Wednesday, 2014-09-24

*** marcoemorais has quit IRC00:00
*** marcoemorais has joined #openstack-keystone00:00
*** Tahmina has quit IRC00:02
dstanekmorganfainberg: haha, you never do a self. in a __getattr__! you always use getattr(self, ...)00:02
morganfainbergdstanek, oh derp, hahaah00:03
*** cjellick has quit IRC00:03
morganfainbergdstanek, could fix it with getattr(getattr(self, 'thing'), thing)00:03
morganfainbergdstanek, would you prefer that?00:03
morganfainbergdstanek, and yes fair point i didn't see it (must have been a long day) :P00:03
dstanekmorganfainberg: no, i think your fix is good enough00:04
morganfainbergdstanek, ok.00:04
morganfainbergdstanek, yeah. /embarassed by that one :P00:04
dstanekmorganfainberg: happens to the best of us00:05
dstaneki didn't realize that gyee +2ed it too. just added the +A /cc morganfainberg00:08
morganfainbergdstanek, gyee, tyvm00:08
morganfainbergdstanek, we're just waiting on that one and the one from marek about the config option for saml and we're done short of the transifex job tonight00:09
morganfainbergif all goes well and no more bugs, RC complete tomorrow.00:09
gyeew00t!00:10
ayoungwhat have you got against infinite persistnace00:10
morganfainbergayoung, nothing.00:11
morganfainbergayoung, :P00:11
dstanekit's really the only way to know it gets stored! just continuously do it00:11
ayoungmorganfainberg, BTW, we have a kerberos repo00:12
morganfainbergdstanek, forever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever and ever...00:12
morganfainbergayoung. nice00:12
dstanekmorganfainberg: updated, with a little more detail - https://bugs.launchpad.net/python-keystoneclient/+bug/126049500:12
uvirtbotLaunchpad bug 1260495 in pbr "Setting autodoc_tree_index_modules makes documentation builds fail" [Undecided,In progress]00:12
morganfainbergdstanek, thanks!00:13
dstanekmorganfainberg: fyi, here is the real fix: https://review.openstack.org/#/c/120216/00:14
morganfainbergdstanek, nice.00:14
*** dims has quit IRC00:24
*** alex_xu has quit IRC00:24
*** dims has joined #openstack-keystone00:24
*** alex_xu has joined #openstack-keystone00:25
*** _cjones_ has quit IRC00:26
*** _cjones_ has joined #openstack-keystone00:26
*** keystone_newbie has joined #openstack-keystone00:26
keystone_newbieHi, I'm trying to find some information for developing a Keystone extension that adds callbacks for Project add/delete00:27
keystone_newbieI see that there is an example extension already in the /opt/stack/keystone/examples folder00:27
keystone_newbieI was wondering if somebody could point me in the right direction for enabling my custom extension00:28
keystone_newbieI haven't been able to find something in the documentation anywhere00:28
*** dims has quit IRC00:29
keystone_newbieSorry, the folder for example is : /opt/stack/keystone/keystone/contrib/example00:29
morganfainbergkeystone_newbie, what release of openstack are you using?00:29
morganfainbergkeystone_newbie, havana, icehouse, master/juno?00:29
keystone_newbieI'm using Icehouse00:29
keystone_newbiewith devstack00:29
morganfainbergkeystone_newbie, so something like https://github.com/openstack/keystone/blob/master/keystone/contrib/example/core.py#L50-L57 with the callback looking like https://github.com/openstack/keystone/blob/master/keystone/contrib/example/core.py#L61-L68 would work00:30
keystone_newbieYes, that is exatcly what I'm looking to do00:30
morganfainbergkeystone_newbie, alternatively you can directly register the callback https://github.com/openstack/keystone/blob/master/keystone/contrib/revoke/core.py#L120-L144 which is called by __init__ https://github.com/openstack/keystone/blob/master/keystone/contrib/revoke/core.py#L7700:31
*** _cjones_ has quit IRC00:31
keystone_newbieMy question was, what do I need to do to enable my extension?00:31
keystone_newbieAny changes needed in a conf file somewhere?00:31
*** rodrigods_ has joined #openstack-keystone00:31
morganfainbergkeystone_newbie, your extension (assuming it's adding routes/ REST API calls) needs to be added to the paste-ini00:31
morganfainbergkeystone_newbie, https://github.com/openstack/keystone/blob/master/etc/keystone-paste.ini is the example00:32
keystone_newbieIt would not be adding any routes/REST api calls00:32
keystone_newbieit would just be making rest api calls to a third party application on project create delete and update00:32
*** alex_xu has quit IRC00:32
morganfainbergkeystone_newbie, hm.00:32
keystone_newbieWould I still need to add config to keystone-paste.ini ?00:33
morganfainbergnot sure off the top of my head how to do that, perhaps putting it in the paste pipeline just with no routes (don't create routes for it) would be the right answer00:33
*** alex_xu has joined #openstack-keystone00:33
keystone_newbieok let me try that, thanks for your help :)00:33
morganfainbergkeystone_newbie, if it's in the paste pipeline (even if it adds no routes) it should get loaded. not sure where you'd load it without that unless you want to add it to some other subsystem.00:33
*** gyee has quit IRC00:41
*** Alexane_Metz has quit IRC00:42
*** Arlene_Wolff has joined #openstack-keystone00:43
*** gokrokve_ has quit IRC00:44
*** marcoemorais has quit IRC00:47
*** marcoemorais has joined #openstack-keystone00:48
*** marcoemorais has quit IRC00:48
*** marcoemorais has joined #openstack-keystone00:48
*** marcoemorais has quit IRC00:48
*** marcoemorais has joined #openstack-keystone00:49
*** gokrokve has joined #openstack-keystone00:49
openstackgerritayoung proposed a change to openstack/python-keystoneclient-kerberos: Date:   Thu Sep 11 13:49:15 2014 -0400  https://review.openstack.org/12361400:50
*** soulxu_ has joined #openstack-keystone00:53
*** alex_xu has quit IRC00:55
*** r-daneel_ has quit IRC00:56
*** rodrigods_ has quit IRC00:56
*** soulxu__ has joined #openstack-keystone01:04
*** gokrokve has quit IRC01:07
*** soulxu_ has quit IRC01:08
*** soulxu__ is now known as alex_xu01:12
*** david-lyle has joined #openstack-keystone01:17
*** Arlene_Wolff has quit IRC01:25
nkinder_ayoung: yay, first proposal against the new repo!01:32
ayoungnkinder_, yeah...lets see how the tests do.  I think I had them running....01:32
morganfainbergok thats cool to see, the extra repo for the plugin01:39
morganfainberg:)01:39
nkinder_morganfainberg: so RC is close?01:40
nkinder_morganfainberg: any other LDAP stuff you need an extra pair of eyes for?01:40
morganfainbergnkinder_, RC is now just fighting with the gate AFICT01:40
nkinder_awesome01:40
nkinder_morganfainberg: I've been testing LDAP with henrynash's multi-backend work lately, and it's working nicely01:41
morganfainberghttps://review.openstack.org/#/c/123446/ https://review.openstack.org/#/c/123612/ and a transifex update01:41
morganfainbergthere is another doc fix that would be nice to sneak in, but if it doesn't make it i wont complain.01:41
morganfainbergnkinder_, good to hear01:41
*** Allen_DuBuque has joined #openstack-keystone01:42
morganfainbergand middleware similarly is fighting the gate, have 3 approved fixes and one that i'll post the update for tonight01:43
*** KanagarajM has quit IRC01:43
*** jdennis has quit IRC01:48
*** zzzeek has joined #openstack-keystone01:59
*** dims has joined #openstack-keystone02:02
*** marcoemorais has quit IRC02:02
*** david-lyle has quit IRC02:05
*** david-lyle has joined #openstack-keystone02:06
ayoungmorganfainberg, which one is the update coming for?  I'll star it and check in the morning02:07
morganfainbergayoung, the transifex update?02:08
morganfainbergayoung, keystone02:08
ayoungmorganfainberg, " have 3 approved fixes and one that i'll post the update for tonight"02:08
morganfainbergah02:09
*** gokrokve has joined #openstack-keystone02:09
morganfainbergayoung, this chain https://review.openstack.org/#/c/123021/ and the memcache pool one for middleware https://review.openstack.org/#/c/119774/02:09
*** david-lyle has quit IRC02:10
ayoungmorganfainberg, OK I'll check for them in the morning.02:12
ayoungmorganfainberg, BTW, are you planning on getting a commercial PyCharm license?02:12
morganfainbergalready have one02:13
morganfainberghave had one for ~2yrs02:13
ayoungso not the "openstack developers license"02:13
nkinder_ayoung: https://jdennis.fedorapeople.org/aaa-sssd/index.html02:13
ayoungnkinder_, what did he call me?02:13
nkinder_ayoung: that's John's WIP for documenting the mod_lookup_identity/SSSD approach for OpenDaylight02:13
nkinder_ayoung: AAA == Adams An ...? :)02:14
ayoungssssssss02:14
ayoungnkinder_, I still think we should hack in socket activation for Java to systemd02:15
nkinder_ayoung: this will likely be a very comprehensive doc that can help to describe the approach for Keystone too02:15
ayoungI already wrote that02:15
ayoungheh02:15
ayoungbut not nearly as nicely or verbosely as John, of course02:15
morganfainbergayoung, nope, because previously i didn't qualify for the OpenStack developer license (at metacloud)02:15
morganfainbergand it looks like i still don't at HP02:16
ayoungnkinder_, http://adam.younglogic.com/2014/05/mod_lookup_identity/02:16
nkinder_ayoung: yep, I've read it.  I need to set it up myself next.02:16
ayoungnkinder_, I wonder what the right approach is for Mac?02:17
nkinder_ayoung: I've just been able to use puppet to deploy keystone in httpd using Rich's puppet-keystone and packstack changes02:17
nkinder_ayoung: you mean for developers running on mac?02:18
ayoungIdeally  mod_lookup_identity would use whatever is reasonable for native02:18
nkinder_ayoung: is it likely that people developing locally on mac are even running a live LDAP server?02:18
nkinder_I mean, sure it's possible02:18
nkinder_...but not the norm02:19
ayoungnkinder_, I would think so..most Unix tools run on Mac02:19
ayoungI'd assume that getting openldap to run on a Mac would be well trodden ground.02:19
nkinder_ayoung: it's definitely possible02:20
ayoungmorganfainberg, when you develop, you run on a mac, but do everything in a VM, right?02:20
nkinder_ayoung: I don't think lack of sssd on mac is a blocker for the approach02:20
ayoungand the VM is running Ubuntu or Fedora?02:20
morganfainbergayoung, sometimes, depends on what i'm testing02:20
morganfainbergayoung, and i switch between fedora and ubuntu depending on which one i have built02:21
morganfainbergoccasionally i'll run keystone locally if i'm testing say token provider change?02:21
morganfainbergbut if it's more in depth than a sing;e API i usually run in a VM02:21
ayoungnkinder_, I'd just like it to be a non-issue.  We've not done anything linux specific so far.  I know people do develop on OSX.02:21
nkinder_wouldn't we need D-Bus too for the IFP02:22
nkinder_?02:22
*** diegows has quit IRC02:22
ayoungI would think so, yes02:22
ayounghttp://krypted.com/mac-security/starting-openldap-on-mac-os-x-client/  looks like it is there by default?02:23
nkinder_ayoung: yeah, but who on the keystone team develops against that regularly?02:23
nkinder_ayoung: in an ideal world, we would have sssd and dbus and ldap on mac02:23
nkinder_ayoung: but I don't see it as a requirement by any means02:24
ayoungnkinder_, don't look at me, I'm a Linux purist.02:24
nkinder_ayoung: don't make me start assigning AD bugs to you... ;)02:24
ayoungnkinder_, it was also part of a conversation with dpal about mod_lookup_identity in general, getting it to be a baseline apache tool02:24
nkinder_ayoung: yes, there is talk about making it work in windows02:24
nkinder_ayoung: I think mac would fit in there too02:25
ayoungnkinder_, yeah, and I think for Mac it would probably be easiest to use the Linux toolchain: sssd and dbus02:26
ayoungquestion is whether there is something more appropriate.  I have a friend at Apple in security, maybe I'll bug him.02:26
nkinder_ayoung: where is the best reference on policy.json syntax?02:29
ayoungnkinder_, you are talking to it02:30
ayoungits oral tradition only02:30
nkinder_ayoung: hmm, I can't forward you to somebody in e-mail (or it would at least be painful)02:30
ayoungwe inherited it from oslo, so unless they have it02:30
ayoungI usually look at the python code in the openstackcommon/policy.py02:31
nkinder_ayoung: so when a rule is empty, what is the behavior?02:31
*** gokrokve has quit IRC02:31
nkinder_ayoung: the "default"?02:31
nkinder_http://docs.openstack.org/trunk/config-reference/content/section_keystone-policy.json.html02:31
*** gokrokve has joined #openstack-keystone02:32
ayoungOK,  so if the rul is blank, there is not resitrctions.02:32
ayoungThe problme is that most of hte projects use auth_token middleware, and so you must at least have a token in order to get through02:32
nkinder_ayoung: none at all?  So in that example, delete_trust can be done by anyone?02:32
ayoungso there is no "unauthenticated" way to get at an API02:32
*** zzzeek has quit IRC02:33
ayoungnkinder_, those might be enforced inside the code base02:33
nkinder_ayoung: those ones do look like it02:33
ayoungI was kindof paranoid when writing them02:33
nkinder_ayoung: for example...02:34
nkinder_def get_trust(self, context, trust_id):02:34
nkinder__trustor_trustee_only(trust, user_id)02:34
ayoung  http://git.openstack.org/cgit/openstack/keystone/tree/keystone/trust/controllers.py#n34  gets stuck on a bunch02:34
ayoungyep02:34
nkinder_ayoung: so why have policy settings if they are hard coded?02:34
ayoungwe didn't want people changing policy and making trusts into a huge security hole02:34
ayoungand we still don't02:34
nkinder_those trust policies vs. what's hard coded is something I'm explicitly being asked about02:34
nkinder_ayoung: ok, so we shouldn't even advertise those as possible in policy.json02:35
nkinder_otherwise it's confusing02:35
*** dims has quit IRC02:35
ayoungI think we have to, though02:35
ayoung@controller.protected()  needs arule or it rejects02:35
ayoungthe default is in the top of policy,json02:35
*** dims has joined #openstack-keystone02:35
ayoungI think02:35
*** gokrokve has quit IRC02:36
*** harlowja is now known as harlowja_away02:36
nkinder_ayoung: I would think it would tolerate a missing rule02:38
nkinder_ayoung: but perhaps not02:38
ayoungthe default is02:38
ayoung"default": "rule:admin_required",02:38
nkinder_ayoung: it should be documented that these are not controlled by policy at least02:38
nkinder_Yeah, so how does the default work?02:38
*** Allen_DuBuque has quit IRC02:38
ayoungnkinder_, hmmm, might also be a config option02:39
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/openstack/common/policy.py#n9702:39
*** dims has quit IRC02:39
openstackgerritVictor Silva proposed a change to openstack/python-keystoneclient: Explicit complaint about old OpenSSL when testing  https://review.openstack.org/12361902:40
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/openstack/common/policy.py#n13702:40
ayoungthis is new to me...02:40
ayounghadn't really looked at that before02:40
ayoung#policy_default_rule=default02:41
ayoungso there is a conf setting that says the default rule name is "default"02:41
ayoungand when policy.json is processed use that rule if none is specified02:42
nkinder_ayoung: ok, so not listed in the file means "use the default"02:42
ayoungyes02:42
nkinder_ayoung: and an empty rule means "any authenticated user"02:42
ayoungyeah...that is in policy.py AS WELL...ONE SEC02:42
nkinder_ayoung: so leaving out the trust stuff that is hard-coded would be less confusing than listing them as empty rules02:42
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/openstack/common/policy.py#n34902:42
ayoung@ is frowned upon02:43
*** rodrigods_ has joined #openstack-keystone02:43
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/openstack/common/policy.py#n49602:43
ayoungI think the ""  value works becauser it matches nothing when it parses...I recall I origianlly had @ in where I wanted explicit passes and we conformed to the norm02:44
ayoungbut ! is short for FalseCheck and @ is short for True check02:44
*** Alena66 has joined #openstack-keystone02:51
*** rodrigods_ has quit IRC02:52
ayoungnkinder_, I remember the code around trusts and the policy for it as being different.  I should git blame it to see it this was added later02:53
ayoungI recall working on the code that flattened the payload so we could enforce, for example, that the trustor id = the user creating the trust only02:53
*** comstud has quit IRC03:07
*** cyeoh has quit IRC03:07
*** vishy has quit IRC03:08
*** radez_g0n3 is now known as radez03:19
*** radez is now known as radez_g0n303:25
*** wanghong has quit IRC03:28
*** rodrigods_ has joined #openstack-keystone03:33
*** miqui has joined #openstack-keystone03:35
*** Alena66 has quit IRC03:39
*** wanghong has joined #openstack-keystone03:40
*** Avis6 has joined #openstack-keystone03:41
*** stevemar has joined #openstack-keystone03:46
*** rodrigods_ has quit IRC03:53
*** marcoemorais has joined #openstack-keystone03:55
*** marcoemorais1 has joined #openstack-keystone03:57
*** marcoemorais has quit IRC04:00
*** _cjones_ has joined #openstack-keystone04:13
*** Avis6 has quit IRC04:18
*** vishy has joined #openstack-keystone04:21
*** comstud has joined #openstack-keystone04:21
*** rushiagr_away is now known as rushiagr04:23
*** vishy has quit IRC04:34
*** comstud has quit IRC04:35
*** richm has quit IRC04:35
*** vishy has joined #openstack-keystone04:38
*** comstud has joined #openstack-keystone04:38
*** vishy has quit IRC04:44
*** comstud has quit IRC04:45
*** stevemar has quit IRC04:54
*** stevemar has joined #openstack-keystone04:54
*** gokrokve has joined #openstack-keystone05:00
*** saipandi has joined #openstack-keystone05:07
*** saipandi has quit IRC05:08
*** KanagarajM has joined #openstack-keystone05:10
*** comstud has joined #openstack-keystone05:18
*** vishy has joined #openstack-keystone05:19
*** _cjones_ has quit IRC05:24
*** _cjones_ has joined #openstack-keystone05:24
*** stevemar has quit IRC05:31
*** afazekas has joined #openstack-keystone05:35
*** _cjones_ has quit IRC05:43
*** _cjones_ has joined #openstack-keystone05:43
*** _cjones_ has quit IRC05:48
openstackgerritMorgan Fainberg proposed a change to openstack/keystonemiddleware: Add an optional advanced pool of memcached clients  https://review.openstack.org/11977405:51
*** miqui has quit IRC05:52
*** gokrokve_ has joined #openstack-keystone05:58
*** gokrokve has quit IRC06:01
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/12363706:01
*** gokrokve_ has quit IRC06:02
*** YorikSar has quit IRC06:06
*** YorikSar has joined #openstack-keystone06:08
*** k4n0 has joined #openstack-keystone06:09
*** ajayaa has joined #openstack-keystone06:15
*** amcrn has quit IRC06:15
*** ayoung has quit IRC06:19
*** KanagarajM has quit IRC06:21
*** gokrokve has joined #openstack-keystone06:28
*** gokrokve has quit IRC06:29
*** gokrokve has joined #openstack-keystone06:30
*** gokrokve has quit IRC06:35
*** ukalifon1 has joined #openstack-keystone06:40
*** ayoung has joined #openstack-keystone06:40
*** garcianavalon has joined #openstack-keystone07:09
*** gokrokve has joined #openstack-keystone07:31
*** soulxu_ has joined #openstack-keystone07:34
*** gokrokve has quit IRC07:35
*** alex_xu has quit IRC07:37
*** lufix has joined #openstack-keystone08:12
*** marekd|away is now known as marekd08:28
*** gokrokve has joined #openstack-keystone08:28
*** gokrokve has quit IRC08:33
*** BAKfr has joined #openstack-keystone08:36
*** marcoemorais1 has quit IRC08:41
*** andreaf_ is now known as andreaf08:47
*** lufix2 has joined #openstack-keystone08:52
*** lufix has quit IRC08:52
*** YorikSar has quit IRC08:59
*** soulxu_ has quit IRC09:01
*** YorikSar has joined #openstack-keystone09:01
*** lufix2 has quit IRC09:04
*** alex_xu has joined #openstack-keystone09:06
*** openstack has joined #openstack-keystone09:23
*** gokrokve has joined #openstack-keystone09:28
*** gokrokve has quit IRC09:29
*** gokrokve has joined #openstack-keystone09:30
*** alex_xu has quit IRC09:32
*** gokrokve has quit IRC09:35
*** henrynash has quit IRC09:35
*** bdossant has joined #openstack-keystone09:42
*** henrynash has joined #openstack-keystone09:57
*** topol has joined #openstack-keystone10:03
*** diegows has joined #openstack-keystone10:15
*** cbkyeoh has joined #openstack-keystone10:19
*** cbkyeoh is now known as cyeoh10:24
*** aix has joined #openstack-keystone10:27
*** gokrokve has joined #openstack-keystone10:28
*** gokrokve has quit IRC10:33
*** henrynash has quit IRC10:35
*** topol has quit IRC10:35
*** rushiagr is now known as rushiagr_away10:40
*** rushiagr_away is now known as rushiagr10:43
*** dims has joined #openstack-keystone10:48
*** alex_xu has joined #openstack-keystone11:04
*** ajayaa has quit IRC11:17
openstackgerritA change was merged to openstack/python-keystoneclient: Enumerate Projects with Unscoped Tokens  https://review.openstack.org/10683811:25
*** gokrokve has joined #openstack-keystone11:28
*** gokrokve has quit IRC11:33
*** soulxu_ has joined #openstack-keystone11:34
*** alex_xu has quit IRC11:38
*** ajayaa has joined #openstack-keystone11:40
*** soulxu__ has joined #openstack-keystone11:42
*** soulxu_ has quit IRC11:45
*** rodrigods_ has joined #openstack-keystone11:48
*** rodrigods_ has quit IRC12:02
*** richm has joined #openstack-keystone12:03
*** bdossant has quit IRC12:03
*** dims has quit IRC12:05
*** dims has joined #openstack-keystone12:05
*** soulxu_ has joined #openstack-keystone12:08
*** HenryG_afk is now known as HenryG12:09
*** soulxu__ has quit IRC12:12
*** soulxu_ is now known as alex_xu12:14
*** gokrokve has joined #openstack-keystone12:28
*** gokrokve has quit IRC12:33
*** henrynash has joined #openstack-keystone12:34
openstackgerritayoung proposed a change to openstack/keystone-specs: Client Creation Interface  https://review.openstack.org/12371512:39
marekdmorganfainberg: I just added one proposal to the design summit etherpad. It's in "Cross Project Sessions Driven By Keystone", point 9. I am not sure it's the right section, so feel free to move it.12:49
marekdmorganfainberg: btw, what's "DNS SERV record Lookup for Keystone?" about? Use-case, what problems it solves etc?12:54
*** gordc has joined #openstack-keystone12:55
*** ayoung has quit IRC12:57
chmouelthis should be fixed by now http://logs.openstack.org/51/123451/1/check/gate-keystonemiddleware-python26/06f82d1/console.html right?12:58
*** jasondotstar has joined #openstack-keystone13:03
*** aix has quit IRC13:03
*** zzzeek has joined #openstack-keystone13:08
*** radez_g0n3 is now known as radez13:11
*** miqui has joined #openstack-keystone13:11
openstackgerritayoung proposed a change to openstack/keystone-specs: Token Constraints  https://review.openstack.org/12372613:16
thiagopHello everyone13:26
thiagopquick question: Can I set multiple nova's endpoints in the same region?13:26
*** joesavak has joined #openstack-keystone13:26
*** gokrokve has joined #openstack-keystone13:28
*** bknudson has joined #openstack-keystone13:30
*** gokrokve has quit IRC13:33
*** saipandi has joined #openstack-keystone13:34
*** lbragstad1 has quit IRC13:36
lbragstadthiagop: you can sent the `region_id` attribute on an endpoint if you're using V3 https://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3.md#endpoints-v3endpoints13:42
thiagoplbragstad: so, it is possible to have two nova services in the same region without crashing anything, right?13:44
*** samuelmz has joined #openstack-keystone13:45
*** r-daneel_ has joined #openstack-keystone13:59
*** garcianavalon has quit IRC14:01
*** vhoward has joined #openstack-keystone14:02
*** sigmavirus24_awa is now known as sigmavirus2414:02
*** gokrokve has joined #openstack-keystone14:03
*** gokrokve has quit IRC14:03
*** gokrokve has joined #openstack-keystone14:03
*** gokrokve has quit IRC14:03
*** gokrokve has joined #openstack-keystone14:04
lbragstadthiagop: yes, as long as the endpoint urls are different14:06
*** richm has quit IRC14:08
*** zzzeek has quit IRC14:08
thiagoplbragstad: thanks.14:10
*** richm has joined #openstack-keystone14:11
*** topol has joined #openstack-keystone14:18
dhellmannmorganfainberg: https://review.openstack.org/#/c/112920/1 looks ok to me as a backport, but I haven't been keeping up with the schedule. Are we frozen now?14:23
*** edmondsw has joined #openstack-keystone14:24
morganfainbergdhellmann, dunno14:30
morganfainbergdhellmann, will need to poke at some stable folks, but that thing has been lingering around and needs to get added if we want to support limited use trusts in icehouse at all under galera+mysql (common deployment)14:31
*** david-lyle has joined #openstack-keystone14:31
*** david-lyle has quit IRC14:31
morganfainbergmarekd, DNS serv record would be a discovery14:31
*** david-lyle has joined #openstack-keystone14:32
morganfainbergmarekd, basically being able to specify just the dns name of the cloud provider and not need to "know" the auth url.14:32
morganfainbergmarekd, it's a minor optimisation14:33
*** david-lyle has quit IRC14:33
*** david-lyle has joined #openstack-keystone14:34
*** david-lyle has quit IRC14:34
*** david-lyle has joined #openstack-keystone14:35
*** ukalifon1 has quit IRC14:35
*** andreaf_ has joined #openstack-keystone14:36
*** andreaf has quit IRC14:36
*** andreaf_ is now known as andreaf14:36
*** andreaf_ has joined #openstack-keystone14:36
*** stevemar has joined #openstack-keystone14:40
openstackgerritA change was merged to openstack/keystone: Read idp_metadata_path value from CONF.saml  https://review.openstack.org/12344614:42
*** andreaf has quit IRC14:43
dhellmannmorganfainberg: count on my +2 if we can confirm that's not going to cause trouble14:44
dhellmannmorganfainberg: I don't see apevec online at the moment14:44
*** aix has joined #openstack-keystone14:44
*** jorge_munoz has joined #openstack-keystone14:47
*** andreaf has joined #openstack-keystone14:57
*** afazekas has quit IRC15:00
dstanekwell, you learn something new everyday15:06
dstaneki didn't realize that you could do this: https://bugs.launchpad.net/python-keystoneclient/+bug/136786815:07
uvirtbotLaunchpad bug 1367868 in python-keystoneclient "List inherited role assignments for domains available on keystone API but not on client" [Undecided,In progress]15:07
*** aix has quit IRC15:11
morganfainbergdstanek, i'll fix that memcache lazy import shortly15:18
morganfainbergdstanek, hopefully we can get the last of these reviews through the gate today.15:19
nkinder_morganfainberg, dhellmann: I just pinged apevec and let him know you want his review on https://review.openstack.org/#/c/112920/115:19
dhellmannnkinder_: thanks15:19
morganfainbergnkinder_, ah thanks. i have no idea where apevec lurks or I'd have done the same15:19
nkinder_morganfainberg: he lurks on internal IRC here, so you would have had a tough time pinging him that way :)15:20
morganfainberglahh15:20
morganfainbergahh*15:20
dstanekmorganfainberg: we can only hope15:20
*** aix has joined #openstack-keystone15:23
morganfainbergdstanek, already had to recheck one of the keystone blockers (the infitine recursion one)15:25
*** david-ly_ has joined #openstack-keystone15:25
bknudsondstanek: https://bugs.launchpad.net/python-keystoneclient/+bug/1367868 is marked as in progress but no review?15:26
uvirtbotLaunchpad bug 1367868 in python-keystoneclient "List inherited role assignments for domains available on keystone API but not on client" [Undecided,In progress]15:26
openstackgerritayoung proposed a change to openstack/keystone-specs: rescope tokens unscoped to scoped only  https://review.openstack.org/12376015:26
*** david-lyle has quit IRC15:27
nkinder_morganfainberg: speaking of stable/icehouse, I'd like this to get in - https://review.openstack.org/#/c/120959/15:27
nkinder_morganfainberg: I'll talk with apevec about it, but additional keystone core reviews would be good15:27
morganfainbergnkinder_, sounds good.15:27
nkinder_it's a mostly straight cherry-pick (one tweak was needed for the tests)15:27
morganfainbergnkinder_, yeah i was waiting for the master one to land on that15:28
*** ajayaa has quit IRC15:28
morganfainbergnkinder_, which it did yesterday15:28
lbragstadstevemar: I think you were wanted in -sdks earlier?15:28
nkinder_yep15:28
*** rushiagr is now known as rushiagr_away15:29
*** ayoung has joined #openstack-keystone15:30
morganfainbergnkinder_, +2, waiting on Alan to comment of course.15:31
openstackgerritMorgan Fainberg proposed a change to openstack/keystonemiddleware: Add an optional advanced pool of memcached clients  https://review.openstack.org/11977415:32
morganfainbergdstanek, ^ I *think* that should do it.15:32
morganfainbergactually i don't like that.15:32
openstackgerritMorgan Fainberg proposed a change to openstack/keystonemiddleware: Add an optional advanced pool of memcached clients  https://review.openstack.org/11977415:33
morganfainbergthere we go15:33
*** rushiagr_away is now known as rushiagr15:37
stevemarlbragstad, cool, i'll see whats going on15:37
*** cjellick has joined #openstack-keystone15:42
*** _cjones_ has joined #openstack-keystone15:43
*** _cjones_ has quit IRC15:44
*** _cjones_ has joined #openstack-keystone15:45
dstanekmorganfainberg: this seems too complex for most Python programmers https://review.openstack.org/#/c/80630/66/keystone/tests/test_sync_migrations.py ; what do you think?15:46
morganfainbergdstanek, ooo meta programming15:50
morganfainbergdstanek, guaranteed most people wont understand it15:50
*** _cjones_ has quit IRC15:50
morganfainbergalso aren't metaclasses supposed to be based on type not object?15:50
*** _cjones_ has joined #openstack-keystone15:52
*** wwriverrat has joined #openstack-keystone15:53
openstackgerritayoung proposed a change to openstack/python-keystoneclient-kerberos: Initial kerberos plugin implementation.  https://review.openstack.org/12361415:56
*** wwriverrat1 has joined #openstack-keystone15:57
*** wwriverrat1 has left #openstack-keystone15:57
*** wwriverrat has quit IRC15:57
*** jsavak has joined #openstack-keystone16:00
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: token signing support alternative message digest  https://review.openstack.org/11737216:01
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: Change cms_sign_data to use sha256 message digest  https://review.openstack.org/11737116:01
*** joesavak has quit IRC16:02
*** k4n0 has quit IRC16:03
*** amerine_ has joined #openstack-keystone16:13
*** amerine has quit IRC16:14
*** larsks has quit IRC16:19
*** stevemar has quit IRC16:20
openstackgerritayoung proposed a change to openstack/keystone-specs:  multiple signing certificate  https://review.openstack.org/12378216:23
openstackgerritRodrigo Duarte proposed a change to openstack/python-keystoneclient: Creating parameter to list inherited role assignments  https://review.openstack.org/11730016:23
*** larsks has joined #openstack-keystone16:29
openstackgerritA change was merged to openstack/keystonemiddleware: Fix test failure after discovery hack  https://review.openstack.org/12302116:30
openstackgerritA change was merged to openstack/keystonemiddleware: Add composite authentication support  https://review.openstack.org/10838416:30
openstackgerritA change was merged to openstack/keystonemiddleware: Fix auth_token for old oslo.config  https://review.openstack.org/12325016:30
*** r-daneel_ has quit IRC16:33
*** afazekas has joined #openstack-keystone16:33
*** radez is now known as radez_g0n316:34
morganfainbergwooot16:35
*** openstackgerrit has quit IRC16:35
morganfainbergmiddleware stuff finally went in.16:35
*** BAKfr has quit IRC16:37
dstanekmorganfainberg: looks like gyee is nitting you to death there16:42
morganfainbergdstanek, fixed16:46
morganfainbergdstanek, just posted the changes16:46
*** afazekas has quit IRC16:47
dstanekmorganfainberg: lgtm16:47
morganfainbergcool16:47
morganfainbergdstanek, i really don't like this pool tbh in the way it's working for middleware (mostly because of the python-memcache lib)16:48
morganfainbergdstanek, looking forward to moving to pymemcached16:48
*** wwriverrat has joined #openstack-keystone16:48
dstanekthe pool idea had scared me since the beginning :-)16:48
dstanekmorganfainberg: did you see the new queue implemention is something like 40% faster?16:49
morganfainbergdstanek, is it really?16:49
morganfainbergwow16:49
morganfainbergthats cool16:49
morganfainbergi hadn't done any real testing beyond functional "does this actually work"16:49
dstanekmorganfainberg: i think it's because we got rid of the extra busy-wait in our code - so that's a bonus16:50
morganfainbergand made sure it wasn't massively slower16:50
morganfainbergyeah i like it16:50
morganfainbergvery glad we droppped that busy wait16:50
*** richm has quit IRC16:53
ayoungmorganfainberg, the "pool of memcache servers"  approach rings alarm  bells.  The calling code should not be aware of that abstraction16:54
ayoungits one thing in keystone where it is a cache16:54
ayoungin Auth Token....hmmm16:54
morganfainbergsame issue occurs in auth_token though16:54
*** dtroyer has quit IRC16:54
*** jamielennox has joined #openstack-keystone16:55
ayoungmorganfainberg, true....my concern is that it makes the whole thing useless16:55
morganfainbergayoung, makes the whole *what* thing useless?16:55
ayoungthe memcache server should be just a single server16:55
*** arborism has joined #openstack-keystone16:55
ayoungif one goes away, and its whole cache with it....16:55
ayoungthen you start using a second...then the second goes away16:56
ayoungeven if the frist comes back,  nothing is cached16:56
morganfainbergayoung, sure, it doesn't mean you don't spiral out of control with client objects in auth_token as well.16:56
morganfainbergayoung, nature of using memcached16:56
ayoungit should be handled by a load balancer, not by keystone specific code16:56
*** dtroyer has joined #openstack-keystone16:56
*** harlowja_away is now known as harlowja16:56
ayoungor HA proxy16:56
morganfainbergayoung, except that doesn't solve the issue either16:56
morganfainbergbecause you're only writing to 1 memcache server16:57
morganfainbergand memcached doesn't replicate on the back end16:57
*** sigmavirus24 is now known as sigmavirus24_awa16:57
ayoungHA proxy would bascially do the same thing16:57
morganfainbergthe point of the pool in auth_token is to avoid endless numbers of client connections from spinning up16:57
morganfainbergand re-use those objects16:57
ayoungThat I am OK with16:58
ayoungits the list of memcache servers aspect that bothers me16:58
morganfainbergthe multi-server stuff was already supported in the old system.16:58
ayoungnot to the point that I want to derail, just...bothers me16:58
ayoungagreed16:58
morganfainbergayoung, memcached bothers me ;)16:58
ayoungthe pool should be a python library,  we've already agreed that we are going there in the next release.  But that doesn';t handle the multiple servers part16:59
morganfainbergayoung, yes and in Kilo that is the plan.16:59
morganfainbergayoung, in Kilo i want to rip it out and make it dogpile based anyway.16:59
ayoungthat said...need me to +2 thatlast version of the patch?  What is different about it ?  Gerrit is merging your changes with the upstream16:59
morganfainbergayoung, if you're ok with the change, +2 would be good. that should be the last outstanding middleware patch17:00
* ayoung broke his gertty setup17:00
ayoungwhats the diff between 8 and 9 of that patch?>17:00
morganfainbergayoung, solving gyee's nits17:00
morganfainbergayoung, changing some args to kwargs, changing the capitilzation on some options.17:01
morganfainbergayoung, and fixing a logic inversion of "if cache is not not" to "if cache is none"17:01
ayoungBTW  5 * 60 was probably me17:01
ayoungI tend to do that.  Don't trust meself to do math17:01
morganfainbergayoung, hehe whoopse, i meant to fix that one too *shrug*.17:01
*** stevemar has joined #openstack-keystone17:02
ayoungtechnically you were right.  It is a memcache server, with memcached bing the daemon process for that server17:02
ayoungwow.  nits17:03
morganfainbergyeah17:03
*** f13o has quit IRC17:03
*** rwsu has quit IRC17:03
ayoung+A17:03
morganfainbergayoung, tyvm sir17:03
ayoungmorganfainberg, posted 4 WIP spec reviews.  I want these to be real collaborations.17:03
morganfainbergayoung, also we're getting the -federation plugin repo today17:03
morganfainbergayoung, the -kerb ones or the spec ones?17:04
ayoungmade them WIP so people don't go correcting spleeling misteaks17:04
ayoungno, specs17:04
ayoungfor the summit and Kilo17:04
morganfainbergayoung, right-o cool17:04
ayoungI think you will like the constraints one17:04
morganfainbergayoung, just checking before i go looking in the wrong place ;)17:04
ayoungit collapses endpoint binding in with object ids etc17:04
*** arborism has quit IRC17:05
ayoungseveral of them will need to be split over server and client.  I don't really like that17:05
morganfainbergayoung, yeah i am a fan of this concept if we can figure a way to make it workable for the deployer/cloud admin/end user.17:05
*** amcrn has joined #openstack-keystone17:05
morganfainbergayoung, the constraints one that is17:05
ayoungI think we should have specs that have a server component and a client component17:05
*** rwsu has joined #openstack-keystone17:06
ayoungmorganfainberg, so, the rule will be if a constraint is specified, it must be met.  If it is not specified, the token can be used for any of that type17:06
ayoungso if no endpoints are specified, the token is good everywhere17:06
ayoungit allows us to get the mechanism in place without anyone having to use it17:06
morganfainbergayoung, sure and that's great, i'm thinking of how we make it friendly for someone to set the constraint in a sane way.17:06
ayoungI see a lot of that being done by the client17:07
morganfainbergayoung, i have zero issue with the enforcement front working like that17:07
ayoungsay you are calling create VM with imageid = X17:07
ayoungthen the client can be smart and say "hey, let me get a token specific to that "17:07
*** richm has joined #openstack-keystone17:07
morganfainbergright17:07
ayoungI see the ordering of features like this17:08
ayoungone  explicit unscoped17:08
ayoungtwo  unscoped to scoped only17:08
ayoungthree  constraints17:08
ayoungeach of those will put some onus on the client,17:08
*** rushiagr is now known as rushiagr_away17:08
*** zzzeek has joined #openstack-keystone17:08
morganfainbergthat makes sense17:08
morganfainbergalso https://review.openstack.org/#/c/123715/1/specs/keystoneclient/creation-interface.rst yes we def. need to solve that17:09
morganfainberghow do you consume say cinderclient today, it's ugly17:09
*** _cjones_ has quit IRC17:12
*** _cjones_ has joined #openstack-keystone17:13
morganfainberghttps://review.openstack.org/123637 and https://review.openstack.org/123612 should be the last of the keystone patches.17:14
*** _cjones_ has quit IRC17:17
*** andreaf has quit IRC17:17
*** andreaf has joined #openstack-keystone17:18
*** _cjones_ has joined #openstack-keystone17:19
*** richm has quit IRC17:19
ayoungmorganfainberg, looking17:21
morganfainbergayoung, just keep your eyes on them.17:21
morganfainbergayoung, they should be gating. / check+gate17:21
ayoungyep....will do17:22
morganfainbergayoung, cool.17:22
* morganfainberg has to go find a printer to fill out paperwork today. I think i'll do that post lunch.17:23
morganfainbergnever realize how little you print things until you haven't had a printer for.. uh... 3 years17:23
*** openstackgerrit has joined #openstack-keystone17:23
*** ayoung has quit IRC17:26
openstackgerritAndre Aranha proposed a change to openstack/keystone: Creating a policy sample  https://review.openstack.org/12350917:26
*** harlowja has quit IRC17:27
*** harlowja has joined #openstack-keystone17:27
*** richm has joined #openstack-keystone17:32
*** marcoemorais has joined #openstack-keystone17:35
*** alex_xu has quit IRC17:38
*** ayoung has joined #openstack-keystone17:41
*** gokrokve has quit IRC17:46
*** openstackgerrit has quit IRC17:51
*** openstackgerrit has joined #openstack-keystone17:51
*** henrynash has quit IRC17:54
*** sigmavirus24_awa is now known as sigmavirus2417:57
*** edmondsw has quit IRC17:59
*** henrynash has joined #openstack-keystone18:00
raildoayoung, I really appreciated the proposal of Token Constraints18:03
*** radez_g0n3 is now known as radez18:06
*** gokrokve has joined #openstack-keystone18:08
*** vhoward has left #openstack-keystone18:16
*** keystone_newbie has quit IRC18:22
*** zigo has quit IRC18:26
*** zigo has joined #openstack-keystone18:28
openstackgerritA change was merged to openstack/keystone: Fix Policy backend driver documentation  https://review.openstack.org/11844318:29
openstackgerritA change was merged to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/12363718:29
*** lsmola has quit IRC18:31
*** lsmola has joined #openstack-keystone18:31
*** vhoward has joined #openstack-keystone18:33
*** marcoemorais has quit IRC18:34
*** marcoemorais has joined #openstack-keystone18:35
*** marcoemorais has quit IRC18:36
*** marcoemorais has joined #openstack-keystone18:37
*** marcoemorais has quit IRC18:37
*** marcoemorais has joined #openstack-keystone18:37
*** marcoemorais has quit IRC18:38
*** marcoemorais has joined #openstack-keystone18:38
*** andreaf has quit IRC18:38
*** andreaf has joined #openstack-keystone18:39
ayoungraildo, cool...help make it bullet proof18:43
openstackgerritBrant Knudson proposed a change to openstack/keystonemiddleware: Convert authentication into a plugin  https://review.openstack.org/11585718:44
morganfainbergand... down to one.18:48
morganfainbergwhich is in the gate queue18:48
nkinder_So what actually landed in Juno for keystone->keystone federation?18:49
nkinder_I know there is a blueprint that says "implemented" here - https://blueprints.launchpad.net/keystone/+spec/keystone-to-keystone-federation18:50
*** andreaf has quit IRC18:50
*** Delair has joined #openstack-keystone18:51
*** andreaf has joined #openstack-keystone18:51
morganfainbergnkinder_, i *think* we have the ability to setup the K2K federation, and issue the SAML2 assertion that is consumed by the SP, and the SP can consume the SAML2 assertion (mod_shib) and turn it into a token18:51
Delair@All Hi Can anybody tell me that how can i enable "Multiple keystone-all worker process"18:52
morganfainbergnkinder_, https://github.com/openstack/keystone/blob/master/doc/source/configure_federation.rst#keystone-as-an-identity-provider-idp18:52
Delairkeystone-all is a single threated application and cant process well in big environment..18:52
morganfainbergDelair, which release of OpenStack (Icehouse? Master/Juno? Havana? Earlier)?18:53
Delair@morgan icehouse18:53
morganfainbergDelair if you're using the latest version (Juno/Master) of Keystone that functionality is there by setting the admin_worker and public_worker settings in the keystone.conf https://github.com/openstack/keystone/blob/master/etc/keystone.conf.sample#L62-L7018:53
Delaircan we update any patch to enable it in ICEHOUSE18:54
bknudsonI've been looking at https://review.openstack.org/#/c/115857/ (Jamie's Convert authentication into a plugin) compared to my Support service user and project in non-default domain (https://review.openstack.org/#/c/123011/)18:54
morganfainbergDelair, unfortunately, before Juno that code isn't available. so the best bet would be to deploy keystone behind apache if you want multiple workers.18:54
bknudsonI don't think Jamie's work is doing what gyee was asking about... it's still not building the plugin from the config18:54
bknudsonusing some automatic method18:54
bknudsonso I think the 2 implementations are complementary18:55
bknudsonand one could be based on the other one or not.18:55
nkinder_Delair: you can also just run Keystone in apache18:55
Delairwe cant to Juno without proper testing ..18:55
morganfainbergnkinder_, ++18:55
bknudsonso if we take https://review.openstack.org/#/c/123011/ first, I'll just rebase https://review.openstack.org/#/c/115857/ on it or vice-versa18:55
Delairwhen you say apache you mean some sort of proxy ?18:56
Delairand enable multiple connection from there ?18:56
morganfainbergDelair, it is possible to run keystone under mod_wsgi18:56
bknudsonI'd like to have https://review.openstack.org/#/c/123011/ available soon because per-domain backends are essentially useless without it IMO.18:56
morganfainbergDelair, we, in-fact recommend that deployment mode (all gating in Juno uses apache + mod_wsgi deployed keystone)18:56
morganfainbergDelair, that does get you the same effect as multiple workers18:56
Delairso which the best solution you can recommend .. The problem is that we cant go to Juno right away and we have production to run very soon on incehouse18:57
Delairand this is the big issue we are facing18:57
morganfainbergDelair, there is the document https://github.com/openstack/keystone/blob/stable/icehouse/doc/source/apache-httpd.rst for icehouse that should help, and you can take a look at what devstack (for master) is doing: https://github.com/openstack-dev/devstack/blob/master/lib/keystone#L117-L14418:58
morganfainbergDelair, i'd recommend (if possible) running ekystone under apache + mod_wsgi18:58
Delairas soon as we run multiple accounts the keystone process goes close to 100%18:58
morganfainbergDelair, i you could also run multiple keystone processes behind HAProxy18:59
morganfainbergDelair or similar loadbalancer18:59
Delairok awesome Thanks Morgan19:00
bknudsonDelair: I was able to backport the multiple workers code to earlier releases... wasn't that difficult and seemed to work.19:00
DelairLet me do some search that how can i do that19:00
*** marcoemorais has quit IRC19:00
morganfainbergbknudson, iirc the original code could land against icehouse19:00
morganfainbergbknudson, or was meant to19:00
morganfainbergbknudson, so makes sense19:00
DelairDo you know of any link of how i use apache + mod_wsgi19:00
nkinder_Delair: https://github.com/openstack/keystone/blob/stable/icehouse/doc/source/apache-httpd.rst19:01
bknudsonDelair: check out how devstack does it.19:01
*** marcoemorais has joined #openstack-keystone19:01
DelairThanks Guys @ Morgan, nkinder and bknudson19:01
*** morganfainberg is now known as morgan19:02
morganDelair, no problem19:02
*** morgan is now known as morganfainberg19:03
nkinder_Delair: there is also support being added to puppet-keystone to deploy in httpd - https://review.openstack.org/#/c/109676/19:08
bknudsonI don't see a review in they keystonemiddleware reviews from Jamie for getting the auth token from the config options.19:08
nkinder_Delair: it's not fully accepted/merged yet, but I tested it last night and it's working nicely.19:08
Delairok let me check that out .. actually it will be good becuase we do use puppet for our openstack deployment19:08
*** amerine_ is now known as amerine19:09
bknudsonThe closest one seems to be https://review.openstack.org/#/c/115451/ , which is trying to get paste config options into CONF, so that would be a prereq for getting auth plugin from config.19:09
bknudsonand that one's an obvious WIP19:09
*** marcoemorais1 has joined #openstack-keystone19:14
*** marcoemorais has quit IRC19:15
*** radez is now known as radez_g0n319:15
nkinder_bknudson: have you seem this? https://bugs.launchpad.net/python-keystoneclient/+bug/137135519:15
uvirtbotLaunchpad bug 1371355 in python-keystoneclient "Keystone client logs x-subject-token at the debug log level" [Undecided,In progress]19:15
nkinder_bknudson: it looks like the response side of the TOKEN_REDACTED work you did for request logging19:16
bknudsonnkinder_: y, interesting.19:17
bknudsonnkinder_: probably because I was only testing with keystone CLI and not nova CLI.19:18
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: Log token with sha1  https://review.openstack.org/12381919:25
bknudsonnkinder_: looks like this debug line is coming from the middleware.19:27
nkinder_bknudson: interesting. I didn't get a chance to dig into the code yet.19:28
nkinder_bknudson: Somebody assigned the bug to themselves, but I don't know how quickly they are going to get to it.19:28
bknudsonnkinder_: I'll just fix it... should only take a couple minutes.19:29
ayoungdstanek, is mock stdlib or third party?  When I run tox -epep8  it tells me it is stdlib, but the gerrit run said third party19:29
nkinder_bknudson: Sure, or just point out the offending code in the bug to give them a chance if they want to contribute19:29
ayoung (uuid and mock from stdlib are separated by whitespace)19:29
dstanekayoung: third party19:29
nkinder_bknudson: if they don't get to it in a day or so, then just fix it.19:30
bknudsonI think there's a mock in py3.19:30
ayoungdstanek, what is flake8 picking up then19:30
dstanekbknudson: yeah, i think unittest.mock19:30
ayoungbut not a top level19:30
*** andreaf has quit IRC19:31
*** andreaf has joined #openstack-keystone19:32
dstanekayoung: http://git.openstack.org/cgit/openstack/keystone/tree/keystone/tests/test_wsgi.py19:32
openstackgerritayoung proposed a change to openstack/python-keystoneclient-kerberos: Initial kerberos plugin implementation.  https://review.openstack.org/12361419:32
bknudsonnkinder_: updated the bug and will work on something else instead.19:32
nkinder_bknudson: thanks!  Always good to encourage a new contributor.19:33
dstanekbknudson: this is what i had to do for py3 support because hacking is too eager: http://git.openstack.org/cgit/openstack/keystone/tree/keystone/tests/__init__.py#n2619:33
ayoungdstanek, pep8 vs flake 8?19:33
ayoungAnd, should we switch tox to run pep8 if that is what gerrit is going to run?19:33
dstanekayoung: maybe, but flake8 uses pep8 to some extent19:33
openstackgerritayoung proposed a change to openstack/python-keystoneclient-kerberos: Initial kerberos plugin implementation.  https://review.openstack.org/12361419:34
ayounglets see if that passes19:34
dstanekayoung: no, because i don't think the hacking rules would work19:34
*** gyee has joined #openstack-keystone19:34
ayoungOh...probably can remove more of the fixtures from that.19:35
dstanekayoung: i think jenkins just runs tox -e pep8 like we do19:35
ayoung2014-09-24 17:35:08.165 | + tox -v -epep819:36
ayoungyep19:36
dstanekah, so it looks like you had 4 groups in rev4 and that mad hacking mad19:36
*** wwriverrat has joined #openstack-keystone19:38
ayoungwell well19:39
ayoung$ ls /usr/lib64/python2.7/mock.*19:39
ayoung/usr/lib64/python2.7/mock.py   /usr/lib64/python2.7/mock.pyo19:39
ayoung/usr/lib64/python2.7/mock.pyc19:39
ayoung$ rpmquery -f  /usr/lib64/python2.7/mock.py19:39
ayoungfile /usr/lib64/python2.7/mock.py is not owned by any package19:39
ayoungsudo rm  /usr/lib64/python2.7/mock.*19:40
ayoungand now it succeeds19:40
openstackgerritayoung proposed a change to openstack/python-keystoneclient-kerberos: Initial kerberos plugin implementation.  https://review.openstack.org/12361419:41
*** radez_g0n3 is now known as radez19:41
*** wwriverrat has quit IRC19:43
*** wwriverrat has joined #openstack-keystone19:43
larsksIs there any sample code out there that uses Ec2 credentials to acquire a keystone token?19:45
*** openstackgerrit has quit IRC19:46
*** openstackgerrit has joined #openstack-keystone19:47
*** wwriverrat1 has joined #openstack-keystone19:47
*** _cjones_ has quit IRC19:47
*** wwriverrat1 has left #openstack-keystone19:47
*** _cjones_ has joined #openstack-keystone19:47
*** _cjones_ has quit IRC19:48
*** _cjones_ has joined #openstack-keystone19:48
*** wwriverrat has quit IRC19:48
nkinder_does this look hosed for anyone else? https://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3-os-trust-ext.md19:51
nkinder_seems like github might be having some problems19:52
nkinder_ayoung, morganfainberg: I just wrote up a bug related to the way policy works for the trusts API, but the more I think about it, the more I'm thinking it's not a bug...19:56
nkinder_ayoung, morganfainberg: would you mind reading over this real quick and giving me your thoughts? http://paste.openstack.org/show/115079/19:56
ayounglookinh19:56
nkinder_It seems like it might just be something that we need to clearly document19:57
ayoungyour write up looks accurate19:57
ayoungone problem with the json format is there is no way to do a comment19:58
ayoungI would love to have that initial comment in policy.json19:58
*** david-ly_ is now known as david-lyle19:58
nkinder_ayoung: yeah, me too :(19:59
ayoungnkinder_, its the one reason so many people chose YAML over JSON19:59
nkinder_ayoung: having it documented elsewhere means I'll need to point people to the doc when they come to me with questions19:59
ayoungnkinder_, http://git.openstack.org/cgit/openstack/keystone/tree/doc/source/configuration.rst#n908   near there?20:00
nkinder_ayoung: are extensions (like trusts) supposed to go into that document too?20:02
nkinder_ayoung: A general purpose comment in that document could be useful saying that some operations have hard-coded restrictions that can't be made less restrictive via policy.20:03
*** marcoemorais1 has quit IRC20:04
*** marcoemorais has joined #openstack-keystone20:04
*** marcoemorais has quit IRC20:05
*** marcoemorais has joined #openstack-keystone20:05
*** packet has joined #openstack-keystone20:07
nkinder_ayoung: https://bugs.launchpad.net/keystone/+bug/137359920:11
uvirtbotLaunchpad bug 1373599 in keystone "Trust operations in policy.json are misleading" [Undecided,New]20:11
nkinder_ayoung: trust extension documentation is completely missing right now :(20:12
ayoungnkinder_, lets make them part of the core API then20:13
ayoung:)20:13
*** kashyap has quit IRC20:13
*** keystone-dev has joined #openstack-keystone20:15
keystone-devHi, I'm trying to develop a keystone extension that gets called whenever a project is created and passes on the project information to a third party api20:16
keystone-devThe callback is working but I don't get the project JSON for the newly created project20:16
keystone-devAll that the callback gets is the project id20:17
keystone-devAny ideas on how I can get the full JSON?20:17
*** marcoemorais has quit IRC20:18
keystone-devI want to avoid calling the openstack API because that would require access to the user's credentials20:18
*** marcoemorais has joined #openstack-keystone20:18
*** marcoemorais has quit IRC20:18
*** marcoemorais has joined #openstack-keystone20:18
*** Delair has quit IRC20:24
*** packet has quit IRC20:27
*** packet has joined #openstack-keystone20:28
*** _cjones_ has quit IRC20:28
*** _cjones_ has joined #openstack-keystone20:28
*** packet has quit IRC20:29
*** packet has joined #openstack-keystone20:30
*** Tahmina has joined #openstack-keystone20:31
*** YorikSar has quit IRC20:34
*** keystone-dev has quit IRC20:35
*** radez is now known as radez_g0n320:46
stevemarnot sure where keystone-dev went, but sounds like this issue: http://markmail.org/message/f7ezjoi4rioutcqv#query:+page:1+mid:nlq3vox3ahm74avn+state:results20:47
stevemarnkinder_, i was *hoping* to put anything extension related under http://docs.openstack.org/developer/keystone/enabling_extensions.html20:49
nkinder_stevemar: yeah, that makes sense20:49
stevemarprobably just rename that section to "Everything is awesome with Extensions" and just have configuration / enabling bits there20:49
stevemarnkinder_, the main configuration section is *way* too overloaded20:50
nkinder_stevemar: I'm going to submit a first patch to clarify the say an empty policy rule and a missing policy rule work this afteroon.20:50
nkinder_Something general and applicable to everything20:50
stevemarthat's cool20:50
nkinder_extension stuff around trusts should be separated out20:50
stevemaryep20:50
nkinder_stevemar: sounds like you've been watching the lego movie... :)20:51
stevemarnkinder_, it's a great source for inspiration20:52
stevemar'Configuring Services to work with Keystone' should be split up between 'Initial Keystone Setup' and 'Keystone Auth Token Middleware Setup'20:56
*** marcoemorais has quit IRC21:06
*** marcoemorais has joined #openstack-keystone21:06
*** marcoemorais has quit IRC21:07
*** marcoemorais has joined #openstack-keystone21:07
*** marcoemorais has quit IRC21:08
*** marcoemorais has joined #openstack-keystone21:10
*** marcoemorais has quit IRC21:10
*** marcoemorais has joined #openstack-keystone21:10
*** marcoemorais has quit IRC21:11
*** marcoemorais has joined #openstack-keystone21:11
*** morgan_remote_ has joined #openstack-keystone21:14
thiagophenrynash: Hi! I'm trying to test the new endpoint policy with something I'm working on but I'm not able to use the REST calls to OS-ENDPOINT-POLICY (404). Do I have to set something besides uncomment the driver configuration in keystone.conf to make it work?21:16
thiagops/not able/unable21:17
*** topol has quit IRC21:27
openstackgerritTAHMINA AHMED proposed a change to openstack/keystone: Closes-Bug: 1372287  https://review.openstack.org/12385721:29
*** saipandi has quit IRC21:30
henrynashthiagop: you put the extension into the pipeline?21:41
thiagophenrynash: I reached the same conclusion. Now it's working.21:42
henrynashthiagop: ok, good!21:42
*** marcoemorais has quit IRC21:43
thiagophenrynash: The docs should be more specific on the need to put this on the pipeline (and sync the database). If I haven't worked with federation before, I'd never figured it out without your help.21:45
*** harlowja has quit IRC21:47
*** harlowja has joined #openstack-keystone21:47
openstackgerritNathan Kinder proposed a change to openstack/keystone: Improve documentation of RBAC policy behavior  https://review.openstack.org/12386221:50
morganfainbergnkinder_, always a fan of doc improvements21:50
nkinder_:)21:50
nkinder_morganfainberg: what's the best way to render/convert that to html to make sure it looks OK?21:51
morganfainbergnkinder_, wait for the jobs to run, click on the "doc" job in gerrit21:51
nkinder_heh, ok.21:51
morganfainbergexample: http://docs-draft.openstack.org/74/119774/9/check/gate-keystonemiddleware-docs/608b200/doc/build/html/21:52
morganfainbergyou can run tox -edocs21:52
morganfainbergand look at the build dir and see, but i usually look at the results directly as well.21:52
morganfainbergdstanek, ayoung, jenkins uses whaterver we define as tox -epep821:54
morganfainbergsimilarly docs are tox -edocs21:55
*** dims_ has joined #openstack-keystone21:55
*** rkofman has quit IRC21:55
*** rkofman has joined #openstack-keystone21:56
*** dims__ has joined #openstack-keystone21:58
-openstackstatus- NOTICE: The openstack-infra/config repo will be frozen for project-configuration changes starting at 00:01 UTC. If you have a pending configuration change that has not merged or is not in the queue, please see us in #openstack-infra.21:58
*** dims has quit IRC21:59
*** dims_ has quit IRC22:00
*** david-lyle has quit IRC22:00
*** david-lyle has joined #openstack-keystone22:01
*** harlowja has quit IRC22:03
*** harlowja has joined #openstack-keystone22:03
openstackgerritTAHMINA AHMED proposed a change to openstack/keystone: Implements: Fix spelling mistake in doc string.\n Closes Bug: 1372287  https://review.openstack.org/12386922:05
*** harlowja has quit IRC22:09
*** harlowja_ has joined #openstack-keystone22:09
*** rodrigods_ has joined #openstack-keystone22:12
*** rodrigods_ has quit IRC22:13
*** marcoemorais has joined #openstack-keystone22:14
*** sigmavirus24 is now known as sigmavirus24_awa22:15
*** raildo_ has joined #openstack-keystone22:19
henrynashthiagop: so there is documentation on this (see: https://github.com/openstack/keystone/blob/master/doc/source/extensions/endpoint_policy.rst)…not quite sure where this gets linked into the pulblished docs22:20
*** jasondotstar has quit IRC22:21
morganfainberghenrynash, thiagop http://docs.openstack.org/developer/keystone/22:23
morganfainbergspecifically http://docs.openstack.org/developer/keystone/enabling_extensions.html#endpoint-policy22:23
morganfainbergwhich i think is http://docs.openstack.org/developer/keystone/extensions/endpoint_policy.html22:24
openstackgerritTAHMINA AHMED proposed a change to openstack/keystone: Implements: Fix a minor spelling mistake in keystone/common/utils.py  https://review.openstack.org/12385722:29
*** joesavak has joined #openstack-keystone22:35
openstackgerritTAHMINA AHMED proposed a change to openstack/keystone: Closes-Bug: 1372287  https://review.openstack.org/12385722:36
*** bknudson has quit IRC22:36
*** jsavak has quit IRC22:38
openstackgerritTAHMINA AHMED proposed a change to openstack/keystone: Fix a spelling mistake in keystone/common/utils.py  https://review.openstack.org/12385722:40
*** openstackgerrit has quit IRC22:47
*** openstackgerrit_ has joined #openstack-keystone22:47
*** openstackgerrit_ is now known as openstackgerrit22:48
*** david-lyle has quit IRC22:59
openstackgerritTim Goddard proposed a change to openstack/keystone: Allow policies to inspect dictionaries on the target using dot syntax  https://review.openstack.org/12388323:06
*** joesavak has quit IRC23:08
*** packet has quit IRC23:10
openstackgerritTim Goddard proposed a change to openstack/keystone: Allow policies to inspect dictionaries in the credentials using dot syntax  https://review.openstack.org/12388323:10
rm_workhey morganfainberg, I assume this *was* pushed to K+? https://blueprints.launchpad.net/keystonemiddleware/+spec/service-tokens23:11
rm_workoh wait, no there's a CR link in there23:11
morganfainbergrm_work, no that is completed and merged in middleware23:12
morganfainberglooks like the commit missed the bp link though23:12
rm_workawesome, yeah23:12
morganfainbergor the LP sync missed23:12
rm_workhmm23:12
rm_workyeah was confused since there were no other updates on it23:12
rm_workcool, thanks :)23:13
morganfainbergrm_work there targeted to the correct milestone and all now23:14
rm_workthanks23:14
*** _cjones_ has quit IRC23:15
morganfainbergrm_work np!23:15
*** _cjones_ has joined #openstack-keystone23:15
*** morgan_remote_ has quit IRC23:20
*** dims__ has quit IRC23:22
*** zzzeek has quit IRC23:24
*** marcoemorais has quit IRC23:27
*** marcoemorais has joined #openstack-keystone23:28
*** marcoemorais has quit IRC23:28
*** zzzeek has joined #openstack-keystone23:28
*** marcoemorais has joined #openstack-keystone23:29
*** marcoemorais has quit IRC23:29
*** rodrigods_ has joined #openstack-keystone23:29
*** marcoemorais has joined #openstack-keystone23:29
*** arunkant has quit IRC23:33
openstackgerritNathan Kinder proposed a change to openstack/keystone: Improve documentation of RBAC policy behavior  https://review.openstack.org/12386223:33
*** bknudson has joined #openstack-keystone23:36
*** bknudson has quit IRC23:36
*** dims has joined #openstack-keystone23:37
*** junhongl has quit IRC23:38
*** rodrigods_ has quit IRC23:38
morganfainbergok audit ids in the keystone log are nice.23:38
morganfainberg<KeystoneToken (audit_id=hlP7b2paQpa6TtddoC7DPA, audit_chain_id=hlP7b2paQpa6TtddoC7DPA) at 0x7f281b8ccd08>23:38
morganfainbergcan track tokens.23:39
*** bknudson has joined #openstack-keystone23:39
*** junhongl has joined #openstack-keystone23:40
*** gyee has quit IRC23:45
*** zzzeek has quit IRC23:46
*** raildo_ has quit IRC23:50
*** alex_xu has joined #openstack-keystone23:51
nkinder_rodrigods: let me know if my reply to your policy file review comment makes sense23:51
*** openstackstatus has quit IRC23:55
*** openstack has joined #openstack-keystone23:55
*** gokrokve has quit IRC23:55
*** openstackstatus has joined #openstack-keystone23:56
*** ChanServ sets mode: +v openstackstatus23:56
*** rodrigods_ has joined #openstack-keystone23:56
*** bknudson has quit IRC23:56
*** bknudson has joined #openstack-keystone23:58

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!