #openstack-keystone01:57
*** gokrokve_ has quit IRC01:58
*** gokrokve_ has joined #openstack-keystone01:59
*** gokrokve has quit IRC01:59
stevemardstanek, if you're looking for another easy one ... https://review.openstack.org/#/c/114811/02:05
*** gokrokve has joined #openstack-keystone02:08
*** gokrokve_ has quit IRC02:09
*** RicoLin has joined #openstack-keystone02:10
*** morganfainberg is now known as morganfainberg_Z02:14
*** hrybacki has quit IRC02:24
*** Krast_ has quit IRC02:26
*** Krast has joined #openstack-keystone02:26
*** marcoemorais has quit IRC02:31
*** hrybacki has joined #openstack-keystone02:32
*** hrybacki has quit IRC02:32
*** hrybacki has joined #openstack-keystone02:33
*** gokrokve has quit IRC02:34
*** gokrokve has joined #openstack-keystone02:34
*** hrybacki has quit IRC02:38
*** gokrokve has quit IRC02:39
openstackgerritA change was merged to openstack/keystone: Expose context to create grant and delete grant  https://review.openstack.org/11480902:46
*** hrybacki has joined #openstack-keystone02:47
*** alex_xu has joined #openstack-keystone02:48
ayoungjamielennox, not yet.  Hadn't ran back around to it.  I was working on the Kerberos client review, and trying to deal with the httpretty exorcism03:02
*** shakamunyi has quit IRC03:09
*** KanagarajM has joined #openstack-keystone03:17
*** hrybacki has quit IRC03:31
*** gyee_ has quit IRC03:32
*** shikui_ has quit IRC03:34
*** richm has quit IRC03:35
*** amirosh has joined #openstack-keystone03:57
*** amirosh has quit IRC03:59
*** amirosh has joined #openstack-keystone04:00
*** stevemar has quit IRC04:00
*** xianghuihui has quit IRC04:03
*** xianghuihui has joined #openstack-keystone04:04
*** amirosh has quit IRC04:04
*** shakamunyi has joined #openstack-keystone04:07
*** harlowja is now known as harlowja_away04:08
*** Kui has joined #openstack-keystone04:12
openstackgerritKanagaraj Manickam proposed a change to openstack/keystone: endpoint table is missing reference to region table  https://review.openstack.org/11318304:15
*** xianghuihui has quit IRC04:18
*** xianghui has joined #openstack-keystone04:21
*** ayoung has quit IRC04:41
*** Krast has quit IRC05:08
*** shakamunyi has quit IRC05:13
*** ctracey has quit IRC05:16
*** afazekas has quit IRC05:17
*** ctracey has joined #openstack-keystone05:20
*** ncoghlan is now known as ncoghlan_afk05:20
*** amerine has quit IRC05:20
*** k4n0 has joined #openstack-keystone05:36
*** ajayaa has joined #openstack-keystone05:36
*** morganfainberg_Z is now known as morganfainberg05:41
*** ncoghlan_afk is now known as ncoghlan05:45
*** rwsu has quit IRC05:51
*** tomoiaga has joined #openstack-keystone05:59
*** alex_xu has quit IRC06:04
*** rwsu has joined #openstack-keystone06:07
*** amirosh has joined #openstack-keystone06:13
*** Krast has joined #openstack-keystone06:14
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/11192006:19
*** alex_xu has joined #openstack-keystone06:22
*** ukalifon has joined #openstack-keystone06:24
openstackgerritMorgan Fainberg proposed a change to openstack/identity-api: Add information about audit_id in token docs  https://review.openstack.org/11459006:28
*** Krast has quit IRC06:28
openstackgerritMorgan Fainberg proposed a change to openstack/identity-api: Update revoke-ext  https://review.openstack.org/11485706:28
*** alex_xu has quit IRC06:44
*** alex_xu has joined #openstack-keystone06:55
*** chandankumar has joined #openstack-keystone07:04
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486407:06
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Update AuthContextMiddleware to not use token_api  https://review.openstack.org/11342907:06
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add __repr__ to KeystoneToken model  https://review.openstack.org/11343007:06
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add extra guarding to revoke_by_audit_id methods  https://review.openstack.org/11514707:06
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove trust dependency on token_api  https://review.openstack.org/10946207:06
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove SAML2 plugin dependency on token_api  https://review.openstack.org/11501207:06
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove identity_api dependency on token_api  https://review.openstack.org/11504507:06
morganfainbergzzzzzzzz07:09
*** afazekas has joined #openstack-keystone07:12
openstackgerritMorgan Fainberg proposed a change to openstack/identity-api: Add information about audit_id in token docs  https://review.openstack.org/11459007:12
openstackgerritMorgan Fainberg proposed a change to openstack/identity-api: Add information about audit_id in token docs  https://review.openstack.org/11459007:12
*** rushiagr_away is now known as rushiagr07:22
*** amirosh has quit IRC07:30
*** amirosh has joined #openstack-keystone07:31
*** amirosh has joined #openstack-keystone07:31
*** alex_xu has quit IRC07:33
*** mitz has joined #openstack-keystone07:49
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove wsgi and base controller dependency on token_api  https://review.openstack.org/11520507:49
*** alex_xu has joined #openstack-keystone07:57
*** aix has joined #openstack-keystone07:57
*** amerine has joined #openstack-keystone07:58
openstackgerritMarcos Fermín Lobo proposed a change to openstack/keystone: Error on _ldap_get_list without attrlist value  https://review.openstack.org/11498607:59
*** alex_xu has quit IRC08:09
*** alex_xu has joined #openstack-keystone08:22
*** Krast has joined #openstack-keystone08:22
*** rushiagr is now known as rushiagr_away08:22
*** gpocente1 is now known as gpocentek08:27
*** gpocentek has joined #openstack-keystone08:27
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054208:28
*** amirosh_ has joined #openstack-keystone08:29
*** amirosh has quit IRC08:29
*** aix has quit IRC08:31
*** ncoghlan is now known as ncoghlan_afk08:39
*** ajayaa has quit IRC08:45
*** rushiagr_away is now known as rushiagr08:48
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054208:51
*** ajayaa has joined #openstack-keystone08:52
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054208:58
*** aix has joined #openstack-keystone08:59
*** ajayaa has quit IRC09:00
*** alex_xu has quit IRC09:09
*** andreaf_ has quit IRC09:10
*** ukalifon has quit IRC09:14
*** amirosh has joined #openstack-keystone09:30
*** amirosh_ has quit IRC09:30
*** andreaf has joined #openstack-keystone09:42
*** Daviey has quit IRC09:44
*** rushiagr is now known as rushiagr_away09:47
*** rushiagr_away is now known as rushiagr09:50
openstackgerritMarcos Fermín Lobo proposed a change to openstack/python-keystoneclient: Attributes required using token for auth  https://review.openstack.org/11522809:50
openstackgerritMarcos Fermín Lobo proposed a change to openstack/keystone: Error on _ldap_get_list without attrlist value  https://review.openstack.org/11498610:04
openstackgerritMarcos Fermín Lobo proposed a change to openstack/python-keystoneclient: Attributes required using token for auth  https://review.openstack.org/11522810:07
*** Daviey has joined #openstack-keystone10:16
*** amirosh_ has joined #openstack-keystone10:20
*** amirosh has quit IRC10:20
*** ukalifon has joined #openstack-keystone10:28
*** andreaf has quit IRC10:33
*** mitz has quit IRC10:51
*** mitz has joined #openstack-keystone10:53
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054211:10
*** KanagarajM has quit IRC11:11
*** ajayaa has joined #openstack-keystone11:11
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054211:12
*** andreaf has joined #openstack-keystone11:19
*** RicoLin has quit IRC11:23
*** hrybacki has joined #openstack-keystone11:52
*** hrybacki has quit IRC11:57
*** Krast has quit IRC12:02
*** alex_xu has joined #openstack-keystone12:04
*** gordc has joined #openstack-keystone12:09
*** hrybacki has joined #openstack-keystone12:17
*** hrybacki has quit IRC12:17
*** hrybacki has joined #openstack-keystone12:28
*** richm has joined #openstack-keystone12:30
*** jkappert has quit IRC12:34
*** jkappert_ has joined #openstack-keystone12:39
*** jkappert_ has quit IRC12:39
*** jkappert_ has joined #openstack-keystone12:40
*** jkappert_ has left #openstack-keystone12:43
*** hrybacki has quit IRC12:49
*** ajayaa has quit IRC13:03
*** jasondotstar has joined #openstack-keystone13:04
*** bknudson has joined #openstack-keystone13:12
*** joesavak has joined #openstack-keystone13:24
*** ncoghlan_afk is now known as ncoghlan13:25
*** radez_g0n3 is now known as radez13:25
*** zzzeek has joined #openstack-keystone13:32
*** ncoghlan is now known as ncoghlan_afk13:35
*** oomichi has quit IRC13:42
openstackgerritDavid Stanek proposed a change to openstack/python-keystoneclient: Bump hacking to 0.9.x series  https://review.openstack.org/10732813:44
*** HenryG_ has joined #openstack-keystone13:46
*** HenryG has quit IRC13:47
*** zzzeek has quit IRC13:48
dolphmis there an implementation for endpoint-policy in review?13:49
*** zzzeek has joined #openstack-keystone13:50
*** ayoung has joined #openstack-keystone13:52
dolphmmorganfainberg: i'm not caught up on the recent reviews in non-persistent tokens -- is it feature complete?13:53
*** RicoLin has joined #openstack-keystone13:54
openstackgerritayoung proposed a change to openstack/keystonemiddleware: Hash for PKIZ  https://review.openstack.org/11464614:01
*** stevemar has joined #openstack-keystone14:03
stevemarmarekd, good debugging on the xmlsec1 failure!14:07
stevemarmarekd, i thought it wasn't finding the keys :( ... like the certs weren't generated yet14:07
*** HenryG_ is now known as HenryG14:07
ayoungstevemar, marekd there has to be a way to sign those things without writing to the Filesystem14:09
stevemarayoung, it's actually how the pysaml2 library does it also14:10
ayoungI'm sure that is true, but its drainbed14:10
*** stevemar has quit IRC14:11
*** stevemar has joined #openstack-keystone14:11
*** henrynash has joined #openstack-keystone14:12
ayoungstevemar, it ain't gonna scale.14:12
*** oomichi has joined #openstack-keystone14:12
ayoungstevemar, do we have an example signed doc I can poke at?14:13
ayounghttps://review.openstack.org/#/c/110542/22/keystone/tests/xml/signed_saml2_assertion.xml  ?  I take it?14:13
marekdthat's assertion only14:13
marekdwhich is in the end wrapped in the <Response></Response>14:14
marekdbut in general that's that (only assertion is actually signed)14:14
marekdayoung: ^^14:14
marekdstevemar: thanks, be back in 5 mins.14:14
ayoungmarekd, so the block <ns1:SignatureValue>14:14
openstackgerritA change was merged to openstack/keystone-specs: Auth Specific Data  https://review.openstack.org/10732514:16
*** shakamunyi has joined #openstack-keystone14:16
*** oomichi has quit IRC14:17
*** zzzeek has quit IRC14:17
*** zzzeek_ has joined #openstack-keystone14:17
*** chandankumar has quit IRC14:17
ayoungstevemar, looks like it is doig sha1 http://www.w3.org/2000/09/xmldsig#rsa-sha114:18
marekdayoung: not only.14:18
marekdit also does that's called canonicalization.14:18
marekdc1414:18
ayoungmarekd, instead of canonicalizing to ASN1, they do XMl14:18
ayounghttp://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/14:18
ayoungand ="http://www.w3.org/2000/09/xmldsig#enveloped-signature"14:19
ayoungSo b//GXtGeCIJPFsMAHrx4+3yjrL4smSpRLXG9PB3TLMJvU4fx8n2PzK7+VbtWNbZG1614:19
ayoungvSgbvbQR52jq77iyaRfQ2iELuFEY+YietLRi7hsitkJCEayPmU+BDlNIGuCXZjAy1714:19
ayoung7tmtGFkLlZZJaom1jAzHfZ5JPjZdM5hvQwrhCI2Kzyk=14:19
ayoungshould be the signed version of Lem2TKyYt+/tJy2iSos1t0KxcJE=14:19
raildoayoung: If you have some free time, could you review the spec? https://review.openstack.org/#/c/101017/14:20
ayoungraildo, will do14:20
marekdayoung: so what do you suggest?14:20
*** samuelmz has joined #openstack-keystone14:20
raildoayoung: thanks a lot :-D14:20
ayoungmarekd, either we hack the execuatable you are using to generate the signed XML, or we perform the same operation using different tools. I suspect that all the library calls are available to perform it without writing to a file14:21
ayoungmarekd, Updating my venv to get the right libraries for the XML code14:22
marekdayoung: xmlsec uses underlying library.14:22
ayoungmarekd, so what part of that document is actually signed?14:23
marekdAssertion.14:23
marekdw814:23
*** david-lyle has joined #openstack-keystone14:24
morganfainbergdolphm,no14:24
ayoungmarekd, be more specific please14:24
openstackgerritAlexey Miroshkin proposed a change to openstack/keystone: Enable filtering of credentials by user ID  https://review.openstack.org/11323214:24
marekdayoung: sorry, I meant <Assertion></Assertion> block.14:24
morganfainbergdolphm, it is not feature complete. though it's getting close, about 4 more patches to post. (not inc. the keystone middleware changes)14:25
ayoungmarekd, minus anything with ns1:  ?14:25
morganfainbergdolphm, https://review.openstack.org/#/q/status:open+branch:master+topic:bp/non-persistent-tokens,n,z14:26
dolphmmorganfainberg: are they going to be ready today? :-/14:26
marekdayoung: i would say so. So basically you need to reate an assertion, and a ns1 'template'indicating algos etc. You pass it through xmlsec1 (or similar) that reads the input canonicalizes, hashes and signsm otputting a signed data.14:27
marekdhttps://review.openstack.org/#/c/110542/22/keystone/tests/xml/signed_saml2_assertion.xml14:27
morganfainbergdolphm, there are 2 more ugly patches, a cleanup patch, a 2 liner, make validate use cms when possivle, then a toggle for persistence14:27
morganfainbergthe ugly ones is getting token_api out of assignement and oaut14:27
dolphmmorganfainberg: it was a yes/no question :P14:28
marekdayoung: https://review.openstack.org/#/c/110542/22/keystone/contrib/federation/idp.py | grep "def _create_signature" will show you how the empty 'Signature' block looks like.14:28
morganfainbergdolphm, sorry was still answering the first one14:28
morganfainbergdolphm, lets say 30%14:28
dolphmeek14:28
dolphmmorganfainberg: what if we include tomorrow?14:28
marekdayoung: I found this blogpost useful: http://sgros.blogspot.ch/2013/01/signing-xml-document-using-xmlsec1.html14:28
dolphmcob14:28
morganfainbergdolphm, closer to 85%14:29
dolphmmorganfainberg: i'm putting together a list of work items to make sure we hit FPF14:29
morganfainbergdolphm, 90+% if there are no further nasty surprises inc. tomorrow14:29
dolphmmorganfainberg: what about the other 90%?14:30
morganfainbergdolphm, the other 90% other 10%?14:30
dolphmmorganfainberg: http://en.wikipedia.org/wiki/Ninety-ninety_rule14:30
morganfainberglol14:30
morganfainbergi think we're in the *other* 90% now14:30
morganfainbergit's been a lot of landmines in revocation events :(14:31
morganfainbergthe whole audit id, federated user domains, etc14:31
*** shakamunyi has quit IRC14:32
dstanekdolphm: the rechecks on that XML review are just getting silly now14:32
dolphmdstanek: yeah...14:33
dstanekis there a good reference for how deployers use policy.json?14:33
dolphmdstanek: like documentation? or another sample?14:34
dstanekdolphm: docs, user guide - i can read the code for the what/how, but i'm looking for the why14:34
morganfainbergdolphm, i think i can short-cut the 2 tough patches left (been really trying to avoid more tech debt because we've been paying so much back here)14:34
ayoungmarekd, OK, no need to write the file to disk  http://pyxmlsec.labs.libre-entreprise.org/index.php?section=examples&id=314:37
*** amirosh_ has quit IRC14:37
*** amirosh has joined #openstack-keystone14:38
dolphmdstanek: hmm...14:39
stevemarayoung, not much active development going on there14:40
stevemarayoung, https://pypi.python.org/pypi/dm.xmlsec.binding/1.2 looks a bit better14:40
ayoungstevemar, doesn't matter.14:40
dolphmdstanek: there's a blurb here http://docs.openstack.org/admin-guide-cloud/content/keystone-user-management.html14:40
ayoungstevemar, so long as the underlying library is good, the Python should be a thin thin wrapper14:41
ayoungstevemar, marekd I think I want this to go in keystoneclient first and foremost14:41
ayoungclient is going to need to be able to verify signatures, it should be written once.14:41
dolphmdstanek: which has about the only "why" i can think of: start with the default policy files, and then add additional rules/role definitions as you need more granular roles14:41
* ayoung wishes we shipped client out of the same repo as server...ah well14:42
marekdayoung: what 'this'? xml signing?14:42
ayoungmarekd, yep14:42
*** amirosh has quit IRC14:42
openstackgerritRodrigo Duarte proposed a change to openstack/keystone: Create, update and delete hierarchical projects  https://review.openstack.org/11184214:42
ayoungmarekd, right next to cms14:42
marekdayoung: but not *instead* of having it in the server....?14:42
dolphmdstanek: and the v3cloud policy file illustrates the direction we'd like to take default policy, but it's not all the way there because we're still stuck with tenancy-based admin-ness, rather than a higher level tenantless based admin-ness14:42
ayoungkeystoneclient.common.xmlsec14:43
ayoungmarekd, yes, instead14:43
ayoungmarekd, I understand it makes your task more difficult, and I won;t insist14:43
ayoungbut keep it in mind, and get the client reviews started14:43
marekdayoung: it's not about being it difficult or easy.14:44
marekdayoung: you want the server to issue an unsigned assertion ?14:44
marekdand hand it to the client?14:44
dstanekdolphm: thanks14:45
*** hrybacki has joined #openstack-keystone14:47
ayoungmarekd, no14:47
ayoungmarekd, come on...you know I am not that dense14:47
marekdayoung: yeah14:47
ayoungmarekd, the server imports the client as a library14:47
marekdayoung: that's what i wanted to hear.14:47
*** shakamunyi has joined #openstack-keystone14:48
dolphmhenrynash: do you have an implementation of endpoint policy available offline?14:51
*** zzzeek_ has quit IRC14:55
*** zzzeek has joined #openstack-keystone14:55
dolphmhenrynash: "code up later this week" vs {"feature_proposal_freeze": "august 21"}  # need to consider bumping it to kilo if it's not feature complete in gerrit :-/14:56
*** afazekas has quit IRC14:58
marekdstevemar: do you know how to make saml generation work with pysaml?15:00
marekdstevemar: blah....i mean, how to make jenkins not complaining on requirements and pysaml215:00
stevemarmarekd, yeah get this merged: https://review.openstack.org/#/c/113294/15:01
marekdstevemar: okay15:01
stevemarmarekd, thats it :(15:01
*** ukalifon has quit IRC15:01
marekdnothing that needs some work/configuration.15:02
henrynashdolphm: if not by the 21st, I agree15:02
stevemarmarekd, when the user exchanges the token for saml assertion, we should just return text/xml in the header?15:02
stevemarlet the client handle any "real" saml headers15:02
stevemar?15:02
dstanekstevemar: marekd: i was just going to ask you guys about the xmlsec requirement15:02
marekddstanek: xmlsec or pysaml2?15:02
marekddstanek: xmlsec is a binary, use yum/apt for that.15:03
dstanekmarekd: it looks like some of the k2k is failing on jenkins because that's missing15:03
marekddstanek: pysaml2 is mising.15:03
*** jorge_munoz has joined #openstack-keystone15:03
*** gokrokve has joined #openstack-keystone15:03
marekddstanek: i fixed missing xmlsec1 thing with mocking some methods.15:03
stevemardstanek, pysaml2 is missing, and because xmlsec is not included15:03
stevemardstanek, you reviewed the subsequent patch (where marek'd mocking wasn't included)15:04
dstanekstevemar: ah, is there a new patch to mock it out?15:04
stevemardstanek, yeah https://review.openstack.org/#/c/110542/15:05
stevemardstanek, check the tests, jenkins still fails because of the missing pysaml2 requirement15:05
dstanekstevemar: ok, i'll take a look at that one.15:06
stevemarmarekd, i was thinking you could write #noqa for the imports, not sure why it's failing that pep8 check15:08
marekdstevemar: #noqa makes pep ignore the lines, right?15:08
marekdstevemar: thanks, i will fix it.15:08
stevemari think so15:08
dstanekmarekd: is there a reason why the imports in idp.py are mixed?15:09
marekddstanek: yes, pep8 complaining.15:09
openstackgerritRodrigo Duarte proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054215:09
marekddstanek: i think i pasted the pep warning15:09
stevemarmarekd, ^ heads up, rodrigo updated15:09
dstanekmarekd: pep8 wants the thirdpary and stdlib together?15:09
marekddstanek: yes, it thinks saml2 is a stdlib.15:09
marekddstanek: no idea HOW15:10
*** ayoung has quit IRC15:10
marekddstanek: # noqa will do the job?15:10
marekddstanek: as stevemar suggests.15:10
dstanekmarekd: yes it should15:10
stevemarmarekd, i think so, just double space after the line ends15:10
*** ayoung has joined #openstack-keystone15:10
dstanekmarekd: but then again pep8 is acting incorrectly already15:11
marekddstanek: stevemar: let's see.15:11
stevemardstanek, we can fix pep8, then fix this, no idea why it thinks saml2 is stdlib15:11
stevemarmaybe it checks it against globral requirements15:11
marekdstevemar: i don't know how to be honest ;/15:12
stevemarmarekd, dstanek apparently this is how it determines 3rd party or stdlib15:14
stevemarhttps://github.com/openstack-dev/hacking/blob/master/hacking/checks/imports.py#L165-L20415:14
dstanekis there now Python or C libs for xmlsec?15:15
stevemardstanek, the best i could find is here: https://pypi.python.org/pypi/dm.xmlsec.binding15:16
marekddstanek: there is something, but i recall seeing wrappers for wrappers.15:16
openstackgerritBrant Knudson proposed a change to openstack/keystonemiddleware: Hash for PKIZ  https://review.openstack.org/11464615:24
openstackgerritRichard Megginson proposed a change to openstack/keystone: ldap/core deleteTree not always supported  https://review.openstack.org/7489715:26
*** cjellick has joined #openstack-keystone15:29
dstaneki hate when i accidentially use a tox command with -r15:32
*** gyee has joined #openstack-keystone15:41
*** afazekas has joined #openstack-keystone15:42
*** ukalifon1 has joined #openstack-keystone15:42
stevemardstanek, that is pretty awful15:43
stevemardstanek, bknudson thanks for reviewing the API change for exchanging a token for a saml assertion, i guess you guys are fine with the proposed request json?15:44
dstanekstevemar: i was15:45
dstanekholy hell batman, pysaml2's list of requirements is terrible15:46
dolphmoh noes15:46
stevemaruh oh15:46
dstanekzope.interface :-(15:46
bknudsonstevemar: which one is that?15:47
stevemarbknudson, the one you just reviewed - line 956 - https://review.openstack.org/#/c/113998/6/v3/src/markdown/identity-api-v3-os-federation-ext.md15:47
bknudsonstevemar: I didn't look at the interface15:48
bknudsonstevemar: I just noticed it didn't update the version so I don't see how anybody is going to know if it's available or not.15:49
bknudsonif nobody knows that they can use it or not then it's useless15:49
stevemarbknudson, fair enough, i can fix that pretty easily though. Just wanted to make sure folks were OK with using region (it's in the spec) http://specs.openstack.org/openstack/keystone-specs/specs/juno/keystone-to-keystone-federation.html15:49
dolphmdstanek: does anything else in openstack/requirements use zope.interface?15:50
stevemardolphm, list of reqs: decorator, requests, paste, zope.interface, repoze.who, pycrypto, pytz, pyOpenSSL, python-dateutil15:52
stevemartime to look up wth zope is15:52
dolphmstevemar: it's kind of an extensive joke15:52
stevemardolphm, seems like an elaborate extensive joke15:53
dolphmstevemar: ++15:53
dstanekdolphm: not that i know of15:54
dstanekstevemar: it's the joke that keeps on giving - has to be like 15 years now15:54
stevemardstanek, dolphm python-dateutil, zope.interface, and repoze.who are not in global req.15:55
dolphmstevemar: something else could already depend on them though - i'm wondering if they'd be new to our pypi mirror & packagers15:55
stevemardstanek, dolphm the pypi page also says you need xmlsec1 to sign/verify https://pypi.python.org/pypi/pysaml2 - we definitely want to put this under test-requirements :(15:56
dolphmstevemar: what's xmlsec1?15:56
*** chandankumar has joined #openstack-keystone15:57
stevemara binary that installable via apt-get, used to sign xml15:57
openstackgerritguang-yee proposed a change to openstack/keystone-specs: X.509 SSL certificate authentication  https://review.openstack.org/10591315:59
dolphmstevemar: well it's already in wheezy and fedora at least15:59
*** hrybacki has quit IRC16:03
marekddstanek: so, how bad pysaml2 is?16:09
dstanekmarekd: overall i don't know - just crawling through it now; in general since it's optional even if it depends on some strange stuff it should be ok16:11
marekdstevemar: dstanek OK16:12
*** afazekas_ has joined #openstack-keystone16:14
stevemardstanek, marekd *phew*16:15
marekdstevemar: ?16:15
stevemarmarekd, phew -> expressing a strong reaction of relief16:15
marekdty16:15
dolphm*phew* is an onomatopoeia16:17
openstackgerritguang-yee proposed a change to openstack/keystone: Standardizing the Federation Process  https://review.openstack.org/10559716:17
morganfainberghenrynash, +2 on multitenancy spec16:18
morganfainberghenrynash, didn't +A so others can weigh in, but thanks for being aweosme and forcing the continued updates to make it solid16:19
dstanekdolphm: that brings me back the 8th grade English class16:19
*** rushiagr is now known as rushiagr_away16:20
*** marcoemorais has joined #openstack-keystone16:21
*** rushiagr_away is now known as rushiagr16:22
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove trust dependency on token_api  https://review.openstack.org/10946216:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486416:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Update AuthContextMiddleware to not use token_api  https://review.openstack.org/11342916:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Sync with oslo-incubator  https://review.openstack.org/11486316:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove wsgi and base controller dependency on token_api  https://review.openstack.org/11520516:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove identity_api dependency on token_api  https://review.openstack.org/11504516:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add audit ids to tokens  https://review.openstack.org/11430616:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove SAML2 plugin dependency on token_api  https://review.openstack.org/11501216:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Notification Constant Cleanup and internal notify type  https://review.openstack.org/11533716:24
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove assignment_api dependency on token_api  https://review.openstack.org/11533816:24
gyeemorganfainberg, wow, how did you manage to push all the patches at the same time?16:25
marekdgyee: dependencies, i think :-)16:25
gyeeawesome16:26
morganfainberggyee, it's been rebases and it's a massive patch chain16:26
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add __repr__ to KeystoneToken model  https://review.openstack.org/11343016:26
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add extra guarding to revoke_by_audit_id methods  https://review.openstack.org/11514716:26
gyeefor a moment I thought morganfainberg is a alien with 20 fingers16:26
gyee:D16:26
morganfainberggyee, https://review.openstack.org/#/q/status:open+branch:master+topic:bp/non-persistent-tokens,n,z16:26
gyeehierarchical multiprojectcy looks awesome16:27
morganfainbergand there are maybe another 4-5 patches to go in the chain16:27
gyee++ for taking out the reseller lingo16:27
marekdstevemar: I couldn't understand what you meant in samlzie tests: "Match generated key text to key that was used"16:33
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054216:34
marekddstanek: stevemar: rodrigods: ^^ some minor fixes16:35
stevemarmarekd, just that the signature value should match that of the key that was used to sign it16:36
*** RicoLin has quit IRC16:42
*** gokrokve_ has joined #openstack-keystone16:43
*** RicoLin has joined #openstack-keystone16:44
openstackgerritMarek Denis proposed a change to openstack/keystone: IdP SAML Metadata generator  https://review.openstack.org/11485016:46
dstanekstevemar: check out the size of this file https://github.com/rohe/pysaml2/blob/master/tests/InCommon-metadata.xml16:47
*** gokrokve has quit IRC16:47
*** RicoLin has quit IRC16:48
stevemarlol16:49
stevemardstanek, jeez16:49
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove oauth controller dependency on token_api  https://review.openstack.org/11534316:49
*** RicoLin has joined #openstack-keystone16:49
stevemardstanek, looks like he has the metadata for a bunch of universities16:50
henrynashmorganfainberg; np…yep, I think it is pretty solid now16:51
*** harlowja_away is now known as harlowja16:56
morganfainbergoh .. wonderful16:58
morganfainbergsomeone broke versionutils.deprecated to only work with functions or classes, you can't apply it now programatically to methods on objects16:58
* ayoung still trying to move Kerberos client patch to jamies new requests replacement for httpretty. accepting help17:00
marekdstevemar: lol, at least he has pysaml2 tested17:01
stevemarmarekd, thats for sure17:05
mhumarekd, are there any plans for a saml2scopedtoken plugin in keystoneclient ?17:09
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Mark methods on token_api deprecated  https://review.openstack.org/11534717:11
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Mark methods on token_api deprecated  https://review.openstack.org/11534717:16
marekdmhu: how about this: https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/contrib/auth/v3/saml2.py#L428 ?17:17
marekdmhu: and  wrapper: https://gist.github.com/zaccone/509136cfa1c4efca692617:18
openstackgerritA change was merged to openstack/keystone: Fixes an issue with the XMLEquals matcher  https://review.openstack.org/10917717:18
ayoungjamielennox, you awake yet?17:19
stevemardstanek, congrats! finally got that xml fix merged!17:20
dstanekstevemar: about time!17:22
*** amirosh has joined #openstack-keystone17:29
*** hrybacki has joined #openstack-keystone17:31
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Non-persistent Token Driver  https://review.openstack.org/11535517:37
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Non-persistent Token Driver  https://review.openstack.org/11535517:37
* morganfainberg takes a short break before meeting17:38
*** chandankumar has quit IRC17:39
*** shakamunyi has quit IRC17:39
morganfainbergbleh.17:43
openstackgerritMarek Denis proposed a change to openstack/identity-api: Add SAML generation route to OS-FEDERATION  https://review.openstack.org/11399817:47
*** hrybacki has quit IRC17:48
*** tomoiaga has quit IRC17:52
*** dims has joined #openstack-keystone17:56
*** jsavak has joined #openstack-keystone17:57
*** radez is now known as radez_g0n317:58
*** joesavak has quit IRC17:59
openstackgerritA change was merged to openstack/python-keystoneclient: Make auth plugins dest save to os_  https://review.openstack.org/11443518:00
*** joesavak has joined #openstack-keystone18:00
* morganfainberg does the meeting dance: (>'-')> <('-'<) ^(' - ')^ <('-'<) (>'-')> 18:01
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Updated from global requirements  https://review.openstack.org/11162018:02
*** jsavak has quit IRC18:02
*** amirosh has quit IRC18:03
openstackgerrithenry-nash proposed a change to openstack/keystone: Implements backend for policy endpoint extension  https://review.openstack.org/11536218:04
*** radez_g0n3 is now known as radez18:05
openstackgerritOpenStack Proposal Bot proposed a change to openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/11406718:07
*** hrybacki has joined #openstack-keystone18:08
*** browne has joined #openstack-keystone18:10
*** shakamunyi has joined #openstack-keystone18:11
openstackgerrithenry-nash proposed a change to openstack/keystone: Implements backend for policy endpoint extension  https://review.openstack.org/11536218:14
*** aix has quit IRC18:15
openstackgerritBoris Pavlovic proposed a change to openstack/python-keystoneclient: Add shell --profile option to tirgger osprofiler from CLI  https://review.openstack.org/11485618:26
boris-42ayoung ping18:27
*** radez is now known as radez_g0n318:28
*** chandankumar has joined #openstack-keystone18:28
ayoungboris-42, keystone meeting now...but yes?18:29
boris-42ayoung heh I would discuss profiler stuff feature=)18:29
boris-42future*18:29
boris-42ayoung maybe meeting is proper place ;p18:30
*** shakamunyi has quit IRC18:30
ayoung#openstack-meeting18:30
*** dims has quit IRC18:37
*** gokrokve has joined #openstack-keystone18:40
*** shakamunyi has joined #openstack-keystone18:44
*** gokrokve_ has quit IRC18:44
*** gokrokve has quit IRC18:45
*** david-ly_ has joined #openstack-keystone18:50
*** david-lyle has quit IRC18:51
*** rushiagr is now known as rushiagr_away18:54
*** dims has joined #openstack-keystone19:00
*** dims has quit IRC19:00
*** dims has joined #openstack-keystone19:01
boris-42dolphm so lemme take a look at your comments19:02
boris-42dolphm I really don't see big issues to put in default pipeline19:02
boris-42dolphm really, it is stuff on demand19:03
dstanekdolphm: i like the idea of not having an enabled setting19:03
bknudsonwhen someone complains about how slow keystone is I'll just point them at this.19:03
ayoungboris-42, I hear your frustration.  I've been through that thought process myself.  But profilin is not normal operations, and should not be enabled in a default configuration.  The same is true of the Linux Kernel, of any application, etc.  Adding it to the pipeline is not a major roadblock if you need to profile.  If you add it to paste in devstack, I would throw my support behind it.19:03
dolphmayoung: ++19:03
dolphmit should be in devstack by default19:03
boris-42ayoung I need to call this function19:03
boris-42like tinykitty19:03
dolphmbut not in every project's sample configuration file19:03
boris-42instead of profiler19:04
boris-42I created this for production clouds and Operators19:04
boris-42specially19:04
ayoungboris-42, let it be the operators decision to deploy it.19:04
dolphmbknudson: SELECT 1; # SQL needs a better built in expression for DATABSE ARE YOU STILL THERE;19:04
boris-42ayoung they can remove it from api-paste ini19:04
boris-42if they would19:04
boris-42or just put enabled = no19:05
boris-42why removing it?19:05
dolphmbknudson: http://www.youtube.com/watch?v=Kgrt7XZ-BQw19:05
*** dims has quit IRC19:05
ayoungboris-42, because it has the potential, no matter how well reviewed, to leak sensitive data, and Keystone is very security focused.19:06
ayoungboris-42, and profiling touches everything19:06
bknudsonayoung: it does leak sensitive data... it's got the token in the database update19:06
ayoungas I said...19:07
dolphmalong with password queries19:07
*** amirosh has joined #openstack-keystone19:07
dolphmalthough those are hashed19:07
dolphm*nevermind*19:07
boris-42dolphm bknudson  ayoung19:07
boris-42guys19:07
dolphm /v3/credentials, ec2 keys, etc19:07
boris-42can we keep it enabled=False19:07
boris-42in api-paste.ini19:07
dolphmboris-42: and excluded from the default pipeline19:08
boris-42so no data will be send19:08
dstanekhashed or not if you get your hands on all of the hashes you could be in trouble19:08
boris-42dolphm this will make really hard to use it..19:08
*** gyee has quit IRC19:08
raildoayoung: What is Openstack Silicon Valley?19:08
dolphmboris-42: you just explained how easy it was to remove it, it's the same tiny little hurdle to enable it19:08
raildoits like a summit?19:08
boris-42dolphm  https://github.com/stackforge/osprofiler/blob/master/osprofiler/web.py#L98-L9919:08
boris-42dolphm heh did you try to say customer to restart his serviers?19:09
boris-42services?)19:09
boris-42it's really buthurt19:09
boris-42dolphm but okay as you wish19:09
boris-42dolphm but you'll need to wait about 1 year19:09
boris-42dolphm to get this in gates19:10
boris-42dolphm if you are ok with this I will remove19:10
dolphmboris-42: i'm not in a rush, but it'll be nice when it happens19:10
boris-42dolphm can I left then it enabled at least?19:10
boris-42dolphm if it is not in pipelines then it doesn't make any sesne19:10
*** hrybacki has quit IRC19:11
morganfainbergboris-42, getting things into gate isn't that hard to do. but it does take time. I'd rather see this off by default and something that can be enabled when appropriate19:12
dstanekboris-42: is there any reason why the middleware does't do the setup? and then you don't need the enabled config value19:12
dolphmboris-42: i don't think there should be a hard dependency on osprofiler19:12
boris-42morganfainberg this will take a lot)19:12
dstanekboris-42: are they against it?19:13
*** harlowja has quit IRC19:13
boris-42dstanek could you elaborate19:13
boris-42dstanek please at least left it in requiremnts19:13
*** harlowja has joined #openstack-keystone19:13
boris-42dolphm ^19:13
boris-42dolphm it is really super tiny library19:13
*** david-ly_ is now known as david-lyle19:13
dstanekboris-42: why would this be harder for infra than other things?19:13
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Initial kerberos plugin implementation.  https://review.openstack.org/7497419:13
*** bklei has joined #openstack-keystone19:13
*** henrynash has quit IRC19:14
boris-42dstanek cause you need to provide via devstack-gate19:14
boris-42dstanek this thing19:14
boris-42dstanek for example putting 1 argument to change CEILIMETER notifications topics19:14
boris-42dstanek took about 1 month19:14
boris-42dstanek this will be harder to change19:14
boris-42dstanek and will take much more time19:14
*** Guest64178 is now known as med_19:14
*** med_ has joined #openstack-keystone19:14
*** med_ is now known as medberry19:14
openstackgerritJamie Lennox proposed a change to openstack/keystone: Create authentication specific routes  https://review.openstack.org/11490319:15
boris-42dstanek to be honest I don't know how to change this19:15
boris-42dstanek so some R&D will be required19:15
*** zzzeek has quit IRC19:15
dstanekboris-42: i would imagine that it's a tweak to whatever infra uses to roll out the paste configs19:16
boris-42dstanek I don't know I just say that it will take a lot of time19:16
boris-42dstanek I don't say that it is impossible19:16
boris-42dstanek if keystone team is ready to wait it's OK19:16
morganfainbergdstanek, it's a devstack change, in reality i don't even thing devstack-gate needs an update to make it work if devstack accepts it by default19:17
boris-42dolphm it can't be in test requirments19:17
dolphmboris-42: sure it can19:17
dstanekboris-42: that's where our optional deps go19:17
boris-42dstanek the issue is next19:17
*** zzzeek has joined #openstack-keystone19:17
boris-42it is lib19:18
morganfainbergzzzeek, hiya! had a question for you...19:18
boris-42that is imported in code19:18
morganfainbergzzzeek, i.. crap, let me figure out what i was going to ask...19:18
morganfainbergzzzeek was a SQLA question.19:18
dstanekboris-42: i think we can fix that19:18
boris-42https://review.openstack.org/#/c/103368/16/keystone/common/sql/core.py19:18
boris-42how you are going to fix this?19:18
morganfainbergboris-42, try: import ?19:19
boris-42morganfainberg dstanek  dolphm  guuuys19:19
boris-42realy19:19
boris-42who cares is it optional or not??19:19
dolphmboris-42: basically everyone downstream from us19:19
boris-42I mean really it's super tiny lib19:20
dolphmso: us19:20
boris-42that is created for openstack19:20
dstanekboris-42: have other projects already gone through this?19:20
boris-42and if it is not inited it doesn't do anything19:20
boris-42dstanek glance19:20
dolphmboris-42: it doesn't matter how subjectively small or large it is19:20
boris-42dstanek it has enabled it by defult19:20
boris-42dstanek cinder is comming19:20
boris-42dstanek so but it should and can be used by production19:20
boris-42dolphm ^19:21
dolphmboris-42: that's not justifiable logic19:21
dolphmthings can be used in production that are optional19:21
morganfainbergi'd argue it should be off by default *everywhere*19:21
boris-42dolphm btw actually it will be mostly always installed19:21
morganfainbergnot just in keystone, but i only get to have a say when it comes to Keystone19:22
boris-42morganfainberg why cause it's called osprofiler and not tinykititty?19:22
morganfainbergboris-42, because profiling is optional behavior19:22
boris-42morganfainberg yep19:22
boris-42morganfainberg and it's on demand19:22
dolphmwhat is with the kitty reference19:22
morganfainbergboris-42, it should be opt-in not opt-out19:22
boris-42morganfainberg but it's on demand19:22
boris-42morganfainberg not on every request19:22
boris-42morganfainberg and only for admins19:22
morganfainbergboris-42, but it has security ramifications still19:23
morganfainbergit *can* leak data.19:23
dstanekboris-42: but operators can make that decision19:23
morganfainbergand o.. what dstanek said19:23
boris-42dstanek yep I didn't make it NON turnoff able19:23
boris-42dstanek so if somebody would like to turn it off it can be easily done19:23
dolphmboris-42: this isn't a particularly debatable point - and i think you understand why it should not be enabled.19:23
morganfainbergboris-42, by that logic, if someone wants to turn it on, it's super easy to do19:23
boris-42morganfainberg it's super hard19:24
dolphmboris-42: see point 5 http://dolphm.com/reviewing-code/19:24
boris-42morganfainberg you are not allowed to restart services in production but OK19:24
*** gokrokve has joined #openstack-keystone19:24
morganfainbergboris-42, turning it off also requires restarting services. so it isn't easy to turn off19:24
dstanekboris-42: i'm assuming that to get the code for this feature they19:24
dstanekll upgrade and restart19:24
boris-42dolphm guys can I remove default pipes19:25
boris-42dstanek and we will get this change in?19:25
boris-42dstanek dolphm ^19:25
dolphmboris-42: i've already shared my views in code review19:25
boris-42dolphm so I need to remove it from requirments?19:25
boris-42even if it will make code dirty19:27
dolphmboris-42: i would appreciate osprofiler being an optional dependency19:27
boris-42dolphm I can do that, but I'll be unhappy..19:28
dolphmboris-42: again, see point 5 http://dolphm.com/reviewing-code/19:29
boris-42dolphm you see, I have some points in my list as well.. Like if something requires confiugtaion it doesn't work19:30
boris-42dolphm and so on=)19:30
boris-42dolphm this thing requires configuration => osprofiler doesn't work in keystone19:30
dolphmboris-42: strong documentation19:30
boris-42dolphm it works when you are making 100 lines of code application, but not when you have 20 projects with 100 services19:30
boris-42dolphm and 4000 conf options19:30
boris-42it's really hard to being expert in all projects in all services in all conf options19:31
boris-42to get everything work19:31
dolphmboris-42: fortunately we don't have 100 hard dependencies on optional features19:31
boris-42but as I said, I'll do as you ask19:31
dolphmayoung, bknudson, dstanek, jamielennox, morganfainberg, stevemar, gyee, henrynash, lbragstad: i meant to share during the meeting, but if you're looking for juno-3 reviews, i'm going to maintain a list here through juno-rc1 https://gist.github.com/dolph/651c6a1748f69637abd019:33
dolphmhopefully this will be nothing but review links by the end of the week19:33
lbragstaddolphm: cool, thanks19:33
morganfainbergdolphm, ++19:34
lbragstadall, btw bug reports for this week are looking good, http://50.56.175.133/keystone-bug-reports/19:34
stevemardolphm, nice19:34
dolphmlbragstad: i totally glazed over your new section until the very end of the meeting :(19:34
lbragstadnew bugs have at least been acknowledged and most are in progress19:34
stevemardolphm, i'll add comments, missing some i think19:34
morganfainbergreally generate_sample has no effect on os x"?19:34
dolphmlbragstad: i'm not used to having subsections :P19:34
*** RicoLin has quit IRC19:34
lbragstaddolphm: no worries, it's just there for reference19:35
dolphmmorganfainberg: none19:35
morganfainberghmm19:35
dolphmmorganfainberg: something it's calling at the end uses different options in the bsd build19:35
morganfainbergbut the generate sample from tox works19:35
dolphmmorganfainberg: not for me19:35
lbragstadit's setup to generate a new report every 15 minutes,19:35
*** amirosh has quit IRC19:35
morganfainberghhhhhhmmmmm19:35
jamielennoxbknudson: i wanted to get your opinion on the newer https://review.openstack.org/#/c/90632/ and the follow up19:36
dolphmmorganfainberg: the python version works fine19:36
dolphmbut there's bknudson's sort order issue with it19:36
morganfainbergdolphm, oh is that the new thing?19:36
boris-42dolphm actually do we need my patch tne?19:37
dolphmmorganfainberg: yeah, i have a patch in gerrit for keystone to use it19:37
boris-42dolphm I mean it doesn't add antyhing..19:37
morganfainbergdolphm, ah19:37
boris-42dolphm just changes test-requriments.txt19:37
bknudsonjamielennox: is it going to work now? you had a -1 on it since... tenant_id in nova endpoint?19:37
boris-42dolphm I really don't see any benefit ..19:37
openstackgerritHenrique Truta proposed a change to openstack/keystone: Base methods to handle hierarchical projects  https://review.openstack.org/11184119:37
openstackgerritHenrique Truta proposed a change to openstack/keystone: Add parent_project_id field  https://review.openstack.org/11184019:37
*** bklei has quit IRC19:37
openstackgerritHenrique Truta proposed a change to openstack/keystone: Create, update and delete hierarchical projects  https://review.openstack.org/11184219:37
boris-42dolphm if there is proper documentation people just can make hot patches19:37
jamielennoxbknudson: so i made it a regexp so i think we can at least write a rule to accept tenant_id19:37
jamielennoxbknudson: the problem is the build back up19:37
dolphmboris-42: ... if you don't need to integrate with any other service, then why are you?19:38
boris-42dolphm ?19:38
dolphmboris-42: maybe i don't understand your question19:38
boris-42dolphm other services are agree to accept it on normal basis19:38
jamielennoxbknudson: so if i want to use nova v3 and i get a nova v1 endpoint, then i strip off the path including tenant id, then i want to use v3 which lets assume still contains a tenant_id in the url19:38
boris-42dolphm I mean the idea was next19:38
boris-42dolphm make it work out of box19:38
boris-42dolphm but turn off able19:38
dolphmboris-42: this conversation has gotten expensive19:39
boris-42dolphm and make teams work on required points19:39
jamielennoxit means we can't just append the URL we find from discovery, we need to append extra stuff19:39
bknudsonjamielennox: is it some kind of nova plugin that handles nova endpoints?19:39
morganfainbergdolphm, just ran tox -esample_config which calls {toxinidir}/tools/config/generate_sample.sh and it updated the sample config19:39
morganfainbergdolphm or is it ony broken on the new one?19:39
boris-42dolphm e.g. special good points for specific places..19:39
boris-42dolphm and in keystone there is no points except DB and middleware19:39
morganfainbergdolphm, eh doesn't matter more important fish to fry :)19:39
jamielennoxbknudson: it's not a plugin - i was thinking maybe the client could register it's own hacks but i'm not sure how reasonable that is19:39
boris-42dolphm middleware should be removed, requirements should be removed, DB is just 2 lines of code19:39
dolphmboris-42: great19:40
boris-42dolphm so abonding patches/19:40
boris-42?19:40
bknudsonjamielennox: ok, I'll take a look at it with that in mind19:40
jamielennoxbknudson: so have a look at the follow u to that which is marked WIP19:40
dolphmmorganfainberg: it's been broken for me as long as it's been in keystone19:40
morganfainbergdolphm, weird.19:40
dolphmmorganfainberg: i'm on OS X 10.9 atm19:40
zzzeekmorganfainberg: sup19:40
morganfainbergdolphm, same, and nullptr:ks2 morgan$ brew list19:40
morganfainberggdbmgettextopensslpythonreadlinesqlite19:40
morganfainbergzzzeek, i can't remember the question :( sorry19:41
zzzeek:)19:41
boris-42dolphm abandoned this patch sorry for taking too much time..19:44
openstackgerritRaildo Mascena de Sousa Filho proposed a change to openstack/identity-api: API documentation for Hierarchical Multitenancy  https://review.openstack.org/11135519:51
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Initial kerberos plugin implementation.  https://review.openstack.org/7497419:54
*** chandankumar has quit IRC19:56
*** RicoLin has joined #openstack-keystone19:58
stevemardolphm, i don't understand your email re: tempfile, the docs only say mktemp is a security issue19:59
stevemarNamedFile and mkstemp are OK19:59
dstanekmorganfainberg: you around?20:05
openstackgerritA change was merged to openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/11405920:09
*** andreaf_ has joined #openstack-keystone20:11
dstanekmkstemp should be ok to use, but is there anyway to get around needing a temp file at all?20:11
*** gordc has quit IRC20:11
*** andreaf_ has quit IRC20:12
*** gordc has joined #openstack-keystone20:12
*** andreaf_ has joined #openstack-keystone20:12
*** andreaf_ has quit IRC20:12
*** andreaf_ has joined #openstack-keystone20:13
*** andreaf has quit IRC20:14
morganfainbergdstanek, hey20:17
morganfainbergdstanek whats up20:17
morganfainbergdstanek was about to grab lunch but am here for a moment20:17
openstackgerritMorgan Fainberg proposed a change to openstack/identity-api: Update revoke-ext  https://review.openstack.org/11485720:18
dstanekmorganfainberg: was going through your audit_id reviews, but i answered by own question20:18
morganfainbergdstanek, cool20:18
stevemardolphm, bknudson question for y'all, if i want to add new a "New in Version X.Y" for OS-FEDERATION... what should X.Y be?20:22
stevemarshould it follow keystone's 3.3?20:22
bknudsonstevemar: each extension has its own version20:22
bknudsonI think this would be 1.120:22
stevemarbknudson, so 1.1?20:22
stevemaralrighty20:23
openstackgerritSteve Martinelli proposed a change to openstack/identity-api: Add SAML generation route to OS-FEDERATION  https://review.openstack.org/11399820:28
stevemarbknudson, for you sir ^20:28
openstackgerritA change was merged to openstack/keystone: Use python convention for function names in test_notifications  https://review.openstack.org/11481120:30
openstackgerritSteve Martinelli proposed a change to openstack/identity-api: Update region entries to include URLs  https://review.openstack.org/11411820:33
*** gyee has joined #openstack-keystone20:36
*** dims has joined #openstack-keystone20:37
*** dims has quit IRC20:45
*** shakamunyi has quit IRC20:46
*** andreaf_ has quit IRC20:54
*** andreaf_ has joined #openstack-keystone20:54
*** andreaf_ has quit IRC20:54
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054220:56
stevemardstanek, thanks for the suggestions, included a few here ^20:56
openstackgerritayoung proposed a change to openstack/python-keystoneclient: Initial kerberos plugin implementation.  https://review.openstack.org/7497421:05
*** browne has quit IRC21:05
*** browne has joined #openstack-keystone21:06
*** samuelmz has quit IRC21:08
marekdstevemar: i have comments for you on https://review.openstack.org/#/c/110542/21:09
marekddolphm: ^^ for you too21:09
stevemarmarekd, ughhh21:10
marekdstevemar: i'd wait for Dolph....21:10
*** jasondotstar has quit IRC21:11
*** rodrigods has quit IRC21:11
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Enumerate Projects with Unscoped Tokens  https://review.openstack.org/10683821:12
*** henrique_ has quit IRC21:12
*** gabriel-bezerra has quit IRC21:13
*** gabriel-bezerra has joined #openstack-keystone21:13
dstanekmarekd: looks like you beat me to it21:13
*** raildo has quit IRC21:13
*** rodrigods has joined #openstack-keystone21:14
*** rodrigods has quit IRC21:14
*** rodrigods has joined #openstack-keystone21:14
marekddstanek: hum?21:14
*** henrique_ has joined #openstack-keystone21:14
*** raildo has joined #openstack-keystone21:14
dstanekmarekd: https://review.openstack.org/#/c/11054221:14
*** samuelmz has joined #openstack-keystone21:15
openstackgerritMarek Denis proposed a change to openstack/keystone: IdP SAML Metadata generator  https://review.openstack.org/11485021:18
marekddstanek: stevemar do you mind making a first iteraion on this one? ^^ ?21:18
stevemaryep, it's on my list21:18
marekdstevemar: thanks!21:20
dstanekmarekd: sure21:22
*** marekd is now known as marekd|away21:23
*** fifieldt has quit IRC21:27
*** gokrokve has quit IRC21:28
*** henrynash has joined #openstack-keystone21:37
*** henrynash has quit IRC21:37
dstanekmorganfainberg: got a new quesiton when you have a few21:37
*** fifieldt has joined #openstack-keystone21:41
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Auth plugin serialization  https://review.openstack.org/11316321:41
morganfainbergdstanek, back21:44
morganfainbergdstanek, just finished lunch21:45
morganfainbergdstanek, what can i answer for you21:45
*** gokrokve has joined #openstack-keystone21:45
openstackgerritThiago Paiva Brito proposed a change to openstack/keystone: Create, update and delete hierarchical projects  https://review.openstack.org/11184221:46
morganfainbergdstanek, answered your question on the identity-api review21:49
morganfainberg(inline)21:49
dstanekmorganfainberg: that's basically what i wanted to ask about21:51
*** diegows has joined #openstack-keystone21:51
dstanekmorganfainberg: what is the expected value of that list if the token is a re-scoped token or a re-scoped token?21:52
morganfainberg[<audit id of this token>, <audit id of the first token in the chain>]21:53
morganfainbergdstanek, if the token is the first in the chain it'll be [<audit id of this token>]21:53
morganfainbergdstanek, basically i'm doing the same thing that expires_at is doing, just with the audit ids, (and adding a unique id for the current token)21:54
dstanekmorganfainberg: token1 is ['token1-audit_id'], token2 is ['token2-audit_id', 'token1-audit_id'], is token3 the same as token2?21:56
morganfainbergdstanek, token three would be ['token-3-audit-id', 'token1-audit-id']21:57
dstanekoh, i see that now in the token plugin21:58
morganfainbergyeah21:58
morganfainbergit lets us track a group of tokens, but not create an unbounded dataset21:58
openstackgerritBrant Knudson proposed a change to openstack/keystone-specs: Hierarchical Multitenacy  https://review.openstack.org/10101721:59
openstackgerritBrant Knudson proposed a change to openstack/keystone-specs: Fix rst issues in hierarchical multitenancy  https://review.openstack.org/11541121:59
dstaneki've browsed the first few patches in the chain and i think i'm getting lost in them now :-)21:59
bknudsonoops, I just rebased https://review.openstack.org/101017.22:00
morganfainbergdstanek, how do you think i felt when i ran into a bug 5 deep and realized it was in the first... or was that the second...or was it the 5th patch22:00
uvirtbotLaunchpad bug 5 in launchpad "Plone Placeless Translation Service metadata missing from po files" [Low,Fix released] https://launchpad.net/bugs/522:00
*** gokrokve has quit IRC22:00
morganfainbergbknudson, nbd. those don't take long to pass check22:00
morganfainberguvirtbot, good bot, keep up the work!22:00
uvirtbotmorganfainberg: Error: "good" is not a valid command.22:00
morganfainberglol22:01
bknudsonif only there were 5 bugs.22:01
morganfainbergdstanek, could smush them all together into a mega patch if that would help :P it's only ~1500 lines of change :P22:01
dstanekmorganfainberg: yes please!22:02
morganfainbergdstanek, for the *most* part all of these changes affect only one system so review it like that22:02
morganfainbergdstanek, e.g. identity_core22:02
morganfainbergdstanek, except the auth context one. that one touches a lot of stuff22:03
*** jsavak has joined #openstack-keystone22:04
openstackgerritA change was merged to openstack/keystone: Enable filtering of credentials by user ID  https://review.openstack.org/11323222:05
*** gordc has quit IRC22:07
*** joesavak has quit IRC22:07
*** joesavak has joined #openstack-keystone22:08
*** gordc has joined #openstack-keystone22:08
*** jsavak has quit IRC22:09
openstackgerritA change was merged to openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/11406722:10
*** gokrokve has joined #openstack-keystone22:12
*** HenryG_ has joined #openstack-keystone22:17
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Create SAML generation route and controller  https://review.openstack.org/11413822:18
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054222:18
*** nkinder has quit IRC22:18
*** gokrokve has quit IRC22:19
*** HenryG has quit IRC22:19
*** gokrokve has joined #openstack-keystone22:19
*** nkinder has joined #openstack-keystone22:20
dstanekmorganfainberg: are there any tests in that patch that show that behavior?22:21
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Allow unauthenticated discovery  https://review.openstack.org/10757022:21
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Make keystoneclient use an adapter  https://review.openstack.org/9768122:21
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Allow providing a default value to CLI loading  https://review.openstack.org/11374222:21
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Fix handling of deprecated opts in CLI  https://review.openstack.org/11385922:21
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Version independent plugins  https://review.openstack.org/8114722:21
morganfainbergdstanek, which behavior?22:21
morganfainbergdstanek, only 2 audit ids?22:22
dstanekmorganfainberg: yeah22:22
morganfainbergdstanek, the base unit tests are here: https://review.openstack.org/#/c/114306/7/keystone/tests/unit/token/test_token_data_helper.py and assertEqualTokens here https://review.openstack.org/#/c/114306/7/keystone/tests/test_auth.py22:23
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054222:23
morganfainbergdstanek, the assertEqualTokens explicitly checks for a len of < 322:23
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Create SAML generation route and controller  https://review.openstack.org/11413822:23
*** gokrokve has quit IRC22:24
stevemarrebase-a-mania22:24
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Make keystoneclient use an adapter  https://review.openstack.org/9768122:25
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Allow providing a default value to CLI loading  https://review.openstack.org/11374222:25
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Version independent plugins  https://review.openstack.org/8114722:25
morganfainbergugh. trying to unwind this: http://paste.openstack.org/show/97515/22:32
morganfainbergi...22:32
*** henrynash has joined #openstack-keystone22:37
*** harlowja has quit IRC22:39
*** harlowja has joined #openstack-keystone22:39
*** zzzeek has quit IRC22:42
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Add CADF notifications for role assignment create and delete  https://review.openstack.org/11220422:46
jamielennoxmorganfainberg: oh, i remember that stuff - i didn't expect you'd have to mess with that, it's not fun22:47
*** zzzeek has joined #openstack-keystone22:47
morganfainbergjamielennox, it's kinda making me cry some :(22:47
jamielennoxmorganfainberg: that was where my sec vuln came from, cause it's just a mess22:47
morganfainbergjamielennox, i'm really trying to not just completly re-write it22:48
morganfainbergbecause it'll be so freaking hard to follow22:48
jamielennoxyep, there's no comments either22:48
morganfainbergoh god i am going to have to re-write it.22:49
morganfainbergthere is no way around it.22:49
jamielennoxi'm surprised it's impacting your stuff22:49
jamielennoxi assume you mean around the non-persistent stuff22:50
morganfainbergbasically, trying to conver things over to using the CMS data22:50
morganfainberge.g. what we extract from a pki token is giving me hell. and it's all the awfulness that is the v2 stuff22:50
morganfainbergi'm going to need to completely re-write the v2 token provider bits :(22:51
*** jorge_munoz has quit IRC22:51
openstackgerritJamie Lennox proposed a change to openstack/identity-api: API for auth-specific-data routes  https://review.openstack.org/11542322:51
openstackgerritJamie Lennox proposed a change to openstack/keystone-specs: Add deprecation tasks to auth-specific-data  https://review.openstack.org/11542422:51
morganfainbergand how important it is it to maintain compat with OOOOOLD tokens                 # token is created by old v2 logic22:51
morganfainberglike pre-provider logic22:52
morganfainbergi'm guessing we can ditch that code.22:52
* morganfainberg is surprised we don't get other strange errors.22:52
jamielennoxmorganfainberg: keystone-lite-lite22:53
dstanekmorganfainberg: i was hoping to see a test like this: http://paste.openstack.org/show/97524/22:58
morganfainbergdstanek, easy to add into the mix. can just stick it as a patch dependant on that one, if that works (the one adding audit_ids to tokens in the first place)22:59
morganfainbergdstanek, or if you really want i'm happy to stick that into the one you're looking at now22:59
dstanekmorganfainberg: either way is fine with me23:00
*** bknudson has quit IRC23:01
*** shakamunyi has joined #openstack-keystone23:02
*** gordc has quit IRC23:02
*** vkmc has joined #openstack-keystone23:04
*** browne has left #openstack-keystone23:07
openstackgerritDavid Lyle proposed a change to openstack/keystone: Fixing simple type in comment  https://review.openstack.org/11542923:07
*** zzzeek_ has joined #openstack-keystone23:08
*** zzzeek has quit IRC23:08
*** zzzeek_ is now known as zzzeek23:08
*** zzzeek has quit IRC23:10
morganfainbergdstanek, ok i'll include that test since i need to reroll the patch to address your and brant's comments23:14
dstanekmorganfainberg: sounds good. thanks!23:16
*** shakamunyi has quit IRC23:18
*** joesavak has quit IRC23:19
vkmcdolphm, ayoung around?23:22
*** shakamunyi has joined #openstack-keystone23:33
*** toddnni has quit IRC23:36
*** toddnni has joined #openstack-keystone23:36
jamielennoxstevemar: you may as well comment on the changes to wording in the deprecate federation routes review because there is a newline in there that bknudson is going to pull me up on for sure23:36
jamielennoxgyee: https://review.openstack.org/#/c/105314/8 is a refactor, what tests would you liek?23:39
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add audit ids to tokens  https://review.openstack.org/11430623:40
morganfainbergdstanek, ^ that should address your comments and brant's23:40
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Sync with oslo-incubator  https://review.openstack.org/11486323:40
gyeejamielennox, no tests?23:41
jamielennoxgyee: all i did was factor it into a class and subclass23:41
jamielennoxthere are existing tests that cover the cache23:41
dstanekmorganfainberg: cool, i'll circle back in a bit; looking at https://review.openstack.org/#/c/114864 now, but will finish after dinner23:42
*** HenryG_ is now known as HenryG23:42
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486423:42
gyeejamielennox, k, I'll double check on the existing tests. Seem like code change of this magnitude should at least come with some unit tests.23:43
*** david-lyle has quit IRC23:44
*** david-lyle has joined #openstack-keystone23:45
*** david-lyle has quit IRC23:45
gyeemorganfainberg, https://review.openstack.org/#/c/108384/8/keystonemiddleware/tests/test_auth_token_middleware.py23:46
gyeeline 21523:46
gyeewtf's http code 418 I am a teapot?23:46
jamielennoxgyee: it's an old review at this point that is just a nicety, i'm not commited to it23:46
morganfainberggyee, lol23:46
morganfainberggyee, april 1st RFC23:46
gyeemorganfainberg, Stuart slip one in there :)23:47
morganfainberglooks like he did, i mean, it's useful for testing things that otherwise woulnd't be valid i guess23:47
*** ncoghlan_afk is now known as ncoghlan23:47
gyeeyeah, like the humor23:48
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add audit ids to tokens  https://review.openstack.org/11430623:49
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Sync with oslo-incubator  https://review.openstack.org/11486323:49
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486423:50
gyeejamielennox, on my todo list, need to review your chain of patches for keystoneclient23:50
jamielennoxgyee: appreciated, if you want to cheat there are a couple with a +2 on it already23:50
*** ncoghlan is now known as ncoghlan_afk23:51
gyeemorganfainberg, https://review.openstack.org/#/c/108384/ looks good23:57
morganfainberggyee, cool23:57

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!