Thursday, 2014-12-04

*** xxj has joined #openstack-keystone00:00
jamielennoxmorganfainberg: it'd be interesting to see if that worked00:00
morganfainbergmore planning needed to make it work though.00:00
jamielennoxmorganfainberg: an entry step might be like a hangouts meeting every month or so to discuss specs in addition to IRC00:00
morganfainberg++00:01
morganfainbergperhaps.00:01
morganfainbergwe can discuss00:01
jamielennoxhmm - not sure how much benefit there is over irc00:01
*** jimhoagland has joined #openstack-keystone00:01
gyee_stevemar, still around?00:03
jamielennoxayoung: i don't see that we need  https://review.openstack.org/#/c/137231 in client00:04
jamielennoxthere00:04
jamielennox's no reason for consumers of the client to be building tokens00:04
jamielennoxother than testing and for that we have ksc.fixture00:04
jamielennoxah, client one: https://review.openstack.org/#/c/135774/00:05
stevemargyee, sorta, about to go eat00:06
*** _cjones_ has quit IRC00:06
jamielennoxdhellmann: you here? re oslo.context00:06
stevemargyee_, ^00:07
gyee_stevemar, trying to understand k2k00:08
* stevemar runs00:08
gyee_so this ecp stuff00:08
gyee_how come its not part of the API?00:08
stevemarwhat do you mean?00:08
gyee_shouldn't we be having something like this? POST /auth/OS-FEDERATION/ecp00:09
gyee_I mean clients have to wrap saml2 with ecp00:09
gyee_and then post the stuff to SP00:09
stevemargyee_, yes, you are correct...00:10
stevemargyee_, we didn't really know that would be an issue00:10
gyee_I mean we should be able to allow clients to ask for ecp instead of saml200:10
*** chrisshattuck has quit IRC00:10
gyee_I am just looking at it from UX standpoint00:10
*** quack_quack_ has joined #openstack-keystone00:11
stevemaryeah00:11
stevemargyee_, if you look here: http://blog.rodrigods.com/playing-with-keystone-to-keystone-federation/00:11
stevemargyee_, rodrigods, had to do that (search for transform_assertion_into_ecp)00:11
gyee_stevemar, I am using his script to test the stuff in my setup00:12
*** _cjones_ has joined #openstack-keystone00:12
quack_quack_hi, i'm trying to figure out how s3_token works, and I'm having trouble understanding a portion of code that is passed on to keystone's s3tokens api00:12
quack_quack_specifically starting with this line https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/middleware/s3_token.py#L21700:12
gyee_stevemar, I am trying to figure out how we can enhance UX by making ecp wrap transparent00:12
quack_quack_'access', 'token', 'signature' aren't really documented as far as I can tell00:12
stevemargyee_, yeah, that's definitely a possible spot for improvement00:13
quack_quack_this is the best that I can find: https://wiki.openstack.org/wiki/Keystone-BP-S3Token00:13
stevemarwe can have a new endpoint that wraps it00:13
gyee_stevemar, right, that would be awsomer00:13
jamielennoxquack_quack_: you're almost better to ask the swift guys - i don't think anyone here has much experience with s300:14
quack_quack_thanks jamielennox00:14
jamielennoxquack_quack_: however looking at it, token is the keystone token from X-Auth-Token00:14
quack_quack_ok00:14
jamielennoxand access and signature are generally the way that AWS does auth right?00:14
stevemarquack_quack_, plus we don't like ducks00:14
quack_quack_:)00:14
gyee_quack_quack, what's the problem?00:15
*** bknudson has joined #openstack-keystone00:15
*** ChanServ sets mode: +v bknudson00:15
quack_quack_ok this is making more sense jamielennox00:15
rodrigodsgyee_, stevemar ++ the SP stuff for K2K will help a lot as well00:15
quack_quack_so access is the access key00:15
quack_quack_i'm wondering how signature is calculated00:15
gyee_access is access key ID00:15
gyee_signature is calculated based on ec200:15
quack_quack_gyee, I'm basically trying to figure out how to get from access key id and access secret00:15
quack_quack_to something that authenticates against keystone00:15
gyee_quack_quack, from credential API00:16
gyee_you'll need to create the credential using v3 credential API00:16
quack_quack_sorry gyee_ but what do you mean?00:16
notmynamejamielennox: quack_quack_?00:16
quack_quack_i'm somewhat new to this00:16
gyee_you'lll need to create an ec2 credential00:16
gyee_it has two components, access key ID and secret00:17
* quack_quack_ nods00:17
jamielennoxnotmyname: first time someone has asked about the s3 middleware for as long as i can remember00:17
gyee_secret is used to generate the hmac signature00:17
notmynamejamielennox: we get questions over in -swift from time to time :-)00:17
gyee_access key id is used to identify the key used to generate the signature00:17
gyee_notmyname, while you are here, can I ask you a swift question?00:17
jamielennoxnotmyname: i know that it's only keystone v2, i thought it was essentially dead00:18
* notmyname has zero idea how swift3 middleware and keystone work together00:18
notmynamegyee_: of course! (and I'm always here)00:18
quack_quack_lol notmyname00:18
gyee_notmyname, once an account is marked as deleted and before the reaper take it, can it be reversed?00:18
notmynamejamielennox: swift3 is in stackforge these days. still maintained. I've got a few customers who use it00:18
jamielennoxquack_quack_: that's true - there is an external middleware called swift3 i'd be inclined to use over the one in keystonemiddleware00:18
notmynamegyee_: ya. there's a delay in the reaper00:18
*** afaranha_ has quit IRC00:18
notmynamegyee_: /me goes to look for the config/docs00:19
gyee_nomyname, what's the magic command/API to undelete it?00:19
quack_quack_jamielennox: so swift3 does the api translation from S3 API to Swift00:19
quack_quack_and then hands off the credential authentication to s3_token in the WSGI pipeline00:19
notmynamegyee_: https://github.com/openstack/swift/blob/master/etc/account-server.conf-sample#L14600:19
gyee_quack_quack, you'll need the s3 emulator middleware as well00:19
gyee_which no longer part of Swift :)00:19
quack_quack_yes, swift3 is in stackforge00:20
jamielennoxquack_quack_: oh, right - i'll shut up then00:20
quack_quack_:)00:20
notmynamegyee_: looking00:20
gyee_notmyname, once the reaper started, there's no turning back right?00:20
notmynamegyee_: important questions first. is this something you're currently dealing with? ie is there a fire that needs to be put out before we figure out long-term ops processes?00:21
gyee_notmyname, I am trying debug an issue in out public cloud, its trying to *reprovision* the same account for some reason which I think its wrong00:23
*** dims has quit IRC00:23
gyee_s/out/our/00:23
quack_quack_gyee_: where does token come from?00:23
notmynamegyee_: ok. maybe we should move over to -swift to let keystone have their channel? :-)00:23
gyee_my understanding is that once the account is marked is deleted, its not *recycleable*00:23
gyee_definitely a bug on our end00:24
quack_quack_you mentioned it's x-auth-token but how00:24
quack_quack_ok i get it00:24
quack_quack_thanks gyee_00:25
gyee_quack_quack_, welcome00:26
quack_quack_ok...so s3 canonical string is rolled into x-auth-token00:28
*** afaranha_ has joined #openstack-keystone00:29
*** _cjones_ has quit IRC00:29
gyee_authorization header I think00:29
quack_quack_yup00:29
*** nellysmitt has joined #openstack-keystone00:29
gyee_let me take a look at the code00:29
quack_quack_the canonical string is an S3 calculation00:29
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: duplicate auth-url option returned by BaseGenericPlugin  https://review.openstack.org/13265200:30
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Add missing user-id option to generic.Password  https://review.openstack.org/13262600:30
*** nellysmitt has quit IRC00:34
gyee_quack_quack_, right, token contains the canonicalized string00:38
gyee_authorization header contains the access key id and signature00:38
*** thedodd has quit IRC00:39
*** afaranha_ has quit IRC00:39
gyee_rodrigods, your ecp temp has hardcoded "GeneratedKey"?00:41
gyee_ecp template I mean00:41
quack_quack_Thanks gyee_00:41
rodrigodsgyee_, yes00:42
gyee_rodrigods, why?00:42
*** dims has joined #openstack-keystone00:42
gyee_is that the reason we turned off ecp validation?00:42
jamielennoxcan someone give me some UX advice on this one: https://review.openstack.org/#/c/130159 i'm ok with the idea but the syntax seems horrible00:43
rodrigodsgyee_, the ecp validation is made via the same assertion I guess00:43
rodrigodsgyee_, the difficult was to have a valid soap envelope00:44
rodrigodsgyee_, once I got that one (thx to marekd|away), used it to perform the tests00:44
gyee_rodrigods, but do we have to authenticate ecp? isn't the signature on the saml2 assertion good enough?00:45
*** kobtea has joined #openstack-keystone00:45
rodrigodsgyee_, ecp only accepts soap00:46
rodrigodsgyee_, there is a step where the SP checks the metadata from the IdP against the SAML assertion signature00:46
rodrigodswhich was failing here00:47
rodrigodswhich *is* failing =(00:47
gyee_k00:47
gyee_looking at the code, I don't see any IdP metadata baked into ecp though00:48
*** _cjones_ has joined #openstack-keystone00:49
*** kobtea has quit IRC00:50
gyee_jamielennox, ouch! those allow_* params, shouldn't they be part of the filter?00:50
gyee_endpoint filter I mean00:51
rodrigodsgyee_ the X509 part?00:51
jamielennoxgyee_: they will end up as part of the endpoint filter00:51
jamielennoxgyee_: it's how you set it up for the client to use00:52
jamielennoxthis will mean that you could do nova.Client(session, allow_unknown=True)00:52
jamielennoxwhich i don't mind it's just ugly00:52
gyee_jamielennox, why not just a generic dict for endpoint filter00:52
jamielennoxwel lthat's what the plugin takes00:53
jamielennoxit's just how do we set that up to allow users to set it00:53
gyee_rodrigods, I am looking at transform_assertion_into_ecp()00:53
gyee_just the TEMPLATE part00:53
gyee_I don't see any IdP attributes there00:54
rodrigodsgyee_, this is just the envelope. the idp attributes are in the saml assertion generated by keystone00:55
gyee_jamielennox, what I mean is why not just **endpoint_filter or something00:55
*** afaranha_ has joined #openstack-keystone00:55
rodrigodswhich is included in the "body" of this envelope00:55
gyee_instead of keep adding stuff to args list00:55
gyee_rodrigods, I see00:56
jamielennoxi guess we could allow passing an arbitrary endpoint_filter there00:56
jamielennoxwe already take things like service_type at the adapter which gets added to the endpoint_filter00:56
jamielennoxso i understand why he did it that way00:57
gyee_jamielennox, my personal preference, but the Python Jadis may disagree :)00:57
gyee_Python Jedis00:57
gyee_rodrigods, how many signatures are there? just the saml2 assertion signature right?00:59
jamielennoxyea, i don't know00:59
rodrigodsgyee_, yes00:59
gyee_rodrigods, so ecp signature = saml2 assertion signature? sorry for asking rudimentary questions as I am still trying to figure out ecp01:01
rodrigodsgyee_, heh no problem, I mean, AFAIK yes01:02
*** jimhoagland has quit IRC01:03
gyee_rodrigods, cool, thanks for the help!01:03
rodrigodsgyee_ np! :)01:03
*** arif-ali has quit IRC01:05
*** arif-ali has joined #openstack-keystone01:06
jamielennoxgyee_: if you have a minute can you look at the blocking reviews for ksc and middleware?01:06
jamielennoxthe ksc ones are mostly easy01:06
*** ncoghlan has joined #openstack-keystone01:07
gyee_jamielennox, sure01:07
gyee_links?01:07
jamielennoxhttps://gist.github.com/dolph/651c6a1748f69637abd001:07
gyee_k01:08
*** ncoghlan is now known as ncoghlan_afk01:09
gyee_-1 from jenkins?01:09
*** tellesnobrega_ has quit IRC01:10
openstackgerritBrant Knudson proposed openstack/keystone: Remove test PYTHONHASHSEED setting  https://review.openstack.org/13659301:11
openstackgerritBrant Knudson proposed openstack/keystone: Correct XMLEquals matcher for ordering  https://review.openstack.org/13891801:11
openstackgerritBrant Knudson proposed openstack/keystone: Correct test_auth_unscoped_token_project for result ordering  https://review.openstack.org/13891901:11
openstackgerritBrant Knudson proposed openstack/keystone: Correct test_get_v3_catalog test for result ordering  https://review.openstack.org/13892001:11
openstackgerritBrant Knudson proposed openstack/keystone: Correct catalog response checker for result ordering  https://review.openstack.org/13892101:11
openstackgerritBrant Knudson proposed openstack/keystone: Correct test_identity_attribute_conflict_with_none_value for result ordering  https://review.openstack.org/13892201:11
openstackgerritBrant Knudson proposed openstack/keystone: Correct version tests for result ordering  https://review.openstack.org/13892301:11
jamielennoxgyee_: transient, the dependant one works01:12
*** afaranha_ has quit IRC01:13
jamielennoxgyee_: assuming you mean the ksc one01:13
gyee_right01:13
gyee_that's fine01:13
*** _cjones_ has quit IRC01:17
*** afaranha_ has joined #openstack-keystone01:17
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Split identity server into v2 and v3  https://review.openstack.org/13053401:22
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Allow loading other auth methods in auth_token  https://review.openstack.org/12955201:22
*** _cjones_ has joined #openstack-keystone01:23
*** jimhoagland has joined #openstack-keystone01:26
gyee_jamielennox, gotta run, I'll finish reviewing the rest later tonight01:27
jamielennoxgyee_: ok, juust saw your no tests comment - not sure what you really want tested there01:27
jamielennoxgyee_: i'll come up with something01:27
gyee_but you are changing the args right?01:27
*** afaranha_ has quit IRC01:27
gyee_tests would make it awesomer01:27
gyee_be back in a couple of hours01:28
*** gyee_ has quit IRC01:28
jamielennoxgyee: thanks01:29
*** ncoghlan_afk is now known as ncoghlan01:29
*** jimhoagland has quit IRC01:31
*** tellesnobrega_ has joined #openstack-keystone01:32
*** afaranha_ has joined #openstack-keystone01:33
*** ncoghlan is now known as ncoghlan_afk01:45
*** diegows has quit IRC01:53
bknudsonI feel like I just fixed a gate problem and here we go again.01:54
*** sluo_wfh has joined #openstack-keystone01:58
*** dims has quit IRC01:58
*** sluo_wfh has quit IRC02:03
*** topol has joined #openstack-keystone02:10
*** ChanServ sets mode: +v topol02:10
*** afaranha_ has quit IRC02:11
*** ncoghlan_afk is now known as ncoghlan02:14
adam_gbknudson, master branches should be unblocked now, /w  https://review.openstack.org/#/q/Ib08685be252e1fdb0f10853f8fc9a7e19ac54a94,n,z02:16
*** afaranha_ has joined #openstack-keystone02:21
*** erkules_ has joined #openstack-keystone02:23
*** erkules has quit IRC02:25
*** marcoemorais1 has quit IRC02:25
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Pass all adapter parameters through to adapter  https://review.openstack.org/13822802:25
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Pass all adapter parameters through to adapter  https://review.openstack.org/13822802:30
*** nellysmitt has joined #openstack-keystone02:30
*** sluo_wfh has joined #openstack-keystone02:30
jamielennoxbknudson: are we blocked on neutron stable again?02:32
*** afaranha_ has quit IRC02:32
*** _cjones_ has quit IRC02:34
*** browne has quit IRC02:34
*** nellysmitt has quit IRC02:35
*** r-daneel has quit IRC02:36
adam_gjamielennox, the fix to master just landed, waiting on https://review.openstack.org/#/c/138933/ for stable02:39
openstackgerritMerged openstack/keystone: sys.exit mock cleanup  https://review.openstack.org/12424002:44
*** markvoelker has quit IRC02:56
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Allow fetching user_id/project_id from auth  https://review.openstack.org/11852002:59
*** topol has quit IRC03:03
*** tellesnobrega_ has quit IRC03:10
*** david-lyle is now known as david-lyle_afk03:16
*** chrisshattuck has joined #openstack-keystone03:19
*** zzzeek has quit IRC03:28
*** afaranha_ has joined #openstack-keystone03:35
*** richm has quit IRC03:55
*** lhcheng has quit IRC04:05
*** lhcheng has joined #openstack-keystone04:14
*** david-ly_ has joined #openstack-keystone04:22
*** david-lyle_afk has quit IRC04:25
*** _cjones_ has joined #openstack-keystone04:27
*** _cjones_ has quit IRC04:29
*** _cjones_ has joined #openstack-keystone04:29
*** nellysmitt has joined #openstack-keystone04:31
*** nellysmitt has quit IRC04:36
*** lhcheng has quit IRC04:38
*** Shohei_ has quit IRC04:51
*** Shohei_ has joined #openstack-keystone04:53
*** david-lyle_afk has joined #openstack-keystone04:58
*** david-ly_ has quit IRC04:59
ayoungjamielennox, so I think we have the requirements for DOA down to either do password auth like it is now, or do a redirect  to SSO and accept a token for login.  I think the Kerberos patch is not going to be needed.05:02
jamielennoxayoung: still awake?05:05
*** rdo_ has joined #openstack-keystone05:07
jamielennoxayoung: if i can figure out password auth then the rest are just substituting plugins05:08
jamielennoxi'm looking at the test code now - it's so tightly bound to the current implementation because it's mocking everywhere05:08
*** rdo has quit IRC05:09
jamielennoxayoung: there's no way i can write these tests in an abstract enough way that they will work with the old and new impl05:09
ayoungjamielennox, yeah, don't bother with that.05:09
*** samuelms has quit IRC05:10
ayoungSo long as the mocking is a direct replacement, I think it will go ahead OK.  I think that the Horizon code also gets a CI of some sort, so you won't break the real thing by replacing direct client creationg with session stuff05:10
*** samuelms has joined #openstack-keystone05:11
ayoungthe mocking kindof assumes the sequence of calls...you are not going to make that seamless05:11
jamielennoxayoung: i can't find any way to isolate the tests, i can't run nose directly05:13
jamielennoxthe only way they'll work for me is under tox, and there is no filter for individual tests05:13
ayoungI recall battling through that...05:13
ayoungI might have resorted to nose05:13
ayoungactivate the venv, pip install nose and run  nosetests05:14
ayoungah, no wait05:15
ayoungjamielennox, there is a testrunner in that code base...05:15
ayoungI think I was running that directly05:15
jamielennoxayoung: isn't making a difference, currently got all but one test commented out05:16
ayoungjamielennox, yeah...its a pain.  I think I did the same thing05:17
ayoungI was running using05:17
ayoung . .tox/py27/bin/activate05:17
ayoungpython openstack_auth/tests/run_tests.py05:17
ayoungI think I might have hacked it at one point to run a specific test instead of commenting the other ones out05:17
ayounglike you, I didn't really want to put the effort into modernizing DOA05:18
jamielennoxi spent 20 minutes or so doing a first pass, just removing mox05:19
ayoungheh05:19
jamielennoxand got through like 2 cases05:19
jamielennoxnot my problem05:19
ayoungjamielennox, OK...gonna crash for tonight...unless you got anything else for me?05:20
jamielennoxayoung: nothing pressing i think, need to get a few reviews passed so morgan can do a release05:21
jamielennoxbut they can be tomorrows problem05:21
ayoungsend an email with the pressing ones, I'll hit in the morning05:21
jamielennoxayoung: they're in the blocking review gist in channel header05:21
openstackgerritayoung proposed openstack/python-keystoneclient: Example Initialization scripts  https://review.openstack.org/8268705:23
*** afaranha_ has quit IRC05:23
ayoungjamielennox, ^^ was a rebase to test my script still ran.  It does05:26
ayoungI'mm make the changes later, thanks for the review on it.05:27
*** ncoghlan is now known as ncoghlan_afk05:28
*** chrisshattuck has quit IRC05:33
*** Shohei_ has quit IRC05:41
*** Shohei has joined #openstack-keystone05:41
*** Shohei_ has joined #openstack-keystone05:43
*** Shohei has quit IRC05:43
*** ajayaa has joined #openstack-keystone05:45
*** Shohei_ has quit IRC05:49
*** ncoghlan_afk is now known as ncoghlan05:49
*** Shohei has joined #openstack-keystone05:49
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/13624306:03
*** drjones has joined #openstack-keystone06:06
*** ncoghlan is now known as ncoghlan_afk06:07
*** _cjones_ has quit IRC06:09
*** mflobo has quit IRC06:09
*** mflobo has joined #openstack-keystone06:10
*** ncoghlan_afk is now known as ncoghlan06:11
*** kobtea has joined #openstack-keystone06:11
*** mflobo_ has joined #openstack-keystone06:13
*** kobtea has quit IRC06:16
*** mflobo has quit IRC06:16
*** harlowja_ is now known as harlowja_away06:19
*** nellysmitt has joined #openstack-keystone06:32
*** nellysmitt has quit IRC06:37
*** ncoghlan has quit IRC06:50
*** ncoghlan has joined #openstack-keystone06:50
*** drjones has quit IRC06:51
*** _cjones_ has joined #openstack-keystone06:52
*** stevemar has quit IRC06:54
*** k4n0 has joined #openstack-keystone06:54
*** henrynash has joined #openstack-keystone06:56
*** ChanServ sets mode: +v henrynash06:56
*** _cjones_ has quit IRC07:00
*** _cjones_ has joined #openstack-keystone07:00
*** lhcheng has joined #openstack-keystone07:11
*** _cjones_ has quit IRC07:11
*** henrynash has quit IRC07:41
*** lhcheng has quit IRC07:42
*** _cjones_ has joined #openstack-keystone07:44
openstackgerritAndrey Pavlov proposed openstack/keystone: Handle SSL termination proxies for version list  https://review.openstack.org/13223507:44
*** _cjones_ has quit IRC07:49
*** _cjones_ has joined #openstack-keystone07:59
*** Maike has joined #openstack-keystone08:07
*** marekd|away is now known as marekd08:07
MaikeHi, I'm using stable/juno on Ubuntu 14.04. During the stack.sh I got the following error: "Could not find project: alt_demo08:09
Maike".. Can anyone help me, please?08:09
bretonwhy do you ask here and not in #openstack/#openstack-dev?08:24
*** Maike has quit IRC08:25
*** nellysmitt has joined #openstack-keystone08:26
*** bjornar has quit IRC08:30
*** ncoghlan has quit IRC08:34
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Pass all adapter parameters through to adapter  https://review.openstack.org/13822808:35
*** jamielennox is now known as jamielennox|away08:37
*** Maike has joined #openstack-keystone08:39
*** ishant has joined #openstack-keystone08:43
*** bjornar has joined #openstack-keystone08:57
*** jistr has joined #openstack-keystone09:05
*** f13o has joined #openstack-keystone09:12
MaikeHi, I'm using stable/juno on Ubuntu 14.04. During the stack.sh I got the following error: "Could not find project: alt_demo09:25
Maike".. Can anyone help me, please?09:25
bretonMaike: why do you ask here and not in #openstack/#openstack-dev?09:31
*** Maike has quit IRC09:32
*** mflobo_ has quit IRC09:33
*** mflobo has joined #openstack-keystone09:34
*** jistr is now known as jistr|trng09:35
*** Maike has joined #openstack-keystone09:41
*** Maike has quit IRC09:42
*** Maike has joined #openstack-keystone09:42
*** kobtea has joined #openstack-keystone09:49
*** kobtea has quit IRC09:54
*** henrynash has joined #openstack-keystone09:54
*** ChanServ sets mode: +v henrynash09:54
*** _cjones_ has quit IRC09:54
*** tellesnobrega_ has joined #openstack-keystone10:34
marekdhenrynash: hey. Looks like currently identity_api doesn't allow for something like get_group_by_name(name, domain), right?10:35
openstackgerritSergey Skripnick proposed openstack/python-keystoneclient: Raise proper exception in case of connection error  https://review.openstack.org/13742210:37
*** lhcheng has joined #openstack-keystone10:42
*** lhcheng has quit IRC10:46
samuelmsmoening11:02
samuelmsmorning*11:02
*** erkules_ is now known as erkules11:04
*** tellesnobrega_ has quit IRC11:04
openstackgerritMarek Denis proposed openstack/keystone: Identify groups by name/domain in mapping rules.  https://review.openstack.org/13901311:12
*** tellesnobrega_ has joined #openstack-keystone11:28
henrynashmarked:true…at the manager level you mean?  Hmm, I think you are right…there is a get_user_by_name, but not a get_group_by_name11:46
*** radez is now known as radez_g0n311:52
*** dims has joined #openstack-keystone11:55
*** aix has quit IRC11:59
marekdhenrynash: yeah, checked it already. I need to implement it for the mapping enhancements.12:03
marekdhenrynash: btw, thanks for supportive comment in the spec.12:03
openstackgerritCedric Brandily proposed openstack/python-keystoneclient: Use textwrap instead of home made implementation  https://review.openstack.org/13903212:07
openstackgerritIlya Pekelny proposed openstack/keystone: Comparision of database models and migrations.  https://review.openstack.org/8063012:10
openstackgerritIlya Pekelny proposed openstack/keystone: Use metadata.create_all() to fill a test database  https://review.openstack.org/9355812:11
henrynashmarekd: if you want me to wip up a quick change to idenity to add the get_group_by_name….let me know12:18
marekdhenrynash: if you think you will be able to do it quickly and have time that would be awesome.12:20
marekdhenrynash: i started working on mapping engie, but later came across lack of get_group_by_name12:21
henrynashmarekd: I guess we need a spec..maybe we add that to your spec (i.e. make it one of the actions to be done)12:21
marekdhenrynash: i think an action would be enough. I will update it12:21
*** amakarov_away is now known as amakarov12:23
henrynashmarekd: although it will only be internal I assume, we won’t expose it in the REST APi?12:23
marekdhenrynash: it won't12:23
marekdi mean, we don't need it for my spec12:23
henrynashmarekd: interestingly the get_user_by_name is exposed by the v2 API, but not the V3 API - so agreed, not required by your spec12:24
marekdhenrynash: yes, but with v3 API everything can be resolved by name/domain12:25
svashekahi guys12:25
marekdhello12:25
svashekacan you give me advice on how better to cover enforcement with automation?12:25
henrynashmarekd: well, usin a list call, yes12:25
svashekaand by automation I mean performance testing12:26
svashekawhich actions I better use for the through python bindings12:26
marekdhenrynash: http://128.142.152.197:5000/v3/groups?domain_id=default&name=maro12:26
marekdhenrynash: it uses list, but the final call is like just pasted12:27
henrynashmarekd: yes, indeeed12:27
marekdhenrynash: where is a router/controller for that?12:27
marekdhenrynash: it looks like the logic for getting a group by name/domain is already implemented.12:28
henrynashmarekd: well it is implemented as part of filtering12:28
henrynashmarekd: but filteringis optional inthe backends….and relies on the fact that the controller will do any filtering that was not able to be done by teh backends12:29
henrynashmarekd: so today, the SQL driver WILL do the filtering, but the LDAP will not (and the final wrap_collection in controller.py does teh filter in python)12:29
marekdhenrynash: aha.12:30
marekdhenrynash: ok, i am updatng the spec, if you have time, please implement get_group_by_name and in the meantime i will get back to the mapping engine.12:31
henrynashmarekd: you’ll have a first version in less than an hour12:31
marekdhenrynash: thanks :-)12:31
*** mzbik has joined #openstack-keystone12:47
*** radez_g0n3 is now known as radez12:48
*** Maike has quit IRC13:14
*** jaosorior has joined #openstack-keystone13:17
*** aix has joined #openstack-keystone13:18
openstackgerritLance Bragstad proposed openstack/keystone: Move test_utils to keystone/tests/unit/  https://review.openstack.org/13398913:19
*** aix has quit IRC13:20
*** bknudson has quit IRC13:22
openstackgerrithenry-nash proposed openstack/keystone: Add an identity backend methods to get group by name.  https://review.openstack.org/13904513:23
openstackgerrithenry-nash proposed openstack/keystone: Add an identity backend method to get group by name.  https://review.openstack.org/13904513:24
henrynashmarekd: see: https://review.openstack.org/#/c/139045/13:24
marekdhenrynash: looking.13:24
*** kobtea has joined #openstack-keystone13:27
openstackgerritayoung proposed openstack/keystone: Add an identity backend method to get group by name.  https://review.openstack.org/13904513:27
ayounghenrynash, +2.  I fixed a typo in the commit message.13:30
henrynashayoung: thx!13:30
marekdhenrynash: i still need to pass domain_id, right?13:30
henrynashmarekd: tes13:30
henrynashyes, even13:30
mzbikwhy again LDAP is "omitted"?13:30
ayoungmarekd, yep...although you could fake it for LDAP!13:30
ayoungmzbik, ?13:31
marekdmzbik: https://review.openstack.org/#/c/139045/3/keystone/identity/backends/ldap.py13:31
henrynashayoung: def get_group_by_name(self, group_name, domain_id)13:31
mzbikreturn self.group.get_filtered_by_name(group_name) without use of domain_id13:31
henrynashoops sorry, that was meant for marekd13:31
henrynashmzbik: because the domain_id is handled at the manager level13:31
mzbikhmm13:31
mzbikjust asking13:32
*** kobtea has quit IRC13:32
henrynashmzbik: our LDAP drivers do not support domains13:32
mzbikget_user_by_name is not really working for LDAP due to sth similar13:32
ayoungmzbik, LDAP assumes that all of the entities are in a single tree, and that tree represents one domain13:32
mzbikagree13:32
ayoungit maps to how the vast majority of LDAP servers are set up.  We *could* do multi domain support inside of LDAP, but it would nt be usable by the vast majority of people13:33
ayoungmzbik, so henrynash came up with a better approach:  we use the domain entry in SQL, and then have separate backends fro LDAP.  So if you really need multiple domains in LDAP, you can, its just a little more work.  But the end result maps more closely to real deployments13:33
mzbikhttps://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap.py#L80-L8113:34
mzbikayoung, yeah I agree just misread it13:34
*** tellesnobrega_ has quit IRC13:35
henrynashmzbik: ..and that’s what I meant by doing it at the manager level - the identity manager is really handling this domain-level indirection13:35
mzbikone LDAP = one domain looks good for me13:35
ayounghenrynash, we really should look again at handling hints in the LDAP driver, if only for users13:35
henrynashayoung: yeah, I agree….13:36
mzbikayoung, groups too ;) please...13:36
ayoungmzbik, yeah13:36
ayoungmzbik, care to take a stab at implementing it?13:36
henrynashayoung: as we scale up, without it teh performacne issues will scale too13:36
marekdhenrynash: what is we use something like https://github.com/openstack/keystone/blob/master/keystone/common/controller.py#L638 ?13:36
marekdlooks like it should allow users pass either name or id.13:36
marekdhenrynash: https://github.com/openstack/keystone/blob/master/keystone/identity/controllers.py#L289-L296 here for instance.13:37
mzbikayoung, I tried to read code yesterday and I made sure that Im really poor programmer :(13:37
marekdunless i misunderstood something....:(13:37
ayoungmzbik, look at how hints are handled for SQL13:38
henrynashmarked: taht’s for create group...13:38
mzbikayoung, did it ;)13:38
mzbikand still stoned13:38
marekdyes, but doesn't it resolve domain_id if user passed its name?13:38
*** svasheka has quit IRC13:38
marekdhenrynash: ^^13:38
henrynashmarekd: that’s in normalize_domain_id....13:39
ayounghttps://github.com/openstack/keystone/blob/master/keystone/common/sql/core.py#L24213:39
mzbikayoung, I know my approach looks like "I want it!" but its not13:39
henrynashmarekd: if you haven’t specified the domain, I think the spec says we use the domain from the token if it is a domain scoped token13:39
ayoungmzbik, how strong is your LDAP kung fu?13:40
marekdhenrynash: hm...so we need t o change the spec and refuse specyfing domains by names13:40
mzbikayoung, not even white belt :/13:40
henrynashmarekd: sorry, I guess I’m not following you on what the issue is…13:40
mzbikayoung, my first encounter with LDAP was 2 weeks ago13:40
ayoungmzbik, maybe we can browbeat topol into doing it.  He loves LDAP13:41
mzbik:)13:41
ayoungok...I gotta run.13:41
*** ayoung is now known as ayoung-dentist13:41
marekdhenrynash:  https://review.openstack.org/#/c/138035/10/specs/kilo/mapping-enhancements.rst so around line 130 there are local rules with domain identified either by id or name13:41
henrynashmarekd: oh, you maind DOMAIN name, I thought you were talking about group name…13:42
marekdhenrynash: previously? i was talking about group name.13:42
henrynashmarekd: so we havea  get_domain_by_name methods already13:43
marekdbut i thought we could identify the group by it's name AND domains name (like group: consumers in domain: pepsi, not group 'consumers' in domain: '342dfgd65456fghfgh')13:43
henrynashmarekd: we can....13:43
marekdhenrynash: ah, ok so i'll need to add one intermediate step.13:44
henrynashmarekd: in the code, yes13:44
marekdbefore get_group_by_name is invoked.13:44
henrynashmarekd: yep13:44
marekdhenrynash: ok13:44
marekdhenrynash: thanks for the patch13:44
marekdappreciate it.13:44
henrynashmarekd: yw13:44
openstackgerritLance Bragstad proposed openstack/keystone: Move test_utils to keystone/tests/unit/  https://review.openstack.org/13398913:45
*** tellesnobrega_ has joined #openstack-keystone13:48
marekdok, be back soon.13:48
*** svasheka has joined #openstack-keystone13:49
*** bdossant_ has joined #openstack-keystone13:49
*** bdossant_ has quit IRC13:50
*** bdossant has quit IRC13:52
*** bdossant has joined #openstack-keystone13:52
samuelmshenrynash, ping .. the new spec I've to create is to define the api changes of domain-roles, right?13:54
henrynashsamulems: oh, right…sorry I forgot you were going to do that!  I just started writing it in response to Guang’s comment on my sepc!13:55
henrynashsamuelms: but I only just got started!13:55
samuelmshenrynash, can I still do that?13:55
henrynashsamuelms: so happy for you to run with it13:55
samuelmshenrynash, cool .. should that be a new spec or a change on the api?13:56
henrynashsamuelms: so you (i think) propose an api spec to keystone-specs/api/v313:56
*** dims has quit IRC13:58
henrynashsamuelms: actually, now extensions are dead, maybe you just proposes a chaneg to; keystone-specs/api/v3/identity-api-v3.rst13:58
*** dims has joined #openstack-keystone13:58
samuelmshenrynash, was about to ask that :p13:59
samuelmshenrynash, going to submit the first version in few hours13:59
henrynashsamuelms: ok :-)14:00
samuelmshenrynash, just to recap : i) domain-role will have its own CRUD ii) the grant api will be extended to accept domain-roles14:00
henrynashsamulems: so we need it own crud to great them and add roles (and other domain-roles) to them14:01
henrynashhower to questions to ponder:14:01
henrynash1) Do we need new grant apis….or can you just use a domain-role-id where you can use a role-id and we’ll figure it out?14:02
samuelmshenrynash, ++ for the 2nd :p14:02
henrynash2) Do you ahve a new CRUD to create/delete domain-roles or do you augment the current one for roels, e.g. add a domain_id to teh role create json structure14:03
henrynashsamuelms: my only reservation is that I think we are going to want different permissions on who can create gobal role and a domain role…so having them as searpate APIs might be better...14:04
samuelmshenrynash, ++14:05
samuelmshenrynash, and when/if we rename roles -> capabilities and domain-roles -> roles we'll have real rbac :p14:06
samuelmshenrynash, as we've discussed some days ago14:06
henrynashsamulems: indeed14:06
samuelmshenrynash, :-)14:06
*** bdossant has quit IRC14:06
*** bdossant has joined #openstack-keystone14:06
samuelmshenrynash, so we've agreed i) new create/delete api ii) extend grant api to support domain-role-id14:06
samuelmshenrynash, when creating a domain-role, how do you expect to receive the contained roles/domain-roles?14:07
henrynashsamuelms: so my concern on jsut acceptin domain-roles=-ids in the exitsing grant IDs…is that kind of maeans that for efficiency, we’ll want to store domain-roles nad roles in the same table14:07
openstackgerritIlya Pekelny proposed openstack/keystone: Migrate_repo init version helper  https://review.openstack.org/13764014:09
openstackgerritIlya Pekelny proposed openstack/keystone: Share engine between migration helpers.  https://review.openstack.org/13777814:09
openstackgerritIlya Pekelny proposed openstack/keystone: Add primary key to the endpoint_group id column.  https://review.openstack.org/13763814:09
openstackgerritIlya Pekelny proposed openstack/keystone: Add index to the revocation_event.revoked_at.  https://review.openstack.org/13763914:09
openstackgerritIlya Pekelny proposed openstack/keystone: Explicit MySQL engine designation.  https://review.openstack.org/13871214:09
openstackgerritIlya Pekelny proposed openstack/keystone: Comparision of database models and migrations.  https://review.openstack.org/8063014:09
openstackgerritIlya Pekelny proposed openstack/keystone: Fix index name the assignment.actor_id table.  https://review.openstack.org/13763714:09
henrynashsamuelms: and I guess I get a bit twichy there….since I saw the roles table very seperate from the domain specifc roles (i.e. roles table might disappear and get_roles might end coming from the service entry or something crazy)14:09
openstackgerritIlya Pekelny proposed openstack/keystone: Use metadata.create_all() to fill a test database  https://review.openstack.org/9355814:10
henrynashsamulems: on domain-role members, I kind of expected add/remove role….. a bit liek group membership…but open to ideas14:10
samuelmshenrynash, I also see domain-roles and role tables separated .. but don't seee a big problem on accepting both when granting a permission ..14:12
samuelmshenrynash, the only impact would be when listing/getting role assignments where we have to put  a flag (I think) to say when domain-roles should be expanded to global ones14:13
henrynashsamuelms: so whcih tabel do you look in?14:13
*** jistr|trng has quit IRC14:13
samuelmshenrynash, that would be used when generating tokens .. but the user can ask for role assingments with domain-roles14:14
henrynashsamuelms: yes, agreed - we need somthing liek that….one might argue that “effective” woudl mean expand everything…teh question is whether we need more fine grained control than that14:15
samuelmshenrynash, yes .. that's an issue .. if the id had a kind of namespace .. we had solved that14:15
*** richm has joined #openstack-keystone14:16
samuelmshenrynash, did you get what I just said?14:17
*** aix has joined #openstack-keystone14:18
samuelmshenrynash, suppose a domain-role named  'hn.vm-manager' .. if we had its id as something like 'hn.<whatever>' .. we could know when we have a domain-role or global role .. even when working with ids14:18
*** Maike has joined #openstack-keystone14:18
samuelmshenrynash, this would resolve the problem of so which tabel we look in14:20
*** tellesnobrega_ has quit IRC14:21
*** jistr has joined #openstack-keystone14:22
*** lhcheng has joined #openstack-keystone14:22
*** jistr is now known as jistr|trng14:22
*** tellesnobrega_ has joined #openstack-keystone14:24
henrynashsamuelms: sorry, was called afk14:25
*** ayoung-dentist has quit IRC14:26
henrynashsamuelms: hmm. not too much of a fan of an id as a composite…I14:27
*** mzbik has quit IRC14:28
samuelmshenrynash, other than that we have to ask on both tables if that role/domain-roles belongs to them14:28
henrynashsamulems: which is pretty yuk14:28
samuelmshenrynash, yep14:28
henrynashsamuelms: or we haev one table, or we distinguish it in the url   (i.e. use /domain-role/ rather than /role/)14:29
samuelmsdolphm, just abandoned that change . I'm rebasing the work on the split of assignment backend ..14:31
samuelmsdolphm, I'm talking about 'list role assignments performance'14:32
*** bknudson has joined #openstack-keystone14:32
*** ChanServ sets mode: +v bknudson14:32
dolphmsamuelms: ack14:32
samuelmshenrynash, yes14:33
*** k4n0 has quit IRC14:33
samuelmshenrynash, or distinghish by the namespace .. (workaround)14:34
henrynashsamuelms: yes14:34
samuelmshenrynash, I think different url's brake the ux14:34
samuelmshenrynash, since both stand for the same reason14:34
henrynashsamuelms: this is one of those “go mull on it a bit” problems14:35
samuelmshenrynash, yes, I'll write that as a single url .. and we get comments on that and start discussing14:37
samuelmshenrynash, works for you?14:37
*** tellesnobrega_ has quit IRC14:38
*** Maike has quit IRC14:38
henrynashsamuelms: i’m still troubled by how that would work….so personally, I need to think some more before saying what I feel is best14:39
samuelmshenrynash, so what should I put on the spec.. for now?14:41
*** joesavak has joined #openstack-keystone14:41
*** nkinder has quit IRC14:45
henrynashsamuelms: so I was planning to write it up as seaprate urls, and then examiine it to see how I felt about it….that’s how I (personally) develop my thoughts….but I can’t necessarily say that’s the best way for you to do it14:45
*** gordc has joined #openstack-keystone14:48
openstackgerritBrant Knudson proposed openstack/keystone: Remove test PYTHONHASHSEED setting  https://review.openstack.org/13659314:48
openstackgerritBrant Knudson proposed openstack/keystone: Correct a v3 auth test for result ordering  https://review.openstack.org/13892214:48
openstackgerritBrant Knudson proposed openstack/keystone: Correct version tests for result ordering  https://review.openstack.org/13892314:48
*** ishant|2 has joined #openstack-keystone14:50
*** ishant has quit IRC14:53
openstackgerritDolph Mathews proposed openstack/keystone: refactor: use _get_project_endpoint_group_url() where applicable  https://review.openstack.org/13908014:59
*** stevemar has joined #openstack-keystone15:00
*** ChanServ sets mode: +v stevemar15:00
*** bdossant has quit IRC15:00
dolphmlbragstad: follow up requested on https://review.openstack.org/#/c/126029/ !15:00
*** kobtea has joined #openstack-keystone15:00
*** luisjariz has joined #openstack-keystone15:01
*** bdossant has joined #openstack-keystone15:02
lbragstaddolphm: cool, that looks good to me. I'm happy with that being a follow on patch15:03
dolphmlbragstad: my supertab stopped working i blame you15:04
lbragstadlol15:04
* lbragstad has the amazing ability to break things by looking at them 15:04
openstackgerritMerged openstack/keystonemiddleware: Make everything in audit middleware private  https://review.openstack.org/13890715:04
samuelmshenrynash, ++ .. will go thorugh that road :-)15:05
dolphmlbragstad: which leads me to https://github.com/gmarik/Vundle.vim15:05
*** Ctina has joined #openstack-keystone15:05
*** samuelms is now known as samuelms-away15:05
lbragstaddolphm: you're using that instead of pathogen?15:06
*** _cjones_ has joined #openstack-keystone15:06
dolphmlbragstad: considering it15:06
lbragstaddolphm: you'll have to let me know how it goes15:06
dolphmlbragstad: i figured since my vim is broken i should start over, right?15:06
lbragstadhah, yes15:06
dolphmbknudson: whoa! https://review.openstack.org/#/c/136593/15:07
lbragstaddolphm: you could try reverse engineering nonameentername's dotfiles if you're ambitious15:07
dolphmare we actually there already?15:07
bknudsondolphm: yea, there were a few tests that didn't work15:08
openstackgerritMerged openstack/python-keystoneclient: Fix importing config module and classmethod params  https://review.openstack.org/13386615:09
dolphmlbragstad: actually, supertab is working for me in gvim, but not in vim15:09
dolphmbknudson: long sequence of patches though, but awesome!15:09
lbragstaddolphm: strange!15:10
bknudsondolphm: I didn't know how long it would take to merge it and figured new broken tests would be added before the final one was merged.15:10
bknudsonso might as well get the individual fixes out of the way15:10
dolphmbknudson: =) i'll try and get through the sequence today15:11
*** r-daneel has joined #openstack-keystone15:18
stevemarhenrynash, one comment about https://review.openstack.org/#/c/139045/3/keystone/identity/backends/sql.py the exception says group_id but you pass in group_name15:19
stevemaractually, we do that for get_user_by_name, too, so that's not a big deal15:20
bknudsonit is a big deal because it's confusing15:21
*** ajayaa has quit IRC15:21
dolphmstevemar: i'd like to fix that *everywhere* :-/15:21
dolphmpretty sure we do that for almost every not-found-by-name15:21
*** henrynash has quit IRC15:21
stevemardolphm, probably, it's relatively harmless though15:22
bknudsonwhen you're an admin trying to figure out what went wrong and you're sent down the wrong path it's not harmless.15:23
dolphmstevemar: except devananda filed a UX bug recently with similar confusion15:23
*** topol has joined #openstack-keystone15:23
*** ChanServ sets mode: +v topol15:23
dolphmstevemar: the UX fix https://review.openstack.org/#/c/131255/15:24
stevemarokay okay, no need to twist my arm about it bknudson :)15:24
dolphmlbragstad: i wrote you 45 lines of tests for my UX improvement ^15:24
*** bdossant has quit IRC15:26
stevemardolphm, bknudson so i guess we just have to introduce a new exception and fix it in certain spots15:26
lbragstaddolphm: nice!15:26
bknudsonluckily there's no limit on the number of exceptions in python.15:27
dolphmstevemar: yeah, or maybe just a new optional kwarg on the existing exceptions to say "hey this is a name, it needs a different message"? i haven't looked at what would be easier15:28
stevemardolphm, maybe, just keep in mind that with an ldap the ids can be names too15:29
*** bdossant has joined #openstack-keystone15:30
*** luisjariz has quit IRC15:32
openstackgerritMarek Denis proposed openstack/keystone-specs: Mapping enhancements - direct groups mapping.  https://review.openstack.org/13803515:33
*** pc-m has quit IRC15:33
*** lhcheng has quit IRC15:34
dhellmanndolphm: I'm looking into https://bugs.launchpad.net/oslo.config/+bug/1398979 do you have a second to discuss it?15:42
bknudsondolphm: found another one... I wonder what the HASHSEED was? http://logs.openstack.org/93/136593/3/check/gate-keystone-python27/6b7f495/console.html#_2014-12-04_15_09_58_05915:42
uvirtbotLaunchpad bug 1398979 in oslo.config "oslo-config-generator omits entire sections" [Undecided,Incomplete]15:42
dolphmbknudson: that's15:42
bknudsonhere it is: PYTHONHASHSEED='123197142'15:42
dolphmbknudson: a good question. we should totally log it on init15:42
bknudsonI didn't try that one.15:42
bknudsonI only did 1 - 1015:42
dolphmbknudson: haha15:42
dolphmbknudson: get your act together, son15:43
bknudsonI'm going to need a faster computer15:43
dolphmbknudson: Dear Watson, please test all the hash seeds for me, thanks.15:44
dolphmbknudson: maybe compute the hashseed based on the day or week or something for other projects, so they're forced to fix at least one of these bugs on some ongoing basis15:45
*** aix has quit IRC15:49
marekdstevemar: thanks for (another) +2 on mapping enhancements spec!15:53
stevemarnp marekd ;)15:55
openstackgerritBrant Knudson proposed openstack/keystone: Remove test PYTHONHASHSEED setting  https://review.openstack.org/13659316:00
openstackgerritBrant Knudson proposed openstack/keystone: Correct test_get_v3_catalog test for result ordering  https://review.openstack.org/13892016:00
openstackgerritBrant Knudson proposed openstack/keystone: Correct catalog response checker for result ordering  https://review.openstack.org/13892116:00
openstackgerritBrant Knudson proposed openstack/keystone: Correct a v3 auth test for result ordering  https://review.openstack.org/13892216:00
openstackgerritBrant Knudson proposed openstack/keystone: Correct version tests for result ordering  https://review.openstack.org/13892316:00
*** darren-wang has joined #openstack-keystone16:00
*** aix has joined #openstack-keystone16:01
darren-wanghi, are Paste filters "user_crud_extension" and "crud_extension" still necessary in v3 API?16:01
*** pc-m has joined #openstack-keystone16:03
*** ishant|2 has quit IRC16:03
*** david-lyle_afk is now known as david-lyle16:05
*** Ctina has quit IRC16:05
openstackgerritIlya Pekelny proposed openstack/keystone: Comparision of database models and migrations.  https://review.openstack.org/8063016:05
openstackgerritIlya Pekelny proposed openstack/keystone: Use metadata.create_all() to fill a test database  https://review.openstack.org/9355816:06
*** tellesnobrega_ has joined #openstack-keystone16:07
*** Ctina has joined #openstack-keystone16:07
*** jorge_munoz has joined #openstack-keystone16:12
*** eglynn-regus has joined #openstack-keystone16:14
openstackgerritBrant Knudson proposed openstack/keystone: Remove test PYTHONHASHSEED setting  https://review.openstack.org/13659316:15
openstackgerritBrant Knudson proposed openstack/keystone: Correct XMLEquals matcher for ordering  https://review.openstack.org/13891816:15
openstackgerritBrant Knudson proposed openstack/keystone: Correct test_auth_unscoped_token_project for result ordering  https://review.openstack.org/13891916:15
openstackgerritBrant Knudson proposed openstack/keystone: Correct test_get_v3_catalog test for result ordering  https://review.openstack.org/13892016:15
openstackgerritBrant Knudson proposed openstack/keystone: Correct catalog response checker for result ordering  https://review.openstack.org/13892116:15
openstackgerritBrant Knudson proposed openstack/keystone: Correct a v3 auth test for result ordering  https://review.openstack.org/13892216:15
openstackgerritBrant Knudson proposed openstack/keystone: Correct version tests for result ordering  https://review.openstack.org/13892316:15
bknudsonunfortunately the issue with the 123197142 HASHSEED was in the first commit in the chain.16:16
*** Nakato_ has joined #openstack-keystone16:16
*** gus_ has joined #openstack-keystone16:16
bknudsonI thought sets would be sorted.16:17
*** eglynn-officeafk has quit IRC16:18
*** dolphm has quit IRC16:18
*** d34dh0r53 has quit IRC16:18
*** Nakato has quit IRC16:18
*** dtroyer has quit IRC16:18
*** adam_g has quit IRC16:18
*** gus has quit IRC16:18
*** mhu has quit IRC16:18
*** aix has quit IRC16:18
*** dtroyer has joined #openstack-keystone16:18
*** mhu has joined #openstack-keystone16:19
*** adam_g has joined #openstack-keystone16:19
*** aix has joined #openstack-keystone16:19
*** adam_g has quit IRC16:19
*** adam_g has joined #openstack-keystone16:19
*** d34dh0r53 has joined #openstack-keystone16:20
*** dguerri has joined #openstack-keystone16:20
*** dolphm has joined #openstack-keystone16:20
*** ChanServ sets mode: +o dolphm16:20
stevemardarren-wang, they shouldn't be required16:22
stevemarbut we keep them around for v2 calls16:22
*** arif-ali has quit IRC16:23
*** ajayaa has joined #openstack-keystone16:24
*** arif-ali has joined #openstack-keystone16:27
*** mikedillion has joined #openstack-keystone16:28
*** zzzeek has joined #openstack-keystone16:28
bknudsondarren-wang: they're not in the default v3 pipeline -- http://git.openstack.org/cgit/openstack/keystone/tree/etc/keystone-paste.ini#n9116:30
*** pc-m has quit IRC16:41
openstackgerritIlya Pekelny proposed openstack/keystone: Migrate_repo init version helper  https://review.openstack.org/13764016:43
openstackgerritIlya Pekelny proposed openstack/keystone: Share engine between migration helpers.  https://review.openstack.org/13777816:43
openstackgerritIlya Pekelny proposed openstack/keystone: Add primary key to the endpoint_group id column.  https://review.openstack.org/13763816:43
openstackgerritIlya Pekelny proposed openstack/keystone: Add index to the revocation_event.revoked_at.  https://review.openstack.org/13763916:43
openstackgerritIlya Pekelny proposed openstack/keystone: Comparision of database models and migrations.  https://review.openstack.org/8063016:43
openstackgerritIlya Pekelny proposed openstack/keystone: Fix index name the assignment.actor_id table.  https://review.openstack.org/13763716:43
openstackgerritIlya Pekelny proposed openstack/keystone: Use metadata.create_all() to fill a test database  https://review.openstack.org/9355816:43
*** pc-m has joined #openstack-keystone16:45
*** kobtea has quit IRC16:47
mfischcan someone explain what keystone needs rabbit for?16:47
mfischits in the config file but I dont have it setup16:47
openstackgerritMarek Denis proposed openstack/keystone: WebSSO implementation.  https://review.openstack.org/13911016:50
mfischmaybe its standard oslo messaging config thats unused?16:51
darren-wang+bknudson: thx +bknudson! they are not in the defualt pipeline, but we can manually add them into pipeline like "federation_extension". yet they are not related to v3, I will not do that.16:52
*** lhcheng has joined #openstack-keystone16:52
*** darren-wang has left #openstack-keystone16:54
*** pc-m has quit IRC16:55
*** andreaf has joined #openstack-keystone16:57
*** pc-m has joined #openstack-keystone16:58
*** kobtea has joined #openstack-keystone17:03
*** kobtea has quit IRC17:03
*** stevemar has quit IRC17:06
*** gyee_ has joined #openstack-keystone17:07
*** tellesnobrega_ has quit IRC17:11
*** saipandi has joined #openstack-keystone17:13
*** pc-m has quit IRC17:14
*** saipandi has quit IRC17:14
*** tellesnobrega_ has joined #openstack-keystone17:25
*** boris-42 has joined #openstack-keystone17:29
*** marcoemorais has joined #openstack-keystone17:33
*** samuelms-away is now known as samuelms17:33
samuelmsHaneef, just replied your patch on 'Add support for domain specific roles'17:33
samuelmsHaneef, I meant your comment17:33
samuelmsHaneef, just didn't understand why you -1 that if you just had a question :P17:34
samuelmsHaneef, and that doesn't mean that you disagree with something there17:34
*** aix has quit IRC17:35
*** chrisshattuck has joined #openstack-keystone17:36
*** mikedillion has quit IRC17:40
*** tellesnobrega_ has quit IRC17:44
*** dims_ has joined #openstack-keystone17:48
*** avozza has joined #openstack-keystone17:51
*** jistr|trng has quit IRC17:51
*** dims has quit IRC17:52
*** stevemar has joined #openstack-keystone17:54
*** ChanServ sets mode: +v stevemar17:54
gyee_samuelms, I think he mean -0.5 instead of -118:00
Haneefsamuelms:  I agree with the patchset, just need little bit clarification on  inherited aspects of domain roles. I will remove -118:07
Haneefsamuelms: Won't the domain roles leak if use  inheritance in HMT  Is that fine?18:09
*** Ctina has quit IRC18:09
*** harlowja_away is now known as harlowja_18:10
openstackgerritMerged openstack/keystone: Add an identity backend method to get group by name.  https://review.openstack.org/13904518:12
*** avozza is now known as zz_avozza18:15
gyee_Haneef, I think we may ended up defining the scope of inheritance18:15
*** shakamunyi has joined #openstack-keystone18:18
openstackgerritDavid Stanek proposed openstack/keystone: Support for running functional federation tests  https://review.openstack.org/13913718:18
*** markvoelker has joined #openstack-keystone18:21
*** mikedillion has joined #openstack-keystone18:33
*** saipandi has joined #openstack-keystone18:41
*** saipandi has quit IRC18:42
*** saipandi has joined #openstack-keystone18:43
openstackgerritMerged openstack/keystone: remove deprecated access log middleware  https://review.openstack.org/12570318:43
openstackgerritMerged openstack/keystone: Fixes endpoint_filter tests  https://review.openstack.org/12602918:44
*** saipandi has quit IRC18:45
*** gyee_ has quit IRC18:45
samuelmsHaneef, gyee ++18:47
samuelmsfor  HMT, we need to define the scope of inheritance, as gyee said ..18:48
*** openstackgerrit has quit IRC18:50
*** openstackgerrit has joined #openstack-keystone18:50
samuelmsHaneef, the answer is no .. if you use role inheritance . .that inheritance is only applied on that domain18:50
samuelmsHaneef, if the inherited role is on domain, apply that to all projects (and stop where a new domain starts, for the reseller use case)18:51
dolphmtopol: i love this quote: "run ... at scales ranging from individual developers' laptops to multiple hosts in the cloud" - http://t.co/4s67vuj7iL18:51
dolphm#ibm #multiplehosts18:51
samuelmsHaneef, if the inherited role is on a project, apply that to all subprojects18:51
quack_quack_hi, i'm trying to find documentation on the keystone extension for s318:53
*** stevemar2 has joined #openstack-keystone18:53
*** ChanServ sets mode: +v stevemar218:53
quack_quack_and, i can't find this anywhere18:53
quack_quack_that is, /v2.0/s3tokens18:54
*** stevemar has quit IRC18:54
topoldolphm, refresh the link:  its says  "Docker containers, have a dynamic lifecycle, and can scale to run in concert anywhere from the developer’s laptop to hundreds of hosts in the cloud."18:55
topoldolphm, you spreading FUD? Shame on you18:56
dolphmtopol: now you done it http://imgur.com/VJvqs8818:57
*** diegows has joined #openstack-keystone18:57
topoldolphm, you know I have magic powers. I just don't brag about them18:58
quack_quack_ok i think i found my answer.  s3tokens is just an extension of ec218:59
*** amakarov is now known as amakarov_away18:59
*** ajayaa has quit IRC18:59
dolphmtopol: you can't escape copy pasta http://www.zdnet.com/ibm-strikes-docker-deal-and-rolls-out-its-own-containers-beta-7000036377/19:00
*** nellysmitt has quit IRC19:00
*** stevemar3 has joined #openstack-keystone19:02
*** ChanServ sets mode: +v stevemar319:02
Haneefsamuelms:   domain_role inheritane on a project stops if the project is not part of domain. Is that correct?19:02
*** stevemar2 has quit IRC19:03
*** marcoemorais has quit IRC19:03
samuelmsHaneef, just answered your question on the patch19:03
*** marcoemorais has joined #openstack-keystone19:04
*** marcoemorais has quit IRC19:04
*** marcoemorais has joined #openstack-keystone19:05
samuelmsHaneef, domain_role (or global role) inheritance on a project applies to all that project's subtree19:05
Haneefsamulems: Thanks. I  have removed -119:05
samuelmsHaneef, does that answer your question? :-)19:05
samuelmsHaneef, cool .. just saw your +1, fell free to ask additional questions you have19:06
*** markvoelker has quit IRC19:06
*** tellesnobrega_ has joined #openstack-keystone19:06
*** amcrn has joined #openstack-keystone19:12
topoldolphm. wasnt copy pasta. Toby butchered it. I refer you to the IBM press release as being the trusted source.19:17
topoldolphm, I'll work some magic in the background :-)19:18
*** jaosorior has quit IRC19:23
*** ayoung has joined #openstack-keystone19:25
*** ChanServ sets mode: +v ayoung19:25
*** stevemar2 has joined #openstack-keystone19:30
*** ChanServ sets mode: +v stevemar219:30
*** stevemar3 has quit IRC19:33
*** amcrn has quit IRC19:34
*** marcoemorais has quit IRC19:37
*** marcoemorais has joined #openstack-keystone19:37
*** tellesnobrega_ has quit IRC19:38
openstackgerritNathan Kinder proposed openstack/keystone-specs: Mapping enhancements - direct groups mapping.  https://review.openstack.org/13803519:41
*** tellesnobrega_ has joined #openstack-keystone19:42
openstackgerritAndre Aranha proposed openstack/keystone-specs: Modify the policy file  https://review.openstack.org/13540819:44
*** marcoemorais has quit IRC19:44
*** marcoemorais has joined #openstack-keystone19:44
*** stevemar2 is now known as stevemar19:45
*** radez is now known as radez_g0n319:51
*** dolphm has quit IRC19:56
*** dolphm has joined #openstack-keystone20:00
*** openstackgerrit has quit IRC20:04
*** openstackgerrit has joined #openstack-keystone20:04
*** ChanServ sets mode: +o dolphm20:11
*** marcoemorais has quit IRC20:12
*** marcoemorais has joined #openstack-keystone20:13
*** marcoemorais has quit IRC20:13
*** lhcheng has quit IRC20:14
*** marcoemorais has joined #openstack-keystone20:14
openstackgerritLance Bragstad proposed openstack/keystone: Reuse call to _get_project_endpoint_group in tests  https://review.openstack.org/13917420:17
*** _cjones_ has quit IRC20:18
*** lhcheng has joined #openstack-keystone20:23
*** lhcheng has quit IRC20:28
*** shakamunyi has quit IRC20:30
openstackgerritLance Bragstad proposed openstack/keystone-specs: Authenticated Encryption Tokens  https://review.openstack.org/13005020:31
*** shakamunyi has joined #openstack-keystone20:32
openstackgerritAndre Aranha proposed openstack/keystone-specs: Modify the policy file  https://review.openstack.org/13540820:32
openstackgerritwerner mendizabal proposed openstack/keystone-specs: Multifactor Authentication  https://review.openstack.org/13037620:37
*** lhcheng has joined #openstack-keystone20:38
*** lhcheng has quit IRC20:40
*** lhcheng has joined #openstack-keystone20:40
*** dims_ has quit IRC21:05
*** dims has joined #openstack-keystone21:06
*** mikedillion has quit IRC21:08
*** _cjones_ has joined #openstack-keystone21:10
*** tellesnobrega_ has quit IRC21:14
*** lhcheng has quit IRC21:14
*** marcoemorais has quit IRC21:16
*** marcoemorais has joined #openstack-keystone21:16
*** lhcheng has joined #openstack-keystone21:24
openstackgerritRodrigo Duarte proposed openstack/keystone: Inherited role assignments to projects  https://review.openstack.org/13855221:25
openstackgerritRodrigo Duarte proposed openstack/keystone: Create, update and delete hierarchical projects  https://review.openstack.org/13855021:25
openstackgerritRodrigo Duarte proposed openstack/keystone: Adds correct checks in LDAP backend tests  https://review.openstack.org/13855121:25
rodrigodswe are almost there ^21:27
morganfainbergrodrigods, can almost taste it.21:28
openstackgerritLance Bragstad proposed openstack/keystone-specs: Authenticated Encryption Tokens  https://review.openstack.org/13005021:30
*** marcoemorais has quit IRC21:31
*** marcoemorais1 has joined #openstack-keystone21:32
*** marcoemorais1 has quit IRC21:32
*** marcoemorais1 has joined #openstack-keystone21:33
*** marcoemorais1 has quit IRC21:33
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/13479421:34
*** lhcheng_ has joined #openstack-keystone21:39
*** radez_g0n3 is now known as radez21:40
*** lhcheng has quit IRC21:41
ayoungbknudson, if I run tox -epep8 on keystoneclient  I get a slew of errors like: ./keystoneclient/tests/v2_0/utils.py:13:1: H302  import only modules.'from keystoneclient.tests import utils' does not import a module21:48
ayoungfrom keystoneclient.tests import utils21:48
ayoungdstanek, ^^ do you guys get that, too?21:48
morganfainbergayoung, latest master?21:48
ayoungmorganfainberg, yeah21:48
morganfainberghm.21:48
bknudsonI'll try it.21:49
ayoungmorganfainberg, I've not tried bloxing away the venv but I think I saw it last time before I blew it away, too21:49
stevemaranyone want to take bets on whether the new OSC release will break the gate?21:49
bknudsonIt's rebuilding venv now.21:50
morganfainbergayoung, https://review.openstack.org/#/c/138228/ didn't see it in gate - and that's pretty new21:50
morganfainbergayoung, review wise.21:50
ayoungmorganfainberg, yeah, I don't see it in gate21:50
ayoungjust local...wondering what is broken21:50
ayoungstevemar, not taking that bet21:50
morganfainbergcheck your tox.ini21:50
stevemarbknudson, you're ever the pessimist, i'll even give you favorable odds21:50
stevemarayoung, cammon!21:50
morganfainbergalso did something pickup oslo_concurrency issue?21:50
ayoungmorganfainberg, haven't touched tox.ini21:51
morganfainbergayoung, because we had H302 with that version of oslo.concurrency21:51
bknudsonstevemar: how are you going to tell if it's openstackclient or neutron?21:51
morganfainbergbknudson, easy, stevemar works on OSC, we can blame him and let him redirect to neutron as needed ;)21:51
stevemarbknudson, lol!21:52
ayoungmorganfainberg, what am Iooking for?21:52
stevemarhue hue21:52
bknudsonayoung: tox -e pep8 on keystoneclient worked for me... I'll try to wipe out .tox21:52
morganfainbergayoung, is the H302 line it's complaining about related to oslo.concurrency?21:52
* morganfainberg goes and checks21:52
bknudsonstill worked after rm -r .tox.21:52
morganfainbergor at least in your local env?21:52
morganfainbergalternatively, you have a python syntax error21:53
morganfainbergor circular imports21:53
bknudsonflake8==2.1.0 pep8==1.5.621:53
morganfainbergpep8 check fails like that in those cases21:53
ayounghmmm...that is possible21:53
morganfainbergbknudson, figured your env would work ;)21:53
*** marcoemorais has joined #openstack-keystone21:54
ayoungmorganfainberg, OK...figuring I straighten out the pep8, I'll resubmit the access_info patch.  I'm going to do this work in the client.  Revoke events will use it21:55
ayoungand then I'll try to hit policy21:55
morganfainbergsounds good21:55
* morganfainberg is still mired in internal stuff.21:55
ayoungI'm thinking that if policy and revoke events use it, and I can carry over the existing set of tests, we are in decent shape21:55
morganfainbergprobably going to be through tomorrow.21:55
morganfainberg:(21:55
* morganfainberg learns not to volunteer for reviewing things.21:56
ayoung'salrigh...you bumped the token provider rewrite to K2 anyway21:56
morganfainbergwell non-openstack things ;)21:56
ayoungOK...I wiped the venv and reran tox,  errors galore...I'll see if it is my code...21:56
*** htruta_ has joined #openstack-keystone21:56
ayoungahhhh. picked up the old venv...21:57
ayoungNow it is fine....strange...ok, sorry, false alarm21:57
ayoungmust have needed to wipe the venv to pick up the concurrency fix?21:57
ayoungmorganfainberg, I know what I was going to ask you:  for policy in client, should I use the oslo for now, or have we made any progress toward hosting our own repo for policy?21:58
morganfainbergayoung, uh, i think someone was working on a spec for that21:59
morganfainbergmarekd, pass till tomorrow on ECP wrap.21:59
ayoungone from team Brazil, I think21:59
morganfainbergmarekd, sorry --- i really do want to talk about it21:59
morganfainbergworst case, i'll carve out time on monday or tues21:59
*** marcoemorais has quit IRC22:04
*** marcoemorais1 has joined #openstack-keystone22:04
*** marcoemorais1 has quit IRC22:04
*** marcoemorais has joined #openstack-keystone22:05
*** zz_avozza is now known as avozza22:05
*** marcoemorais has quit IRC22:11
*** marcoemorais has joined #openstack-keystone22:11
*** marcoemorais has quit IRC22:11
*** marcoemorais has joined #openstack-keystone22:12
ayoungImportError: bad magic number in 'keystoneclient.openstack.common.timeutils': b'\x03\xf3\r\n'22:14
morganfainbergayoung, annnnd there ya go22:14
morganfainberg;)22:14
ayoungImportError: bad magic number in 'keystoneclient.openstack.common.jsonutils': b'\x03\xf3\r\n'22:14
ayoungBad Magic Everywhere22:14
ayoungPython 3 issue?22:15
morganfainbergayoung, or missing a utf-8 specifier?22:15
morganfainbergis this py3k or py2 throwing the error?22:15
ayoungpy33 runtests: commands[0] | python setup.py testr --testr-args=22:15
morganfainberghm22:15
ayoung27 ran fine22:16
morganfainbergwell you know b'' is different in py2 and 322:16
morganfainbergmy guess is that is something that can't be b'22:16
ayoung  File "./keystoneclient/tests/v3/test_revoke.py", line 16, in <module>22:16
ayoung    from keystoneclient.openstack.common import jsonutils22:16
*** tellesnobrega_ has joined #openstack-keystone22:16
morganfainbergoh22:17
morganfainberghmmm22:17
ayoungnot in kc yet?22:17
morganfainbergdid somehow you get a wonky file in jsonutils?22:17
morganfainbergor some weird change?22:17
morganfainbergand shouldn't that be oslo.serialization22:18
*** joesavak has quit IRC22:18
morganfainbergnot common.jsonutils?22:18
ayoungprolly22:18
*** bknudson has quit IRC22:18
ayoungmoved the code over from server, but did that change recently?22:18
morganfainbergyeah22:18
morganfainbergjsonutils doesn't exist22:19
morganfainbergin master keystoneclient22:19
morganfainbergit's oslo.serialization22:19
morganfainberghttps://github.com/openstack/python-keystoneclient/tree/master/keystoneclient/openstack/common22:19
*** gyee has quit IRC22:24
*** gyee has joined #openstack-keystone22:27
*** ChanServ sets mode: +v gyee22:27
ayoungand timeutils moved, too22:32
*** packet has joined #openstack-keystone22:34
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/13923022:37
openstackgerritOpenStack Proposal Bot proposed openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/13923122:37
*** radez is now known as radez_g0n322:37
openstackgerritOpenStack Proposal Bot proposed openstack/pycadf: Updated from global requirements  https://review.openstack.org/13923622:42
*** topol has quit IRC22:42
openstackgerritayoung proposed openstack/python-keystoneclient: Revocation event API  https://review.openstack.org/8116622:42
openstackgerritayoung proposed openstack/python-keystoneclient: Access Info  https://review.openstack.org/13851922:42
*** dims_ has joined #openstack-keystone22:53
*** gordc has quit IRC22:54
*** dims has quit IRC22:55
*** stevemar has quit IRC23:01
*** oomichi has joined #openstack-keystone23:07
*** toddnni has quit IRC23:16
*** toddnni has joined #openstack-keystone23:18
*** jamielennox|away is now known as jamielennox23:18
*** shakamunyi has quit IRC23:19
*** shakamunyi has joined #openstack-keystone23:20
jamielennoxayoung: https://review.openstack.org/#/c/138228/23:23
*** chrisshattuck has quit IRC23:32
openstackgerritRodrigo Duarte proposed openstack/keystone-specs: Fixes HEAD return code for OS-INHERIT extension  https://review.openstack.org/13778223:36
openstackgerritRodrigo Duarte proposed openstack/keystone-specs: API doc for Inherited Role Assignments to Projects  https://review.openstack.org/13027723:40
*** kobtea has joined #openstack-keystone23:41
*** _cjones_ has quit IRC23:43
*** kobtea has quit IRC23:45
*** _cjones_ has joined #openstack-keystone23:49
openstackgerritMerged openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/13923123:52

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!