Monday, 2014-08-25

openstackgerritJamie Lennox proposed a change to openstack/identity-api: API for auth-specific-data routes  https://review.openstack.org/11542300:01
jamielennoxstevemar: think i figured it out ^00:03
jamielennox no rush00:03
stevemarjamielennox, ah i see what you mean00:04
stevemari think endpoint policy is going to do the same thing00:04
jamielennoxstevemar: i think that's clear enough though00:05
stevemarerrr.... re: the versioning00:06
stevemarjamielennox, would you hate me if i had a minor wording issue :)00:09
stevemarjamielennox, can you change:00:10
stevemarDeprecate list projects and domains in favour of core functionality available in v3.300:10
stevemarto:00:10
stevemarDeprecate list projects and domains in favour of core functionality available in Identity API v3.300:10
bknudsonshould be favor00:12
openstackgerritJamie Lennox proposed a change to openstack/identity-api: API for auth-specific-data routes  https://review.openstack.org/11542300:12
jamielennoxstevemar: done00:12
stevemarbknudson, jamielennox and i live by the queens english!00:13
jamielennoxbknudson: ah, that's one of those american things that my spell checker won't tell me00:13
jamielennoxstevemar: find and replace everything throughout identity-api with proper english spelling00:14
*** topol has joined #openstack-keystone00:17
jamielennoxbknudson: did you have any luck with the nova/neutronclient thing?00:17
jamielennoxor i should just ask you tomorrow and let you finish the weekend00:17
bknudsonjamielennox: no. I told nova I wasn't going to get it done so have abandoned it.00:18
jamielennoxbknudson: do you have any specific blockers i need to fix in keystoneclient?00:18
*** alex_xu has joined #openstack-keystone00:18
jamielennoxi was going to have another look at the nova/cinderclient bit00:18
bknudsonjamielennox: this is where I got to: https://review.openstack.org/#/c/113735/00:19
jamielennoxthe bypass url bit i know already00:19
bknudsonso the first change I was trying to make was to have sessions support for what nova is currently doing...00:19
bknudsonwhich is token or userid/username + password00:19
bknudsonfirst oddity is that neutronclient supports different auth_strategies.00:20
jamielennoxyea, novaclient does that - as far as i'm aware no-one ever wrote any other auth_strategies00:20
bknudsonsessions only works with keystone auth strategy, so I kept the old code for non-keystone auth strategy00:20
bknudsonneutronclient does have another auth strategy... I think it's noauth00:20
bknudsonI'm not sure if there's been a release of neutronclient with session support yet.00:21
bknudsonthen I ran into the issue with the v2 auth plugin didn't support userId, which I think is fixed now.00:21
jamielennoxi'm scared to look00:21
bknudsonand released00:21
jamielennoxreleased?00:21
bknudsonmaybe it was keystonemiddlewaret that was released...00:22
jamielennoxoh? cool didn't realize that00:22
jamielennoxyea, i don't see any new release for ksc00:22
bknudsonI think the token_endpoint plugin was the right one to use for when a token is given...00:24
bknudsonI was hoping that I'd be able to get rid of the CONF.neutron.url00:24
bknudsonbut if nova has to support token auth then it's going to need the neutron URL00:24
bknudsonmaybe the catalog from auth should be used instead.00:24
bknudsonor the new token auth plugin from auth_token middleware00:25
jamielennoxbknudson: yea, it should be doing catalog but we can only move it so fast00:25
bknudsonso that's the v2 auth00:25
bknudsonthen next step is to support v3 auth, which involves adding a bunch of config options00:25
bknudsonthen the step after that is to support version discovery.00:25
jamielennoxi was hoping that nova would be a huge beneficiary of the auth plugin from middleware. However i don't know if they'll accept it going across as part of the context00:25
jamielennoxso it's not the nova-api that's doing the work so it serializes everything and puts it in context00:26
jamielennoxi wrote https://review.openstack.org/#/c/113163/ specifically for this00:26
bknudsonjamielennox: the use case is nova connecting to neutron.00:27
jamielennoxbut i think there are stability requirements on that context object and i don't think they'll be happy adding a whole lot of redundant information to it00:27
bknudsonfor neutron comm we need the token and the catalog... isn't that what's in the plugin?00:28
jamielennoxyes00:28
bknudsondeprecate the other fields so we can get rid of them instead.00:28
bknudsonmake it so you can get the token and catalog from the plugin00:28
jamielennoxhttps://github.com/openstack/nova/blob/master/nova/context.py#L4700:28
jamielennoxhttps://github.com/openstack/nova/blob/master/nova/context.py#L12200:29
jamielennoxthis is the information that nova packages and sends as part of every RPC00:29
jamielennoxbecause of that i think it needs to be stable because workers may be on different nova versions00:29
bknudsonhow could the auth_token be useful going across rpc?00:29
*** richm has quit IRC00:30
jamielennoxuser_id, service_catalog all that stuff is from the user's token00:30
bknudsonoh, it's got the service catalog too00:30
jamielennoxnot just that: https://github.com/openstack/nova/blob/master/nova/context.py#L82-L8800:31
bknudsonI think they might strip the service catalog down.00:31
jamielennoxit's got a modified service catalog00:31
jamielennoxand i bet this is why neutron has it's own config URL because it's not actually part of the service catalog00:31
jamielennoxthey did that instead of adding it00:31
bknudsonstill I don't see the point of the auth_token... unless it's a trust token it could be revoked.00:31
jamielennoxso the place i know it's used is in cinder, nova will need to mount volumes as part of the VM boot process00:32
jamielennoxthat's something that needs to be done by a worker, not the API process so it has to send all that info00:32
jamielennoxi don't know about the interaction with neutron if there is anything that happens after boot00:33
bknudsonright... neutron isn't done by the worker?00:33
bknudsonI didn't look into it.00:33
jamielennoxi honestly have no idea00:33
*** hrybacki has quit IRC00:33
bknudsonso anyways that's where the nova / neutron work went.00:34
jamielennoxhmm, maybe this is why nova uses it's own auth to talk to neutron because it can't assume the user's token is valid00:34
bknudsonsince it didn't look like I'd be able to get it proposed by their cutoff I told them not to worry about it.00:34
bknudsonI can imagine nova might just want to get neutron to do something when it's not on the user's behalf00:35
jamielennoxok, so particularly need a bypass url and to look more into the existing auth_strategy00:35
bknudsonwouldn't nova have to talk to cinder to unmount the volume?00:36
jamielennoxi guess this is a X-Service-Token situation00:36
bknudsonor does it use the user's token for that too?00:36
jamielennoxis that an explicit call? can it just drop the connection?00:36
bknudsongood question00:36
jamielennoxhttps://github.com/openstack/nova/blob/master/nova/volume/cinder.py00:36
bknudsonI actually didn't look into whether neutron ever uses the username/password auth.00:36
jamielennoxneutron did some nasty things to get itself going00:37
*** mitz has joined #openstack-keystone00:37
jamielennoxso there are explicit calls in there to detach from cinder - maybe this is ok because you need to make an explicit call to nova to drop the VM?00:38
bknudsonthere must be times when nova drops a vm on its own.00:38
bknudsonmaybe not00:38
jamielennoxor on behalf of heat or someone00:39
bknudsonI would think if the vm was misbehaving00:39
bknudsonor if the vm went away on its own... like a local shutdown or something.00:39
jamielennoxi think it just goes into an error state00:39
jamielennoxbut if that's true i would expect the same things of neutron00:40
*** richm has joined #openstack-keystone00:43
*** ncoghlan has joined #openstack-keystone00:57
*** mitz has quit IRC01:01
*** mitz has joined #openstack-keystone01:04
*** mitz has quit IRC01:13
*** mitz has joined #openstack-keystone01:16
*** alex_xu has quit IRC01:27
*** wwriverrat has quit IRC01:43
*** oomichi has joined #openstack-keystone01:52
*** alex_xu has joined #openstack-keystone02:03
*** hrybacki has joined #openstack-keystone02:08
*** richm has quit IRC02:16
*** ukalifon1 has joined #openstack-keystone02:29
*** diegows has quit IRC02:41
*** dims has quit IRC02:44
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Allow overriding endpoint URLs in session  https://review.openstack.org/11654302:45
jamielennoxbknudson: I assume you're not here but this should work for overriding the URL ^02:46
*** dims has joined #openstack-keystone02:47
*** dims has quit IRC02:47
*** KanagarajM has joined #openstack-keystone02:51
*** KanagarajM has quit IRC02:54
*** hrybacki has quit IRC02:55
*** jasondotstar has quit IRC03:26
stevemarbknudson, sometimes you have the best comments03:36
stevemar"Limitations: all of them."03:36
*** ukalifon1 has quit IRC03:46
*** dims has joined #openstack-keystone03:48
*** gokrokve has joined #openstack-keystone03:53
*** dims has quit IRC03:53
*** amirosh has joined #openstack-keystone03:58
*** stevemar has quit IRC04:02
*** gokrokve has quit IRC04:10
*** gokrokve has joined #openstack-keystone04:15
*** ncoghlan is now known as ncoghlan_afk04:25
*** gokrokve has quit IRC04:27
*** gokrokve has joined #openstack-keystone04:28
*** gokrokve has quit IRC04:32
*** dims has joined #openstack-keystone04:53
*** dims has quit IRC04:59
*** ncoghlan_afk is now known as ncoghlan05:00
*** topol has quit IRC05:26
*** rushiagr_away is now known as rushiagr05:32
*** ukalifon has joined #openstack-keystone05:41
*** ajayaa has joined #openstack-keystone05:45
*** miqui has quit IRC06:00
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/11192006:05
*** k4n0 has joined #openstack-keystone06:05
*** afazekas has joined #openstack-keystone06:11
openstackgerritA change was merged to openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/11616506:15
*** ajayaa has quit IRC06:18
*** alex_xu has quit IRC06:29
*** ajayaa has joined #openstack-keystone06:38
*** alex_xu has joined #openstack-keystone06:41
*** dims has joined #openstack-keystone06:42
*** dims has quit IRC06:47
*** nkinder has quit IRC06:50
*** nkinder has joined #openstack-keystone06:51
*** rushiagr is now known as rushiagr_away07:00
*** rushiagr_away is now known as rushiagr07:02
*** wanghong has quit IRC07:10
*** jamielennox is now known as jamielennox|away07:33
*** praneshp has quit IRC07:34
*** bvandenh has joined #openstack-keystone07:35
*** ncoghlan has quit IRC08:03
*** fmarco76 has joined #openstack-keystone08:15
*** fmarco76 has left #openstack-keystone08:15
*** mflobo has joined #openstack-keystone08:20
*** dims has joined #openstack-keystone08:31
*** dims has quit IRC08:36
*** bdossant_ has joined #openstack-keystone08:38
*** k4n0 has quit IRC08:39
openstackgerrithenry-nash proposed a change to openstack/keystone: controller for the endpoint policy extension  https://review.openstack.org/11574608:52
*** k4n0 has joined #openstack-keystone08:53
*** KanagarajM has joined #openstack-keystone08:55
*** rushiagr is now known as rushiagr_away09:03
*** wanghong has joined #openstack-keystone09:07
openstackgerrithenry-nash proposed a change to openstack/keystone: backend for policy endpoint extension  https://review.openstack.org/11536209:09
openstackgerrithenry-nash proposed a change to openstack/keystone: Make SQL the default backend for Identity & Assignment unit tests.  https://review.openstack.org/11652809:17
openstackgerrithenry-nash proposed a change to openstack/keystone: Make SQL the default backend for Identity & Assignment unit tests.  https://review.openstack.org/11652809:18
*** ajayaa has quit IRC09:31
*** ajayaa has joined #openstack-keystone09:32
*** swartulv has quit IRC09:42
openstackgerrithenry-nash proposed a change to openstack/keystone: controller for the endpoint policy extension  https://review.openstack.org/11574609:44
*** swartulv has joined #openstack-keystone09:45
ekarlsois there a smart way to improve keystone performance ?10:28
*** ChrisWentz has joined #openstack-keystone10:42
ChrisWentzHi, does anyone know how to add a keystone tenant and user, i have tried to add it using the guides but it fails10:43
*** ChrisWentz has quit IRC10:46
*** k4n0 has quit IRC10:47
*** k4n0 has joined #openstack-keystone10:59
*** dims has joined #openstack-keystone11:29
*** nkinder has quit IRC11:36
openstackgerritKanagaraj Manickam proposed a change to openstack/keystone: Endpoint table is missing reference to region table  https://review.openstack.org/11318311:37
*** KanagarajM has quit IRC11:49
*** ukalifon2 has joined #openstack-keystone11:54
*** ukalifon has quit IRC11:55
*** f13o has joined #openstack-keystone12:00
*** nkinder has joined #openstack-keystone12:01
*** bvandenh has quit IRC12:18
*** bvandenh has joined #openstack-keystone12:19
*** hrybacki has joined #openstack-keystone12:28
*** hrybacki has quit IRC12:33
*** jasondotstar has joined #openstack-keystone12:34
*** gordc has joined #openstack-keystone12:39
openstackgerritA change was merged to openstack/keystone: Add CADF notifications for role assignment create and delete  https://review.openstack.org/11220412:49
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Updated from global requirements  https://review.openstack.org/11162012:52
*** dims has quit IRC13:06
*** Kui has quit IRC13:06
*** dims has joined #openstack-keystone13:06
*** saipandi has joined #openstack-keystone13:13
*** richm has joined #openstack-keystone13:14
*** bknudson has quit IRC13:18
openstackgerritRodrigo Duarte proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054213:18
*** chandankumar has joined #openstack-keystone13:20
*** stevemar has joined #openstack-keystone13:31
*** bdossan__ has joined #openstack-keystone13:32
*** bdossan__ has quit IRC13:32
*** nkinder has quit IRC13:33
*** bdossant_ has quit IRC13:33
*** k4n0 has quit IRC13:35
*** ukalifon2 has quit IRC13:36
openstackgerritStuart McLaren proposed a change to openstack/keystonemiddleware: Add composite authentication support  https://review.openstack.org/10838413:37
*** bknudson has joined #openstack-keystone13:37
openstackgerritA change was merged to openstack/identity-api: JSON Home support  https://review.openstack.org/10988113:38
*** joesavak has joined #openstack-keystone13:39
*** chandankumar has quit IRC13:46
*** nkinder has joined #openstack-keystone13:48
*** ajayaa has quit IRC13:52
*** topol has joined #openstack-keystone13:55
*** ukalifon1 has joined #openstack-keystone13:57
*** radez_g0n3 is now known as radez14:02
*** oomichi has quit IRC14:12
*** david-lyle has joined #openstack-keystone14:17
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Create additional docs for role assignment events  https://review.openstack.org/11481314:18
openstackgerritSteve Martinelli proposed a change to openstack/identity-api: Update region entries to include URLs  https://review.openstack.org/11411814:22
*** david-lyle has quit IRC14:23
*** david-lyle has joined #openstack-keystone14:23
openstackgerritSteve Martinelli proposed a change to openstack/identity-api: API documentation for Hierarchical Multitenancy  https://review.openstack.org/11135514:24
*** radez is now known as radez_g0n314:25
*** jraim__ has joined #openstack-keystone14:29
*** cjellick has joined #openstack-keystone14:30
*** electrichead has joined #openstack-keystone14:31
*** mgagne_ has joined #openstack-keystone14:32
*** Clabbe has quit IRC14:32
*** mgagne has quit IRC14:32
*** dolphm has quit IRC14:32
*** jdennis has quit IRC14:32
*** Ephur has quit IRC14:32
*** jimbaker has quit IRC14:32
*** dtroyer has quit IRC14:32
*** lbragstad has quit IRC14:32
*** jraim has quit IRC14:32
*** Jean-Daniel has quit IRC14:32
*** arunkant has quit IRC14:32
*** russellb has quit IRC14:32
*** therve has quit IRC14:32
*** redrobot has quit IRC14:32
*** Clabbe has joined #openstack-keystone14:32
*** lbragstad has joined #openstack-keystone14:32
*** dolphm has joined #openstack-keystone14:32
*** Jean-Daniel1 has joined #openstack-keystone14:32
*** jimbaker` has joined #openstack-keystone14:32
*** dtroyer has joined #openstack-keystone14:32
*** therve has joined #openstack-keystone14:33
*** arunkant has joined #openstack-keystone14:33
*** Ephur has joined #openstack-keystone14:33
*** jdennis has joined #openstack-keystone14:33
openstackgerritDavid Stanek proposed a change to openstack/keystone: Implement validation on Assignment V3 API  https://review.openstack.org/8648414:33
*** russellb has joined #openstack-keystone14:33
openstackgerritDavid Stanek proposed a change to openstack/keystone: Implement validation on Assignment V3 API  https://review.openstack.org/8648414:34
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Create additional docs for role assignment events  https://review.openstack.org/11481314:38
*** cjellick has quit IRC14:48
*** cjellick has joined #openstack-keystone14:49
*** rharwood_ has joined #openstack-keystone14:49
*** Ephur has quit IRC14:50
*** Clabbe has quit IRC14:50
*** rharwood has quit IRC14:50
*** lbragstad has quit IRC14:50
*** rharwood_ is now known as rharwood14:50
*** dtroyer has quit IRC14:50
*** dolphm has quit IRC14:50
*** Clabbe has joined #openstack-keystone14:50
*** lbragstad has joined #openstack-keystone14:50
*** dtroyer has joined #openstack-keystone14:50
*** dolphm has joined #openstack-keystone14:50
*** Ephur has joined #openstack-keystone14:50
openstackgerritSteve Martinelli proposed a change to openstack/keystone-specs: Move endpoint group filter to Kilo  https://review.openstack.org/11663314:50
openstackgerritA change was merged to openstack/keystone: Enhance V3 routers to store basic resource description  https://review.openstack.org/11157314:50
openstackgerritSteve Martinelli proposed a change to openstack/keystone-specs: Update blueprint text value for filter credentials  https://review.openstack.org/11663514:55
stevemarwhere is our PTL?14:56
dstanekstevemar: in front of a Mac?14:56
stevemardstanek, very very very likely14:57
*** gokrokve has joined #openstack-keystone14:59
*** electrichead is now known as redrobot15:04
openstackgerritSteve Martinelli proposed a change to openstack/keystone-specs: Move trust redelegation to Kilo  https://review.openstack.org/11663915:04
openstackgerritSteve Martinelli proposed a change to openstack/keystone-specs: Move explicit unscoped token to Kilo  https://review.openstack.org/11664115:06
*** mikedillion has joined #openstack-keystone15:09
*** radez_g0n3 is now known as radez15:13
openstackgerritMatthew Edmonds proposed a change to openstack/keystone: assignment controller error path was not updated when dictionary format changed  https://review.openstack.org/11664715:15
openstackgerritMatthew Edmonds proposed a change to openstack/keystone: assignment controller error path fix  https://review.openstack.org/11664715:19
*** amirosh has quit IRC15:22
*** amirosh has joined #openstack-keystone15:23
*** ukalifon1 has quit IRC15:25
*** amirosh has quit IRC15:27
stevemardstanek, can i get a review of https://review.openstack.org/#/c/114813/9/doc/source/event_notifications.rst when you have a minute15:31
stevemarit should be painless :)15:32
dstanekstevemar: sure thing - in the middle of rebase/fixing things - as soon as i'm done i'll take a look15:33
stevemardstanek, yeah, no rush, only asking you since you're the only person who wrote anything in the channel all morning :)15:34
dstanek:-)15:34
dstaneklesson learned15:34
stevemard'oh!15:34
*** gokrokve has quit IRC15:35
openstackgerritStuart McLaren proposed a change to openstack/keystonemiddleware: Add composite authentication support  https://review.openstack.org/10838415:41
*** gokrokve has joined #openstack-keystone16:01
*** wwriverrat has joined #openstack-keystone16:01
*** zzzeek has joined #openstack-keystone16:03
*** bvandenh has quit IRC16:04
*** henrynash has joined #openstack-keystone16:07
*** ukalifon has joined #openstack-keystone16:13
*** wwriverrat has left #openstack-keystone16:14
openstackgerritKanagaraj Manickam proposed a change to openstack/keystone: Endpoint table is missing reference to region table  https://review.openstack.org/11318316:16
*** praneshp has joined #openstack-keystone16:19
*** amirosh has joined #openstack-keystone16:23
*** dims_ has joined #openstack-keystone16:23
*** wwriverrat has joined #openstack-keystone16:24
*** dims has quit IRC16:24
*** wwriverrat has left #openstack-keystone16:25
*** ukalifon has quit IRC16:26
*** radez is now known as radez_g0n316:26
*** amirosh_ has joined #openstack-keystone16:27
*** amirosh has quit IRC16:28
*** wwriverrat has joined #openstack-keystone16:32
*** amirosh_ has quit IRC16:33
*** amirosh has joined #openstack-keystone16:33
*** wwriverrat has left #openstack-keystone16:33
*** dims has joined #openstack-keystone16:35
*** dims_ has quit IRC16:35
samuelmzlbragstad, ping16:36
*** amirosh has quit IRC16:38
dstanekthis would be so much faster if our test ran in under 30 seconds16:46
*** radez_g0n3 is now known as radez16:47
lbragstadsamuelmz: hi16:48
*** wwriverrat has joined #openstack-keystone16:49
samuelmzlbragstad, could you take a look at https://bugs.launchpad.net/keystone/+bug/1360406 ? I replied your comment16:49
uvirtbotLaunchpad bug 1360406 in keystone "Wrong return from list role assignments on KVS" [Undecided,New]16:49
*** wwriverrat has left #openstack-keystone16:49
lbragstadsamuelmz: cool, thanks! I've added it to my queue16:51
*** afazekas has quit IRC16:53
openstackgerritDavid Stanek proposed a change to openstack/keystone: Implement validation on Assignment V3 API  https://review.openstack.org/8648416:53
*** jimbaker` is now known as jimbaker16:53
afaranhaHello, did someone work with Policies API in Keystone? How does it works and whats the meaning of these policies, since as I read these policies are for projects not for endpoints?16:55
*** marcoemorais has joined #openstack-keystone16:56
openstackgerritRaildo Mascena de Sousa Filho proposed a change to openstack/identity-api: API documentation for Hierarchical Multitenancy  https://review.openstack.org/11135516:56
samuelmzlbragstad, ok thanks16:56
*** wwriverrat has joined #openstack-keystone16:57
*** openstackgerrit has quit IRC17:00
*** harlowja has joined #openstack-keystone17:01
*** wwriverrat has left #openstack-keystone17:01
*** wwriverrat has joined #openstack-keystone17:05
*** nkinder has quit IRC17:05
*** wwriverrat has left #openstack-keystone17:06
*** wwriverrat has joined #openstack-keystone17:08
morganfainbergdolphm, i'm looking at that expires mismatch bug17:10
*** wwriverrat has left #openstack-keystone17:10
morganfainbergdolphm, not sure how that is occuring.17:10
*** mgagne_ has quit IRC17:11
*** mgagne_ has joined #openstack-keystone17:11
*** openstackgerrit has joined #openstack-keystone17:12
openstackgerritSamuel de Medeiros Queiroz proposed a change to openstack/keystone: Improve list role assignments filters performance  https://review.openstack.org/11668217:14
*** mikedill_ has joined #openstack-keystone17:15
*** wwriverrat has joined #openstack-keystone17:17
*** mikedillion has quit IRC17:19
*** wwriverrat has left #openstack-keystone17:19
*** nkinder has joined #openstack-keystone17:24
*** esmute has quit IRC17:24
*** aix has quit IRC17:24
*** amerine has joined #openstack-keystone17:27
*** rushiagr_away is now known as rushiagr17:30
*** esmute has joined #openstack-keystone17:37
*** radez is now known as radez_g0n317:39
*** mgagne_ is now known as mgagne17:39
*** gyee has joined #openstack-keystone17:48
*** david-ly_ has joined #openstack-keystone17:49
*** zzzeek has quit IRC17:51
*** zzzeek has joined #openstack-keystone17:51
*** david-lyle has quit IRC17:53
*** gokrokve_ has joined #openstack-keystone17:54
dstanekstevemar: topol: either of you guys get the link to the OpenStack CADF spec?17:56
stevemardstanek, the so called openstack profile for cadf?17:56
stevemardstanek, i think it's in the works, not delivered yet, according to the cadf website17:57
stevemardstanek, http://www.dmtf.org/standards/cadf -> ctrl+f -> "CADF Profile For OpenStack"17:57
dstanekstevemar: i thought there was a work in progresss somewhere17:58
stevemarmmmm17:58
*** gokrokve has quit IRC17:58
*** gokrokve_ has quit IRC17:58
stevemardstanek, not that i know of... topol ?17:59
dstanekstevemar: during our conference call Matt said he would email it out18:00
*** esmute has quit IRC18:00
stevemardstanek, let me go beat up matt and topol18:00
*** esmute has joined #openstack-keystone18:00
dstanekstevemar: sounds good18:01
dstanekstevemar: that was quick...thanks!18:09
stevemardstanek, np18:10
stevemardstanek, oh he replied18:10
stevemardstanek, even better18:10
*** gokrokve has joined #openstack-keystone18:13
topoldstanek, wow I feel torches and pitchforks in my back :-)18:15
dstanektopol: haha, is stevemar on the war path?18:17
stevemardstanek, i've been on a war path since FPF18:18
*** david-ly_ is now known as david-lyle18:18
topoldstanek, stevemar is on my ass to get my rebase done too  :-)18:19
morganfainbergdolphm, aha found it, bug in the test.18:20
morganfainbergshould have been extracting events[1] not events[0]18:20
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486418:21
*** rushiagr is now known as rushiagr_away18:21
stevemarmorganfainberg, damn, good on  you for finding that bug18:23
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Update AuthContextMiddleware to not use token_api  https://review.openstack.org/11342918:26
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add __repr__ to KeystoneToken model  https://review.openstack.org/11343018:27
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove trust dependency on token_api  https://review.openstack.org/10946218:27
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove SAML2 plugin dependency on token_api  https://review.openstack.org/11501218:27
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove identity_api dependency on token_api  https://review.openstack.org/11504518:27
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove wsgi and base controller dependency on token_api  https://review.openstack.org/11520518:27
*** cjellick has quit IRC18:29
*** jasondotstar has quit IRC18:30
*** cjellick has joined #openstack-keystone18:30
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Notification Constant Cleanup and internal notify type  https://review.openstack.org/11533718:30
*** jasondotstar has joined #openstack-keystone18:31
* morganfainberg sighs18:32
morganfainbergmore rebase issues.18:32
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486418:32
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Update AuthContextMiddleware to not use token_api  https://review.openstack.org/11342918:32
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add __repr__ to KeystoneToken model  https://review.openstack.org/11343018:32
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove trust dependency on token_api  https://review.openstack.org/10946218:33
*** cjellick_ has joined #openstack-keystone18:33
*** cjellick_ has quit IRC18:33
*** cjellick_ has joined #openstack-keystone18:34
*** cjellick_ has quit IRC18:34
*** cjellick has quit IRC18:35
*** cjellick has joined #openstack-keystone18:35
*** jasondotstar has quit IRC18:38
morganfainbergstevemar, yeah that was subtle.18:38
*** amirosh has joined #openstack-keystone18:38
stevemarmorganfainberg, now to review all your code again :D18:39
morganfainberglol18:39
morganfainberghold up, doing rebase18:39
morganfainbergwill take a nother couple minutes18:39
stevemarof course18:39
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Notification Constant Cleanup and internal notify type  https://review.openstack.org/11533718:46
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove assignment_api dependency on token_api  https://review.openstack.org/11533818:46
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove wsgi and base controller dependency on token_api  https://review.openstack.org/11520518:46
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove identity_api dependency on token_api  https://review.openstack.org/11504518:46
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove oauth controller dependency on token_api  https://review.openstack.org/11534318:46
morganfainbergstevemar, *sigh*18:54
morganfainbergstevemar, well i really broke something.18:54
stevemarmorganfainberg, MOAR rebase18:54
morganfainbergstevemar, i think the assignment rebase failed.18:54
morganfainbergstevemar, some conflict with the grant method changes18:55
afaranhadstanek: Hi, I was reading the patch https://review.openstack.org/#/c/74538/ , and I wonder why is it abandoned? Was this refactoring merged in another patch? Thanks18:55
stevemarmorganfainberg, uh oh, hope that wasn't me18:58
morganfainbergstevemar, i probably was, but thats the risk of a long patch chain. something will merge and break you18:58
morganfainbergstevemar, :P18:58
dstanekstevemar: it's just the value of target that's a little fuzzy for me18:59
stevemarmorganfainberg, just added a decorator :) easy rebase18:59
*** jasondotstar has joined #openstack-keystone19:03
*** Ugallu has joined #openstack-keystone19:10
*** Ugallu has quit IRC19:10
amiroshdstanek: hi, have a question - I was trying to run ldap test cases with pg (or mysql) by changing [database] connection setting, found that it doesn't work because of # NOTE(dstanek): The database must be setup prior to calling the parent's setUp.19:10
amiroshdstanek: parent's setUp read config, but db session has been created already with the default settings19:12
dstanekafaranha: i fixed it to fix the import dependency i caused, but i didn'tlike it enough to resubmit19:13
dstanekamirosh: you are trying to run the unit tests against pg?19:13
morganfainbergstevemar, then i broke somewhere else up the patch chain. but yeah19:13
amiroshdstanek: right19:14
*** wwriverrat has joined #openstack-keystone19:15
*** nkinder has quit IRC19:15
amiroshdstanek: there is another issue - no psycopg2 in test-requirements, but the first issue is applicable to any db19:16
*** mriedem has joined #openstack-keystone19:18
mriedemyou guys aware of this hashseed failure? http://logs.openstack.org/19/111519/4/gate/gate-keystone-python26/7003102/console.html.gz#_2014-08-22_05_00_00_01919:18
mriedemtempest had the same problem last week with lxml19:19
amiroshdstanek: even mongo lib presents in test-reqs, looks like the conspiracy against pg19:20
dstanekamirosh: what config are you trying to change? i'm not sure the unit tests will work on pg19:21
dstanekamirosh: mongo is in the requirements because there is some mongo specific functionality that is tested19:21
mriedemshould be a relatively easy gate fix here for someone https://bugs.launchpad.net/keystone/+bug/136133719:23
uvirtbotLaunchpad bug 1361337 in keystone "keystone.tests.test_serializer.XmlSerializerTestCase.test_collection_member random fails; lxml hashseed?" [Undecided,New]19:23
amiroshdstanek: backend_ldap.conf, but there are many confs with #To Test PostgreSQL: ..19:23
dstanekamirosh: IIRC the problem that we have have with real databases is the need to drop all tables are create the DB for each test19:23
amiroshdstanek: I understand and I'm fine with that. There is a bug, probably outdated, specific to 'real' dbs only https://bugs.launchpad.net/keystone/+bug/126236019:26
uvirtbotLaunchpad bug 1262360 in keystone "Unable to delete domain if user from other domain was added" [Medium,Triaged]19:26
amiroshdstanek: Just want to run this test against pg, forgot my mysql root password:)19:28
*** jamielennox|away has quit IRC19:30
*** jamielennox|away has joined #openstack-keystone19:32
dstanekmriedem: i would have expected this https://review.openstack.org/#/q/I99dc6401e73be4c61bb265c3258b6245f2e7bb34,n,z to have fixed that, but it looks likt it didn't19:33
mriedemdstanek: guess not, that merged on the 19th and logstash is showing hits on the 22nd19:34
dstanekmriedem: the fix is to add the PYTHONHASHSEED env var to tox right?19:39
mriedemdstanek: no19:39
mriedemdstanek: that's what clarkb was doing for projects until they got their tests straightened out19:39
mriedemdstanek: i think we're basically in whack a mole mode until then19:39
mriedemdstanek: so i guess it's up to the project19:40
dstanekmriedem: we've already had that in there for quite a while19:40
mriedemlxml is the problem i think19:40
mriedembut not sure why setting it in keystone's tox.ini wouldn't resolve that, maybe because lxml is native?19:40
dstaneki'll have to look at the matcher again and see if there is more to do there19:41
*** mikedill_ has quit IRC19:41
mriedemjust remove xml support :)19:42
lbragstad++19:43
*** amirosh has quit IRC19:45
*** amirosh has joined #openstack-keystone19:46
openstackgerritBrad Topol proposed a change to openstack/keystone: Add audit support to keystone federation  https://review.openstack.org/11433719:46
dstanekmriedem: yes!19:47
lbragstadmriedem: not that it's the immediate fix, but XmlBodyMiddleware is staged for removal19:47
lbragstadhttps://github.com/openstack/keystone/blob/master/keystone/middleware/core.py#L153-L15719:47
mriedemso gone in K?19:48
mriedemassuming that's what +2 means19:48
dstanekmriedem: yes19:48
lbragstadmriedem: believe so, dstanek wrote that19:48
topoldolphm, did your new credential stuff make its way to pypi?19:49
topoldolphm, do I need to do anything special in my local environment for it to find the new pycadf or will it magically pick it up?19:50
*** amirosh has quit IRC19:50
stevemartopol, you can update requirements.txt to point to 0.6.019:54
dstanektopol: you'll have to recreate your venv too19:54
topoldstanek, well that always goes well :-)19:55
stevemaris there a patch to update requirements?19:55
stevemarhttps://review.openstack.org/#/c/116360/19:56
stevemaryes there is19:56
*** marcoemorais has quit IRC20:01
*** joesavak has quit IRC20:01
*** fifieldt_ has joined #openstack-keystone20:02
*** cjellick_ has joined #openstack-keystone20:03
*** cjellick has quit IRC20:05
*** joesavak has joined #openstack-keystone20:05
*** nkinder has joined #openstack-keystone20:06
*** fifieldt has quit IRC20:06
*** jsavak has joined #openstack-keystone20:06
dstanekstevemar: it may be a good idea to have Matt review https://review.openstack.org/#/c/11481320:07
stevemardstanek, added him as a reviewer, can't believe i spelled him last name correctly in one shot20:08
dstanekimpressive20:08
*** cjellick_ has quit IRC20:08
*** joesavak has quit IRC20:10
*** dans_ has joined #openstack-keystone20:12
dans_It's easy for a user to check what projects they are in, but I can't find a way for an admin to check what projects a user is in20:13
dans_Any ideas?20:13
*** henrynash has quit IRC20:16
*** cjellick has joined #openstack-keystone20:17
*** cjellick has quit IRC20:18
*** marcoemorais has joined #openstack-keystone20:18
*** cjellick has joined #openstack-keystone20:18
*** mikedillion has joined #openstack-keystone20:23
rodrigodsdans_, you can use GET /role_assignments passing the user id and project id20:28
rodrigodsdans_, or just the user id20:28
*** diegows has joined #openstack-keystone20:29
*** gokrokve has quit IRC20:29
*** henrynash has joined #openstack-keystone20:38
dans_rodrigods, what's the route?20:38
dans_rodrigods, curl -i -X GET http://192.168.55.253:35357/v2.0/role-assignments -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: 3f1d8be1cf044b3b8ae613c4a9db56b1" - 404 not found20:39
dans_rodrigods, similar to http://192.168.55.253:35357/v2.0/tenants/43c1dcd2fe6e4da2a26212f9a9af9914/users/25a57028b7534dcc8dec6ff28ec8a6e7/roles ?20:39
*** henrynash has quit IRC20:39
dstanekdans_: you are using role-assignments instead of role_assignments20:42
dans_ah sorry, still no luck tho with http://192.168.55.253:35357/v2.0/role_assignments20:43
dans_hmm20:43
*** wwriverrat has left #openstack-keystone20:43
lbragstadmriedem: were there other bugs opened similar to https://bugs.launchpad.net/keystone/+bug/136133720:43
uvirtbotLaunchpad bug 1361337 in keystone "keystone.tests.test_serializer.XmlSerializerTestCase.test_collection_member random fails; lxml hashseed?" [Undecided,New]20:43
dstaneklbragstad: a few for different projects20:44
mriedemlbragstad: yeah there are others for other projects20:44
dstanekdans_: i think this is a v3 thing20:44
morganfainberglbragstad, mriedem keystone does some bad stuff with assuming we can do dict.items -> list and hashseed breaks it badly20:44
morganfainberglbragstad, dstanek, mriedem, i tried to fix it earlier but it's going to require some rather heavy sorting or changes to how we store data. lxml being c-lib does things differently in *some* cases than the internal python dict. :( i saw lxml issues in the hashseed tests i was trying to fix20:45
dans_dstanek, yea! thank you!20:46
dstanekmorganfainberg: i'm expecting that i can deal with it in the xmlmatcher - i haven't started looking at it, but that's where all or the comparing happens20:46
morganfainbergdstanek, yeah. the bulk of the issue is actually in keystone where we need to stop exploding dict key:value and expecting the list to be in the same order.20:48
morganfainbergdstanek, some of it is test-specific but same issue20:48
morganfainbergwe have to keep xml till K right?20:49
* morganfainberg would love to see lxml go away.20:49
lbragstadI believe so20:49
dstanekmorganfainberg: yes20:49
morganfainbergoh except the saml things20:49
morganfainberglame20:49
morganfainberglxml might not go away even in K20:49
dstanekmorganfainberg: you think that things beyond the tests care about the order?20:49
morganfainberg:(20:49
morganfainbergdstanek, well, i think that it's going to be really hard to write tests if we expect keys to come out in the same order20:50
dstanekmorganfainberg: that's what the matcher does - takes two XML docs and checks to see if they are the same20:51
dans_rodrigods, I'm just not sure how to properly give a user id to GET /role_assignments20:51
morganfainbergdstanek, but we do care about list order in a lot of places we might need to be *really* sure we're not expecting an order that isn't maintained because of hashseed. i don't think of anything that stands out but we do a lot of dict -> list stuff20:52
rodrigodsdans_, /role_assignments?user.id={user_id}20:54
dans_thx20:55
openstackgerritThiago Paiva Brito proposed a change to openstack/python-keystoneclient: Implementing hierarchical calls on keystoneclient v3 (python only)  https://review.openstack.org/11577020:55
dans_found the docs shotly after, sorry20:55
morganfainbergstevemar, yeah just checked something in the assignment_api fix went sideways trying to rebase20:55
morganfainbergstevemar, oh20:56
morganfainbergstevemar, oh... wow20:56
morganfainbergstevemar, yeah your decorator change really broke my logic20:57
stevemarmorganfainberg, ugh20:57
stevemarshit20:57
morganfainbergstevemar, i can fix it, i'll just not assume @deleted i'll move to using @internal20:57
morganfainbergstevemar, it's fine just an extra notification through the callback system20:58
morganfainbergoh.. crap can't don't have @internal yet. uhhhh20:58
stevemaryeah you do that in a later patch :\20:58
stevemarshit shit20:58
morganfainbergstevemar, i guess its time to re-order the patches.20:59
dans_rodrigods, great success :)21:01
*** topol has quit IRC21:01
morganfainbergstevemar, oh... wait i *might* already have internal here21:03
*** joesavak has joined #openstack-keystone21:04
*** jsavak has quit IRC21:04
*** david-lyle has quit IRC21:06
hockeynuthello keystoners (is that a thing)?  I have expired signing_cert.pem on my test system.  I think I need to use keystone-manage pki-setup but want to be sure before I hose everything :-)21:06
morganfainberghockeynut, it might be a thing :P ayoung at least refers to us that way.21:07
hockeynutI figured I wasn't the first21:07
morganfainberghockeynut, someone recently ran into this21:07
morganfainberghockeynut, but in production let me see if i can find that information21:07
hockeynutthat would be fantastic, thx!21:08
morganfainberghockeynut, hm. well i don't see the info on it but... i *think* pki-setup wont overwrite the current cert info. the best bet is to issue a new cert from the CA (/etc/keystone/ssl) and update the config to point to it. that being said old tokens would be invalid immidiately21:09
morganfainberghockeynut, you *might* need to delete the cache of the signing cert info for the other services and restart them to pick up the new certificate21:10
hockeynutmorganfainberg cache means /etc/keystone/ssl/certs ?21:10
morganfainberghockeynut, no, the auth_token middleware downloads a copy of the cert into /tmp. i *think* a restart should be sufficient of those services unless you've set https://github.com/openstack/keystonemiddleware/blob/master/keystonemiddleware/auth_token.py#L264-L273 those values for the auth_token middleware (in either the pase-ini or config for nova/cinder/glance/etc)21:12
morganfainberghockeynut, /etc/keystone/ssl/certs (if you used pki setup) should be the place the cert/key/ca/etc is housed21:12
morganfainbergiirc21:12
hockeynutah, ok.  I am working on Barbican so this is on the Barbican machine...I know where they live21:12
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove assignment_api dependency on token_api  https://review.openstack.org/11533821:13
*** rodrigods has quit IRC21:13
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove oauth controller dependency on token_api  https://review.openstack.org/11534321:13
hockeynutmorganfainberg I would think this process would be on a wiki somewhere?21:14
morganfainberghockeynut, i dunno if there is, we should document it if it hasn't been documented (check bugs.lauchpad.net/keystone and see if it's there, if not would be good to open a bug saying we need this info) :)21:14
hockeynutmorganfainberg I shall21:15
morganfainberghockeynut, also look in https://github.com/openstack/keystone/blob/master/doc/source/configuration.rst and see if it's there first21:15
* morganfainberg hasn't looked there in a few.21:15
*** gokrokve has joined #openstack-keystone21:16
morganfainberghockeynut it doesn't *look* like it's there at a glance21:16
hockeynutmorganfainberg ok - will poke around.  thx for the pointers!21:17
*** mikedillion has quit IRC21:21
*** dans_ has quit IRC21:25
openstackgerritA change was merged to openstack/keystone-specs: Fix minor RST and spelling errors in hierarchical multitenancy  https://review.openstack.org/11642321:25
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Mark methods on token_api deprecated  https://review.openstack.org/11534721:26
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add extra guarding to revoke_by_audit_id methods  https://review.openstack.org/11514721:26
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove SAML2 plugin dependency on token_api  https://review.openstack.org/11501221:26
morganfainbergstevemar, ok all rebased21:26
morganfainbergstevemar, finally :P21:26
stevemarmorganfainberg, yay!21:26
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Create additional docs for role assignment events  https://review.openstack.org/11481321:29
openstackgerritA change was merged to openstack/identity-api: Change location of OS-ENDPOINT-POLICY name in API urls.  https://review.openstack.org/11635821:39
*** mriedem has quit IRC21:42
*** radez_g0n3 is now known as radez21:48
*** dims has quit IRC21:50
*** dims has joined #openstack-keystone21:50
*** stevemar has quit IRC21:53
*** amerine has quit IRC21:53
*** radez is now known as radez_g0n321:54
*** david-lyle has joined #openstack-keystone21:55
*** dims has quit IRC21:55
*** dims has joined #openstack-keystone21:59
*** dims_ has joined #openstack-keystone21:59
*** cjellick_ has joined #openstack-keystone22:00
*** serverascode has quit IRC22:01
*** jamielennox|away has quit IRC22:01
*** serverascode has joined #openstack-keystone22:02
*** jasondotstar is now known as jasondotstar|afk22:02
*** dims has quit IRC22:03
bknudsonwhat do you think about changing common.router.Router to allow no key?22:03
*** cjellick has quit IRC22:03
*** jamielennox|away has joined #openstack-keystone22:03
bknudsonI guess it would break backwards compatibility. :(22:03
bknudsonhttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/common/router.py#n2022:04
morganfainbergbknudson, i was wondering what the use-case was before worrying about compat22:04
*** cjellick_ has quit IRC22:04
morganfainbergbecause there might be another approach that doesn't break compatibility22:04
bknudsonmorganfainberg: role assignments doesn't support key22:04
morganfainbergah22:04
bknudsonyou can do GET /role_assignments22:04
bknudsonbut there's no GET /role_assignments/{role_assignment_id}22:04
morganfainbergbknudson, maybe this is where we need a lower-level router for something like that?22:05
bknudsonhttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/assignment/controllers.py#n88122:05
*** dims has joined #openstack-keystone22:05
bknudsonlooks like it's going to return NotImplemented22:06
morganfainbergah.22:06
bknudson(where I would have expected a 404 Not Found22:06
morganfainbergyeah22:06
*** dims_ has quit IRC22:06
*** gordc has quit IRC22:06
morganfainbergmmm.22:06
*** mitz has quit IRC22:06
morganfainbergyeah looks like it would break compat :(22:06
bknudsonthere are ways to work around it.22:07
bknudsonwe could have a controller that returns NotImplemented for get(), update(), delete() for the RoleAssignments case22:07
bknudsonand for other cases if the key is None then don't make the routes22:08
bknudsonmorganfainberg: what do you think of that?22:08
*** dims has quit IRC22:08
morganfainbergbknudson, that seems reasonable.22:08
bknudsonI'll give it a shot.22:08
*** dims has joined #openstack-keystone22:09
*** david-ly_ has joined #openstack-keystone22:09
*** dims has quit IRC22:10
*** dims_ has joined #openstack-keystone22:10
*** david-lyle has quit IRC22:10
*** HenryG_ has joined #openstack-keystone22:12
*** toddnni has quit IRC22:14
*** HenryG has quit IRC22:15
*** david-ly_ is now known as david-lyle22:18
*** gokrokve has quit IRC22:24
*** gokrokve has joined #openstack-keystone22:31
*** shakamunyi has joined #openstack-keystone22:32
*** shakamunyi has quit IRC22:40
*** joesavak has quit IRC22:48
*** amerine has joined #openstack-keystone22:54
*** shakamunyi has joined #openstack-keystone22:54
*** bknudson has quit IRC23:03
*** wanghong has quit IRC23:06
openstackgerritYukinori Sagara proposed a change to openstack/python-keystoneclient: fix the AWS Signature Version 4 calculation, in the case of POST  https://review.openstack.org/11652323:09
*** navidp has joined #openstack-keystone23:13
navidphi23:14
navidpdo you know how to make .pem .pkiz for json in examples in keystone client23:15
*** oomichi has joined #openstack-keystone23:16
*** oomichi is now known as oomichi_away23:17
*** jamielennox|away is now known as jamielennox23:17
*** navidp has quit IRC23:22
*** amerine has quit IRC23:23
*** alex_xu has quit IRC23:24
morganfainbergdolphm, gyee, dstanek, jamielennox, lbragstad, so I'm looking at refactoring the issue_token and validate_token paths now (so we can get to non-persistent-tokens). does it make sense to make the provider manager responsible for a lot of this work - we have the vXX data helper objects that do cross-manager work, it seems like we've pushed code down to the driver that doesn't need to be the driver. basically the driver needs 123:28
morganfainberg thing at this point: get_token_id23:28
morganfainbergthe rest of it is kindof superfluous to have in the swappable manager unless we expect a driver to change token format?23:29
morganfainbergmethods that would be lifted to the manager: validate, issue.  the v2/v3 versions of that code would get redirected to pass some "smart" arguments to do the "right" thing23:30
morganfainberghe driver would really be either "Generate UUID" or "sign" or "sign pkiz"23:30
morganfainbergand the persistence backend would then do "save_token"23:30
jamielennoxmorganfainberg: i've never liked that the token driver knows the difference between a v2 and a v3 token, that's a bad abstraction23:32
morganfainbergjamielennox, thats kindof my thought23:32
jamielennoxgenerate_uuid is wrong as well though23:33
morganfainbergjamielennox, is it? for UUID tokens?23:33
jamielennoxit would be create_id or such from a token model23:33
*** gokrokve_ has joined #openstack-keystone23:33
jamielennoxbecause create_id for UUID is a UUID and for PKI is a CMS hash23:33
morganfainbergjamielennox, sure, it would be similar to the get_token_id we have now23:33
morganfainberg"Generate UUID", "Sign", or "Sign PKIZ" is the functionality not the name23:34
jamielennoxoh, i might have misread23:34
jamielennoxyes they would be the implementations of a create_id23:34
morganfainbergyep23:34
morganfainbergwhich would be *basically* all the provider would do23:34
jamielennox+123:34
morganfainbergnow i just need to figure out all the permutations of crap that can be passed to issue_v2_token23:35
jamielennoxheh, i tried this once before - it's tough because that is actually a driver interface so if you change it you need to keep compatibility for a cycle of two23:35
morganfainbergjamielennox, the plan is passing info to issue_v2_token would just pass through to the driver's old impl.23:36
*** gokrokve has quit IRC23:36
morganfainbergand the new code would all reference 'issue_token' and 'validate_token'23:36
morganfainbergno version specifics23:36
jamielennoxthat's not the issue, you can do what you like on the manager23:37
jamielennoxbut it's a lot of if hasattr(backend, 'issue_token') else if hasattr(backend, 'issue_v2_token')23:37
morganfainbergnegative23:37
morganfainbergmanager implements the full stack of issue_token23:37
morganfainbergthe issue_XX_token methods are really uninteresting and do cross-manager calls23:38
jamielennoxoh? ok - it's been a while since i've looked23:38
morganfainbergi mean that would be the proposal23:38
morganfainbergif you call issue_vX_token you'd pass through to the old functionality23:38
morganfainbergthe manager would have those methods deprecated23:38
morganfainbergeverything in keystone would reference issue_token / validate_token instead of (issue|validate)_v(2|3)_token23:39
jamielennoxright, but if someone has a custom implementation of a token provider that doesn't have our new methods it should still work23:39
morganfainbergthe only method the driver would *require* is create_token_id(token_data)23:40
morganfainbergthe manager would have all the other logic23:40
morganfainbergrevoke_token is all by id (anyway) and 100% manager implemented23:40
morganfainbergpersistence is a sub-manager now23:40
morganfainberginstead of token_api23:41
morganfainbergall this is doing is lifting the vXX token formatting stuff up to the manager (if someone has their own implementation of formatting the tokens, likely, it wont work anyway with auth_token)23:41
openstackgerritJamie Lennox proposed a change to openstack/identity-api: API for auth-specific-data routes  https://review.openstack.org/11542323:42
jamielennoxmorganfainberg: ok23:42
jamielennoxhey, completely change topic, do you know anything about the congress service?23:42
morganfainbergjamielennox, in my opinion, it's a bad idea23:43
morganfainbergjamielennox, yay lets ask a service about enforcing policy everytime we want to do something. it's a lot of what we've been fighting to solve from keystone's original design23:43
jamielennoxi'm thinking about next steps and i was looking at ways we could do user defined and per project policy in keystone23:43
morganfainbergjamielennox, you're going to have scale issues.23:43
jamielennoxthis is a large part of what i'm hitting23:43
morganfainbergjamielennox, congress is going to have all the same issues and then some.23:44
*** diegows has quit IRC23:44
jamielennoxright, well i was just at the point of trying to figure out if it's doable and i honestly can't tell if this is a goal of congress or not23:44
morganfainbergjamielennox, it was afaict originally and when pressed for "how do you solve that issue" the answer was "well we do non-enforcing only to start"23:45
morganfainbergjamielennox, which in my mind says "we have no clue"23:45
morganfainbergso i've stayed very far away from that project23:45
morganfainbergi think per-endpoint policy is solid, per service policy same.23:46
morganfainbergi also think that enforcing which endpoints a token can interact with is good (whats in the catalog id list or some such)23:46
morganfainbergper domain *might* be doable, but i'm starting to worry about how we stack the policy enforcemnet rules23:47
jamielennoxi'm still not sure on per-endpoint23:47
morganfainbergand per project/per user is likely silly. - we should focus on better RBAC or ABAC enforcement not make it so you can enforce differently based on the user's id23:47
* morganfainberg would love to see ABAC23:47
jamielennoxi see why but i've always considered that endpoints are essentially the same service23:48
*** dims_ has quit IRC23:48
jamielennoxwhat i want to do is allow admins to create there own roles23:48
jamielennoxkind of reverse what we have now23:48
*** dims has joined #openstack-keystone23:48
jamielennoxso create a role that lets you do identity-api:create_user, identity-api:XXXX and a bunch of others23:48
morganfainbergjamielennox, i think per-endpoint is solved in the same way as what-endpoint-can-i-interact-with23:49
jamielennoxlet us do policy and role enforcement from horizon would be the goal23:49
morganfainbergjamielennox, erm, use-case is solved by23:49
gyeemorganfainberg, about the token refactorying, I remember the reason we have this issue_v2_token stuff was because of PKI tokens23:50
jamielennoxthe only way i can see this working is that as part of your token request your roles are expanded into (let's call them) capabilities23:50
gyeeoriginally I explored the idea of formatting token at middleware23:50
gyeejust like the way we handle xml/json translation23:50
morganfainberggyee, and if we have a formatter that says "format data as XXX" before signing it solves the same issue23:50
gyeebut signing has to be done at issue time23:51
morganfainberggyee, the flow would be: (for now) get_token_data, format_token_data, sign/generate_id, return data_Struct23:51
gyeeas we can break the cryptographic signature23:51
gyees/can/can't/23:51
jamielennoxso your token comes with a list of identity:get_credential, identity:get_credential, identity:create_consumer or whatever23:51
gyeemorganfainberg, absolutely, we did bounce the idea of having all that in a wsgi pipeline style23:51
jamielennoxbut that is only practical with UUID23:51
*** dims has quit IRC23:52
morganfainberggyee, i think this moves us closer to that if i can get this bit done23:52
*** dims has joined #openstack-keystone23:52
gyeemorganfainberg, sure, I am all for incremental improvement23:52
morganfainbergjamielennox, yeah i don't have a good answer. but per-user/per-project policy makes my skin crawl23:52
gyeeeventually, I like the idea of pipeline23:52
morganfainberggyee, the main thought is all the code that makes the token *except* the id generator (sign/uuid/pkiz) comes from the manager itself23:53
morganfainbergthere is *no* real reason the code needs to stay in the provider driver23:53
jamielennoxmorganfainberg: i see nothing wrong with the idea from a security perspective, i just see it being really difficult to distribute23:53
morganfainbergjamielennox, i am looking from a scaleability perspective23:53
morganfainbergjamielennox, and there are security considerations, but not insurmountable23:54
morganfainbergjamielennox, i don't see how we can make it scale23:54
jamielennoxwell as i said i think it could be done with UUID, really got no idea for PKI23:54
morganfainbergjamielennox, though if keystone jammed signed (HMAC) token data into a "Fast" data store that auth_token could directly access instead of needing to decode the PKI data, we could do it23:54
morganfainbergit doesn't make tokens non-persistent, but it solves a lot of the issues with UUID tokens.23:55
jamielennoxso we briefly talked about this at summit last time, and i was considering it again here23:55
gyeemorganfainberg, we customized the token to add additional info23:55
gyeei.e. multi-region support23:55
jamielennoxif auth_token was a middleware component that talked to a local service backed by memcache we get some wins, but not enough for this i think23:56
morganfainberggyee, oh HP is jamming more data into the token23:56
morganfainberggyee, well crap.23:56
gyee:)23:56
morganfainberggyee, i *really* dislike that we don't have a defined token format and random crap is shoved into it23:56
*** saipandi has quit IRC23:56
jamielennoxgyee: are you guys doing PKI or UUID for that23:56
gyeefor example, by looking at token ID, I can tell where's being issued23:56
morganfainbergthat sounds kindof awful and awesome all at the same time23:57
gyeejamielennox, still using UUID in production23:57
morganfainbergmore awful than awesome, but still a little awesome in it23:57
jamielennoxi'm really interested in the results of morganfainberg's survey, i really think we need to look at UUID as the primary again23:57
morganfainbergjamielennox, oh i forgot to send that out23:58
gyeemorganfainberg, I think its call "necessary evil" :D23:58
morganfainbergbut it closed already23:58
jamielennoxif anything we are getting more information that needs to go into the token and it's just not doable with PKI23:58
morganfainberggyee, i think it's a "keystone sucked at defining token format so people abuse that"23:58
morganfainberggyee, not a nessicary evil23:58
gyeemorganfainberg, enterprise software, by definition, is custom software anyway23:59
gyeeleast from my past experience23:59
jamielennoxmorganfainberg: got a link to the raw results?23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!