Friday, 2014-12-12

*** henrynash has quit IRC00:07
*** henrynash has joined #openstack-keystone00:08
*** ChanServ sets mode: +v henrynash00:08
*** henrynash has quit IRC00:09
*** _cjones_ has quit IRC00:12
*** dims__ has quit IRC00:15
*** dims__ has joined #openstack-keystone00:15
*** dims__ has quit IRC00:18
*** dims__ has joined #openstack-keystone00:18
*** david-lyle is now known as david-lyle_afk00:23
*** nellysmitt has joined #openstack-keystone00:25
*** nellysmitt has quit IRC00:30
openstackgerritJorge Munoz proposed openstack/keystone-specs: Read/Write LDAP drivers  https://review.openstack.org/14017500:35
*** nkinder_away has quit IRC00:40
*** marcoemorais1 has quit IRC00:41
*** dims__ has quit IRC00:45
*** dims__ has joined #openstack-keystone00:46
*** dims__ has quit IRC00:50
bknudsoncan we deprecate writing to LDAP?00:59
bknudsonDocument what the entries are that keystone server is looking for and then remove support next release.00:59
bknudsonsomebody using ldap can write their own tools.00:59
*** _cjones_ has joined #openstack-keystone01:13
*** afaranha_ has joined #openstack-keystone01:18
*** afaranha_ has quit IRC01:20
*** gyee has joined #openstack-keystone01:21
*** ChanServ sets mode: +v gyee01:21
jamielennoxis it reasonable for the headers from an auth plugin to clobber those provided with a request? or should the auth_plugin headers be added with a .setdefault()01:22
jamielennoxI can't think of many reasons why anyone would send headers={'X-Auth-Token': 'some_value'} with a request - but if they do i assume it's a good one01:23
openstackgerritBrant Knudson proposed openstack/keystone: Add a test for modifying a role to set the name the same  https://review.openstack.org/14123401:23
openstackgerritBrant Knudson proposed openstack/keystone: Fix modifying a role with same name using LDAP  https://review.openstack.org/14123501:23
*** dims__ has joined #openstack-keystone01:27
*** _cjones_ has quit IRC01:29
*** _cjones_ has joined #openstack-keystone01:29
*** diegows has quit IRC01:34
*** sudorandom has quit IRC01:35
*** sudorandom has joined #openstack-keystone01:37
openstackgerritBrant Knudson proposed openstack/keystone: Fix disabling entities when enabled is ignored  https://review.openstack.org/14110101:38
openstackgerritBrant Knudson proposed openstack/keystone: Add a test for modifying a role to set the name the same  https://review.openstack.org/14123401:38
openstackgerritBrant Knudson proposed openstack/keystone: Fix modifying a role with same name using LDAP  https://review.openstack.org/14123501:38
*** shakamunyi has joined #openstack-keystone01:38
openstackgerritguang-yee proposed openstack/keystone-specs: X.509 SSL certificate authentication  https://review.openstack.org/10591301:40
*** sudorandom has quit IRC01:44
*** sudorandom has joined #openstack-keystone01:46
*** wanghong has quit IRC01:46
*** gyee has quit IRC01:47
*** _cjones_ has quit IRC02:00
*** boris-42 has quit IRC02:03
openstackgerritBrant Knudson proposed openstack/keystonemiddleware: Refactor extract class for signing directory  https://review.openstack.org/12228102:04
openstackgerritBrant Knudson proposed openstack/keystonemiddleware: Refactor auth_token revocation list members to new class  https://review.openstack.org/10240302:04
openstackgerritBrant Knudson proposed openstack/keystonemiddleware: Refactor identity version handling to strategy pattern  https://review.openstack.org/14076502:04
bknudsonjamielennox: with https://review.openstack.org/140765 , it changes where the failure to load plugin occurs...02:05
bknudsonsince the IdentityServer object is created on AuthProcotol() it fails on startup02:05
bknudsonrather than on the first request02:05
*** zzzeek has quit IRC02:08
jamielennoxbknudson: so it gives 401 rather than 50402:10
jamielennox?02:10
openstackgerritMerged openstack/keystonemiddleware: Use new ksc features in User Token Plugin  https://review.openstack.org/13104802:11
bknudsonjamielennox: I think that change is because auth token eats the exception and turns it into a 401 whenever something goes wrong.02:11
*** chrisshattuck has quit IRC02:11
bknudsonduring token validation02:11
*** erkules_ has joined #openstack-keystone02:12
jamielennoxid love to better target that except exception02:13
*** wanghong has joined #openstack-keystone02:13
*** erkules has quit IRC02:14
jamielennoxbknudson: thinking about that i'm willing to bet one of those patches that went in in this version must have moved that as well02:15
bknudsonthere should be a place to catch ServiceError.02:15
jamielennoxi tend to think where it is now, raising a 503 rahter than a 401 is better02:15
jamielennoxso where the except Exception is you could just ad d an except ServiceError: raise02:16
jamielennoxbut that except Exception is a pain, every time i need to do any real debugging i have to comment that out02:16
bknudsonI agree 503 is better than 401 if can't get the version.02:16
jamielennoxalso it means you ahve to be really careful with negative testing because a KeyError or AttributeError coming from a test will get a 401 where it shouldn't02:17
openstackgerritwanghong proposed openstack/keystonemiddleware: support micro version if sent  https://review.openstack.org/13091602:18
bknudsonjamielennox: it was an easy fix.02:19
openstackgerritBrant Knudson proposed openstack/keystonemiddleware: Refactor auth_token revocation list members to new class  https://review.openstack.org/10240302:20
openstackgerritBrant Knudson proposed openstack/keystonemiddleware: Refactor identity version handling to strategy pattern  https://review.openstack.org/14076502:20
bknudsonjust added `except ServiceError:` before except Exception.02:21
*** chrisshattuck has joined #openstack-keystone02:25
*** nellysmitt has joined #openstack-keystone02:26
*** nellysmitt has quit IRC02:31
openstackgerritwerner mendizabal proposed openstack/keystone-specs: Multifactor Authentication  https://review.openstack.org/13037602:40
openstackgerritwerner mendizabal proposed openstack/keystone-specs: Multifactor Authentication  https://review.openstack.org/13037602:43
*** oomichi has joined #openstack-keystone02:46
*** erkules_ has quit IRC02:49
*** dims__ has quit IRC02:49
*** dims__ has joined #openstack-keystone02:50
*** erkules_ has joined #openstack-keystone02:50
*** KanagarajM has joined #openstack-keystone02:52
*** dims__ has quit IRC02:54
*** shakamunyi has quit IRC02:57
*** tylerdurden has joined #openstack-keystone02:57
jamielennoxmorganfainberg: did non-persistent tokens get in for Juno?03:15
jamielennoxor bknudson ^03:15
jamielennoxi don't think so but it's in the juno specs repo03:15
*** lhcheng has quit IRC03:18
*** lhcheng has joined #openstack-keystone03:18
*** chrisshattuck has quit IRC03:19
*** lhcheng has quit IRC03:20
*** lhcheng has joined #openstack-keystone03:20
*** lhcheng has quit IRC03:28
*** richm has joined #openstack-keystone03:30
*** harlowja is now known as harlowja_away03:36
*** nkinder_away has joined #openstack-keystone03:38
*** rushiagr_away is now known as rushiagr03:42
dstanekjamielennox: i don't think that was completed03:52
*** wanghong has quit IRC03:52
morganfainbergIt wasn't completed.03:52
*** rushiagr is now known as rushiagr_away03:52
morganfainbergThere is a kilo spec (k2) target for it.03:52
morganfainbergKilo spec has not yet been approved has some fixed I need to do03:53
*** lhcheng has joined #openstack-keystone04:00
*** chrisshattuck has joined #openstack-keystone04:01
*** wanghong has joined #openstack-keystone04:05
*** oomichi has quit IRC04:12
*** r-daneel has quit IRC04:19
*** nellysmitt has joined #openstack-keystone04:27
*** stevemar has joined #openstack-keystone04:30
*** ChanServ sets mode: +v stevemar04:30
*** lbragstad has quit IRC04:32
*** nellysmitt has quit IRC04:32
*** cyeoh has quit IRC04:33
*** lbragstad has joined #openstack-keystone04:33
*** zzzeek has joined #openstack-keystone04:33
*** zzzeek has quit IRC04:33
*** cyeoh has joined #openstack-keystone04:34
openstackgerritMerged openstack/identity-api: Indicate repo is frozen in README  https://review.openstack.org/14120804:39
*** rushiagr_away is now known as rushiagr04:41
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Add get_headers interface to authentication plugins  https://review.openstack.org/14089404:44
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Add get_communication_params interface to plugins  https://review.openstack.org/14126704:44
*** chrisshattuck has quit IRC05:10
*** marcoemorais has joined #openstack-keystone05:15
*** marcoemorais1 has joined #openstack-keystone05:16
*** marcoemorais has quit IRC05:19
*** _cjones_ has joined #openstack-keystone05:23
*** richm has quit IRC05:38
*** stevemar has quit IRC05:43
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/13624306:05
*** KanagarajM2 has joined #openstack-keystone06:10
*** KanagarajM has quit IRC06:11
*** KanagarajM2 has quit IRC06:13
*** wanghong has quit IRC06:14
*** nellysmitt has joined #openstack-keystone06:28
*** wanghong has joined #openstack-keystone06:31
*** nellysmitt has quit IRC06:33
*** lhcheng has quit IRC06:34
*** lhcheng has joined #openstack-keystone06:34
*** erkules_ is now known as erkules06:38
*** jamielennox is now known as jamielennox|away06:39
*** wanghong has quit IRC06:52
*** ncoghlan has joined #openstack-keystone06:58
*** oomichi has joined #openstack-keystone07:11
*** oomichi has quit IRC07:21
*** ncoghlan has quit IRC07:31
*** ajayaa has joined #openstack-keystone07:33
*** ajayaa has quit IRC07:43
*** nellysmitt has joined #openstack-keystone07:58
*** drjones has joined #openstack-keystone08:04
*** _cjones_ has quit IRC08:08
*** drjones has quit IRC08:09
*** ajayaa has joined #openstack-keystone08:10
*** zz_avozza is now known as avozza08:13
*** tellesnobrega has quit IRC08:14
*** jimbaker has quit IRC08:14
*** davechen has quit IRC08:14
*** bdossant has joined #openstack-keystone08:15
*** DaveChen has joined #openstack-keystone08:15
*** avozza is now known as zz_avozza08:15
*** bdossant has quit IRC08:17
*** jimbaker has joined #openstack-keystone08:17
*** jimbaker has quit IRC08:17
*** jimbaker has joined #openstack-keystone08:17
*** tellesnobrega has joined #openstack-keystone08:21
*** marcoemorais1 has quit IRC08:28
*** andreaf has joined #openstack-keystone08:41
*** Dafna has quit IRC08:48
*** bdossant_ has joined #openstack-keystone09:03
*** jacer_huawei has joined #openstack-keystone09:07
*** raildo_ has joined #openstack-keystone09:14
*** ajayaa has quit IRC09:16
*** eglynn-regus has quit IRC09:16
*** lhcheng has quit IRC09:17
*** lhcheng has joined #openstack-keystone09:18
*** jistr has joined #openstack-keystone09:19
*** eglynn-regus has joined #openstack-keystone09:22
*** lhcheng has quit IRC09:22
*** raildo_ has quit IRC09:32
openstackgerrithenry-nash proposed openstack/keystone: Fix the way migration helpers check FK names.  https://review.openstack.org/13846809:34
*** eglynn-regus has quit IRC09:34
*** eglynn has joined #openstack-keystone09:34
*** bdossant_ has quit IRC09:36
*** ajayaa has joined #openstack-keystone09:41
*** DWang has quit IRC09:57
*** bdossant_ has joined #openstack-keystone10:02
*** bdossant_ has quit IRC10:04
*** Shohei_ has quit IRC10:05
*** Shohei has joined #openstack-keystone10:05
*** bdossant has joined #openstack-keystone10:08
*** sluo_laptop has quit IRC10:09
*** Shohei has quit IRC10:10
*** bdossant_ has joined #openstack-keystone10:15
*** nellysmitt has left #openstack-keystone10:16
*** bdossant has quit IRC10:19
*** yasu_ has joined #openstack-keystone10:27
*** bdossant_ has quit IRC10:30
*** yasu_ has quit IRC10:31
*** samuelms_ has joined #openstack-keystone10:32
*** yasu_ has joined #openstack-keystone10:34
*** aix has joined #openstack-keystone10:37
*** bdossant has joined #openstack-keystone10:44
*** yasu_ has quit IRC10:48
*** dims__ has joined #openstack-keystone10:56
*** tellesnobrega_ has quit IRC10:57
*** dims__ has quit IRC11:00
*** topol has joined #openstack-keystone11:03
*** ChanServ sets mode: +v topol11:03
*** diegows has joined #openstack-keystone11:10
*** bdossant has quit IRC11:14
*** topol has quit IRC11:17
*** jasondotstar has joined #openstack-keystone11:31
*** dims__ has joined #openstack-keystone11:45
*** marekd|away is now known as marekd11:48
*** dims__ has quit IRC11:49
*** dims__ has joined #openstack-keystone11:49
*** dims__ has quit IRC11:54
*** boris-42 has joined #openstack-keystone11:55
*** aix has quit IRC11:55
*** dims__ has joined #openstack-keystone11:56
*** bdossant has joined #openstack-keystone12:04
*** bdossant has quit IRC12:14
*** bdossant has joined #openstack-keystone12:29
openstackgerritAlexander Makarov proposed openstack/keystone: Assignment sql backend create_grant refactoring  https://review.openstack.org/14135212:44
*** dims__ has quit IRC12:48
*** jasondotstar has quit IRC12:48
*** dims__ has joined #openstack-keystone12:48
*** dims__ has quit IRC12:52
*** henrynash has joined #openstack-keystone12:53
*** ChanServ sets mode: +v henrynash12:53
*** aix has joined #openstack-keystone12:59
*** ajayaa has quit IRC13:00
*** dims__ has joined #openstack-keystone13:01
*** bdossant has quit IRC13:05
openstackgerritAlexander Makarov proposed openstack/keystone: Assignment sql backend create_grant refactoring  https://review.openstack.org/14135213:06
*** afaranha has quit IRC13:07
*** amakarov_away is now known as amakarov13:14
*** bdossant has joined #openstack-keystone13:16
*** bdossant has quit IRC13:21
*** dims__ has quit IRC13:26
*** dims__ has joined #openstack-keystone13:27
*** bdossant has joined #openstack-keystone13:27
*** bdossant has quit IRC13:31
*** dims__ has quit IRC13:31
*** bdossant has joined #openstack-keystone13:32
*** henrynash has quit IRC13:36
*** jasondotstar has joined #openstack-keystone13:37
samuelms_amakarov, hi,  just left a couple of comments on you patch regarding create_grant refactoring13:41
*** Adam_ has joined #openstack-keystone13:43
*** Adam_ is now known as ayoung_13:44
*** ayoung has joined #openstack-keystone13:49
*** ChanServ sets mode: +v ayoung13:49
*** ayoung has quit IRC13:49
*** bjornar has quit IRC13:57
*** zz_avozza is now known as avozza13:57
*** ayoung_ has quit IRC13:59
*** dims__ has joined #openstack-keystone14:02
openstackgerritLance Bragstad proposed openstack/keystone-specs: Authenticated Encryption Tokens  https://review.openstack.org/13005014:12
marekdgabriel-bezerra: did you manage to setup mod_Shib + pysaml2 ?14:14
marekddstanek: same question for you14:14
*** k4n0 has quit IRC14:17
*** ayoung_ has joined #openstack-keystone14:20
*** jasondotstar has quit IRC14:23
marekdDec 18 is K-1 i think. Is it the latest day  for the specs to be accepted so the implementation is later in Kilo release?14:23
openstackgerritVictor Silva proposed openstack/keystone: Fixes indentation in contrib/federation/utils.py  https://review.openstack.org/14138314:24
*** timcline has joined #openstack-keystone14:25
openstackgerritBrant Knudson proposed openstack/keystone: Cleanup eventlet use in tests  https://review.openstack.org/14083514:27
*** timcline has quit IRC14:29
gabriel-bezerramarekd: I could set it up, but it is not working well14:30
marekdgabriel-bezerra: same here14:30
marekdwell, validation also doesn't work here.14:30
marekdgabriel-bezerra: i am going to compare assertion issued by a pysaml2 and other idps that worked for me.14:30
gabriel-bezerramarekd: it claims about "Unable to establish security of incoming assertion"14:30
marekdyes14:30
marekdgabriel-bezerra: if i don't find anything i will ask the autor or other users.14:31
gabriel-bezerramarekd: I put an assertion of mine in here: http://www.lsd.ufcg.edu.br/~gabrielb/assertion.xml14:31
*** ayoung_ has quit IRC14:36
*** nkinder_away has quit IRC14:49
*** ayoung has joined #openstack-keystone14:50
*** ChanServ sets mode: +v ayoung14:50
*** samuelms_ has quit IRC14:52
*** rushiagr is now known as rushiagr_away14:57
*** r-daneel has joined #openstack-keystone15:00
*** richm has joined #openstack-keystone15:06
openstackgerritBrant Knudson proposed openstack/keystone: Fix disabling entities when enabled is ignored  https://review.openstack.org/14110115:08
openstackgerritBrant Knudson proposed openstack/keystone: Add a test for modifying a role to set the name the same  https://review.openstack.org/14123415:08
openstackgerritBrant Knudson proposed openstack/keystone: Add tests for enabled attribute ignored  https://review.openstack.org/14089515:08
openstackgerritBrant Knudson proposed openstack/keystone: Fix modifying a role with same name using LDAP  https://review.openstack.org/14123515:08
openstackgerritAlexander Makarov proposed openstack/keystone: Role revocation invalidates too many tokens  https://review.openstack.org/14139715:09
openstackgerritAlexander Makarov proposed openstack/keystone: Role revocation invalidates too many tokens  https://review.openstack.org/14139715:10
*** topol has joined #openstack-keystone15:13
*** ChanServ sets mode: +v topol15:13
amakarovHi all! I think we have a problem with our revoke extension: when I revoke role assingment to one project, created revocation event matches all my tokens to other projects too - is it normal?15:17
*** timcline has joined #openstack-keystone15:19
*** timcline has quit IRC15:22
*** timcline has joined #openstack-keystone15:23
*** andreaf has quit IRC15:27
*** andreaf has joined #openstack-keystone15:28
*** avozza is now known as zz_avozza15:32
*** nkinder_away has joined #openstack-keystone15:33
*** tellesnobrega_ has joined #openstack-keystone15:34
*** timcline has quit IRC15:41
*** timcline has joined #openstack-keystone15:41
*** tellesnobrega_ has quit IRC15:47
*** gordc has joined #openstack-keystone15:57
*** mflobo has quit IRC15:59
*** marcoemorais has joined #openstack-keystone16:01
*** marcoemorais1 has joined #openstack-keystone16:02
dstanekmarekd: gabriel-bezerra: yes i think i had it working last night16:04
dstanekgabriel-bezerra: your issue is probably the certs16:04
*** marcoemorais has quit IRC16:05
*** tylerdurden has quit IRC16:06
*** tellesnobrega_ has joined #openstack-keystone16:07
*** bdossant has quit IRC16:08
*** richm has quit IRC16:11
openstackgerritAlexander Makarov proposed openstack/keystone: Role revocation invalidates too many tokens  https://review.openstack.org/14139716:12
*** wwriverrat has joined #openstack-keystone16:15
gabriel-bezerradstanek: did you have the same problem? how did you fix it?16:17
wwriverratNeed some quick advice I’m not finding via Google:  Is it a good or bad idea to use keystone’s “extras” project metadata for our own purposes?  (for instance “env”: “prod”). Support teams want a way to know which projects are dev/test/prod.16:20
*** chrisshattuck has joined #openstack-keystone16:23
*** thedodd has joined #openstack-keystone16:23
*** bdossant has joined #openstack-keystone16:28
*** chrisshattuck has quit IRC16:32
*** zz_avozza is now known as avozza16:32
*** marcoemorais1 has quit IRC16:32
*** boris-42 has quit IRC16:32
*** dims__ has quit IRC16:33
*** dims__ has joined #openstack-keystone16:34
openstackgerritAlexander Makarov proposed openstack/keystone: Assignment sql backend create_grant refactoring  https://review.openstack.org/14135216:37
*** dims__ has quit IRC16:38
*** dims__ has joined #openstack-keystone16:44
*** david-lyle_afk is now known as david-lyle16:49
*** jaosorior has joined #openstack-keystone16:53
lbragstadwwriverrat: there is a lot of talk about making the 'extras' stuff go away16:53
lbragstadwwriverrat: so we don't encourage it16:53
wwriverratdoh! OK. Guess I liked the idea of being able to attach deployment-specific info. Thanks for the heads up16:54
lbragstadwwriverrat: no problem16:55
*** marcoemorais has joined #openstack-keystone17:02
wwriverratlbragstad, discussed with co-workers.  We’re hoping ‘extras’ stick around.  Our initial plan was to attach {“env”: “dev”} into the extras dictionary. When vm is spun up, we’d also attach to vm. this would give our support personnel a means of ignoring dev/test VMs and focus on prod. Our vote: keep em’ around.17:05
lbragstadwwriverrat: so you want to separate projects into dev/test/prod?17:06
wwriverratyes. differing SG rules for each17:08
wwriverratdifferent quotas17:08
lbragstadwwriverrat: ok, so why do you need to have extra stuff in the project reference when the project is 'prod', 'test', or 'dev'?17:09
lbragstadwwriverrat: just trying to understand the whole flow17:09
gabriel-bezerrawwriverrat: what lbragstad means by projects is what used to be called tenants17:09
wwriverratdev/test is where they prove out their deployments/apps exosed internally. prod exposed externally.  dev/test doesnt allow prod IPs, prod doesnt allow dev/test IPs17:10
wwriverratyep tenants17:10
*** avozza is now known as zz_avozza17:10
gabriel-bezerrawwriverrat: you can use projects (formerly "tenants") to do that17:11
*** richm has joined #openstack-keystone17:11
gabriel-bezerrawwriverrat: along with security groups17:11
gabriel-bezerrawwriverrat: just create a project for each of {dev,test,prod}17:12
wwriverratsure. we are using puppet to deploy. Each environment gets different settings. test proves out the config before its blessed to go prod17:12
wwriverratprod would allow public ips to perform work via security group rules. dev and test non-externally reachable17:13
wwriverratwe have 80 or so different applications that could cross talk that want our internal cloud space.  They want a free and easy playground (dev), semi-stable integration env (test), and naturally externally exposed apps17:14
gabriel-bezerrawwriverrat: sure. In openstack concepts, how are you dividing those "environments"?17:16
wwriverratback to topic:  If we put the “env” data somewhere, we’d like to keep it at the project level (where quotas, SG rules, etc) live.17:16
wwriverratcurrently each app can allocate 3 environments by creating 3 projects(tenants):  groovyapp-dev, groovyapp-test, groovyapp-prod17:17
wwriverratwe dont want to use a naming convention to determine which is which. We’d rather push it into the “extras” metadata  :)17:19
*** tellesnobrega_ has quit IRC17:20
*** gyee has joined #openstack-keystone17:22
*** ChanServ sets mode: +v gyee17:22
dstanekwwriverrat: what about using the project name so that you won't be sad when extras is removed17:24
dstaneklike dev-projectname17:24
gabriel-bezerradstanek: that's what s/he said: "we dont want to use a naming convention to determine which is which"17:25
wwriverratwe have around 1300 projects currently allocate we have no idea which env they belong to. and i feel squeemish using naming conventions. Would need to modify horizon/keystone to enforce a naming convention specific to our deployment17:25
dstanekwwriverrat: what are you changing to add the extra data now?17:27
openstackgerritAlexander Makarov proposed openstack/keystone: Role revocation invalidates too many tokens  https://review.openstack.org/14139717:27
wwriverratno. But next project I work on is to figure out what vm belongs to what env and how it is stable going forward17:27
gabriel-bezerraI see this is likely a case for hierarchical projects: it would be 3 huge dev/test/prod projects17:28
gabriel-bezerraand a subproject in each of them for each app17:28
wwriverratOur support personnel freaking out not knowing “which of these alerts is REAL!”17:28
openstackgerritAlexander Makarov proposed openstack/keystone: Role revocation invalidates too many tokens  https://review.openstack.org/14139717:28
wwriverratThey only want to focus on prod17:28
*** tylerdurden has joined #openstack-keystone17:29
*** topol has quit IRC17:30
gabriel-bezerrawwriverrat: how those alerts come to them?17:30
gabriel-bezerrawwriverrat: is it based on the ip address?17:30
gabriel-bezerrawwriverrat: if so, you could have different networks in Neutron for each environment, and they would just monitor one of the networks17:31
wwriverratWhen vm is spun up, we register the vm with our master system SMDB. It wants to know dev/test/prod.  If prod, auto-magically hook up monitoring.  Without the environment, they hook them all up.17:33
gabriel-bezerrawwriverrat: you could also have some configuration management that would allow you to set the place where the alerts should go. Then the configuration for production would be different from the other environments, and you would not depend on the kind of cloud iaas you are deploying to.17:33
*** openstackgerrit has quit IRC17:34
*** openstackgerrit has joined #openstack-keystone17:34
wwriverratwe could, we’re just trying to automate the process by providing them the environment when vm is spun up.17:34
gabriel-bezerrayou can put that in the metadata of the instances too17:35
wwriverratyes! exactly. but when vm is spun up, it needs to get it from somewhere.  We’d ike to tag it to project (tenant)17:35
gabriel-bezerrawwriverrat: what version of openstack are you using? if you don't mind changing it when the extras field be removed, why not?17:38
wwriverraticehouse. planning on juno soon17:38
gabriel-bezerrajuno still have the field17:38
gabriel-bezerraso... if you don't mind changing your deployment scripts when you upgrade to a version where "extras" is removed, why not use it?17:39
gabriel-bezerrajust be aware that it is likely to happen in future17:39
gabriel-bezerrasome time in future17:40
wwriverratwe’re likely going to use it.  If it goes away, we’ll likely steal the description field :( . I didnt mean to start a large discussion.  I just wanted you all to know, we have a usecase that may help others for keeping extras.17:40
*** zzzeek has joined #openstack-keystone17:41
gabriel-bezerralbragstad may have a better feeling of when. I have no idea.17:41
lbragstadwwriverrat: I don't have a good meter of when, but I know there has been a lot of discussion about it17:42
lbragstadmorganfainberg:  would probably have a better timeline17:42
gabriel-bezerrawwriverrat: no problem. Thank you for pointing that.17:43
wwriverratthanks for your time. I appreciate your insights :-)17:43
gabriel-bezerradstanek: did you have the same problem I and marekd have had?17:47
gabriel-bezerradstanek: how did you fix it?17:47
gabriel-bezerradstanek: I'm talking about the pysaml2 example idp issue17:48
dstanekgabriel-bezerra: which issue are you still having?17:48
*** openstackgerrit has quit IRC17:49
*** openstackgerrit has joined #openstack-keystone17:49
gabriel-bezerradstanek: the same about "Unable do establish security of incoming assertion"17:49
gabriel-bezerradstanek: you said it could be something with certificates17:50
gabriel-bezerradstanek: did you change the certificate of you deployment?17:50
*** marcoemorais has quit IRC17:50
dstanekgabriel-bezerra: in your idp_conf.py you should change the key_file and cert_file to point to what is in /etc/shibboleth17:50
*** tellesnobrega_ has joined #openstack-keystone17:50
*** marcoemorais has joined #openstack-keystone17:50
*** lhcheng has joined #openstack-keystone17:55
*** dims__ is now known as dimsum__17:57
*** thedodd has quit IRC18:03
*** topol has joined #openstack-keystone18:04
*** ChanServ sets mode: +v topol18:04
*** bdossant has quit IRC18:10
*** bdossant has joined #openstack-keystone18:11
*** jistr has quit IRC18:14
morganfainbergIf we remove extra there will be an alternative and/or it'll be optional because a lot of people use it.18:14
bretonhey18:16
bretonI finally started working on https://blueprints.launchpad.net/keystone/+spec/alembic, sorry for being silent about it for so long18:17
*** harlowja_away is now known as harlowja18:17
*** chrisshattuck has joined #openstack-keystone18:19
*** kobtea has joined #openstack-keystone18:20
bretonthere is this module in oslo.db -- https://github.com/openstack/oslo.db/tree/master/oslo/db/sqlalchemy/migration_cli . It seems to be not documented though -- http://docs.openstack.org/developer/oslo.db/18:21
bretonso, 1. Can it be used?18:22
*** amakarov is now known as amakarov_away18:24
*** kobtea has quit IRC18:24
*** russellb is now known as rustlebee18:29
gabriel-bezerradstanek: thanks. I'll try that.18:32
breton2. are we okay with changing command line options? I'd like to drop that "db_version" and "db_sync" and change it to "db version/upgrade/downgrade/etc"18:32
dstanekgabriel-bezerra: let me know how it goes18:33
gabriel-bezerradstanek: you mean sp-{cert,key}.pem ?18:36
gabriel-bezerradstanek: that belong to _shibd:_shibd ?18:37
morganfainbergbreton: don't worry about being quiet on that front. We know people are busy and / or working on things. The cli options will need to have at least a deprecation cycle before they're fully changed n18:37
morganfainbergbreton: so you can change them, but you're going to need to support and/or at least clearly communicate how the old options translate to the new ones.18:38
gabriel-bezerradstanek: or you mean something in shibboleth2.xml file?18:38
morganfainbergbreton: and zzzeek or dhellmann can probably answer about that oslo.db module more easily.18:39
*** rushiagr_away is now known as rushiagr18:39
bretonmorganfainberg: the problem is that old options might be not usable with alembic. I am not sure that alembic can determine whether it should upgrade/downgrade by version number18:39
dstanekgabriel-bezerra: change idp_conf.py to point to the pem files in the /etc18:40
bretonbut yes, I guess I need zzzeek's opinion on that18:40
zzzeekotp18:40
*** aix has quit IRC18:40
morganfainbergbreton: we have zzzeek who is an awesome resource for this stuff and asking him helps us not do silly things that makes him cry when we find it was based on broken assumptions n18:41
morganfainbergzzzeek: hi! ;)18:41
morganfainbergS/cry/post on Twitter that $projects$ should read documentation and/or ask questions before wondering why things are horribly not working.18:42
ekarlso-is keystone migrating to alembic or ?18:43
bretonekarlso-: it is18:43
morganfainbergekarlso-: all of openstack is afaik b18:43
morganfainbergBut we want to do it this cycle.18:43
ekarlso-oh18:43
ekarlso-I would too for Designate18:43
ekarlso-if there's a ok migration path :/18:43
morganfainbergekarlso-: I think we are doing a "use sqlamigrate until this cycle migrations then alembic.  But breton can say more or tell me I am wrong.18:44
morganfainbergSo all new18:45
morganfainbergMigrations end up alembic.18:45
bretonyep, and old migrations stay sa-m18:45
bretonand there is that migration_cli in oslo.db18:46
bretonbut I can neither find anything using it nor any docs18:46
*** bdossant has quit IRC18:49
*** afaranha has joined #openstack-keystone18:50
bretonthe code is simple though. But i'm not sure about its state18:51
*** mikedillion has joined #openstack-keystone18:53
marekddstanek: and by chaning it worked?18:56
marekddstanek: strange, as i was doing *similar* thing and it didn't work18:57
marekddstanek: so i simply copied shibboleth files and then pointed to them in idp_conf.py18:57
rodrigodsmarekd, ping what's the differences between "any_one_of" and "whitelist"? Is that whitelist compares a list against a list, while any_one_of compares a single value against a list?18:58
*** raildo has quit IRC19:00
*** marcoemorais has quit IRC19:01
*** marcoemorais has joined #openstack-keystone19:01
*** marcoemorais has quit IRC19:02
*** marcoemorais has joined #openstack-keystone19:02
*** boris-42 has joined #openstack-keystone19:03
*** marcoemorais has quit IRC19:15
*** marcoemorais has joined #openstack-keystone19:15
marekdrodrigods: if i was to make an analogy in Python I'd say: any_one_of: [a,b,c] ---  if attribute in [a,b,c]: return True else return False. white list will be: whitelist = [a,b,c], input = [a,b,z] ----  return input.intersect(whitelist)19:17
gabriel-bezerramarekd, dstanek: I've got the same error. It didn't even change the AuthenticatingAuthority value19:30
gabriel-bezerraof the assertion19:30
gabriel-bezerradstanek: are you using a valid certificate?19:31
*** mikedillion has quit IRC19:38
*** thedodd has joined #openstack-keystone19:40
*** andreaf has quit IRC19:41
ayoungrodrigods, so, I had a change of mind since yesterday.  I think I want to go back to putting the onus on the person specifying where to enforce policy to say *what* they want checked.   Just like the "member" value says check policy on this value from the target, I think we want to say "check policy on this expected part of the create payload"20:03
ayoungSo we would have somethinkg like:20:03
openstackgerritLance Bragstad proposed openstack/keystone: Remove XML support  https://review.openstack.org/12573820:03
ayoungthe check we have here for get_memeber_from_driver, but based on the request.   http://git.openstack.org/cgit/openstack/keystone/tree/keystone/common/controller.py#n12020:04
*** thedodd has quit IRC20:06
*** marcoemorais has quit IRC20:08
*** marcoemorais has joined #openstack-keystone20:08
*** wwriverrat has left #openstack-keystone20:09
*** tellesnobrega_ has quit IRC20:15
*** thedodd has joined #openstack-keystone20:16
*** kobtea has joined #openstack-keystone20:21
dstanekmarekd: gabriel-bezerra: let me catch up on the conversatoin20:23
*** jaosorior has quit IRC20:23
*** kobtea has quit IRC20:25
gabriel-bezerradstanek, marekd: it can be useful: https://pythonhosted.org/pysaml2/howto/config.html#metadata20:41
*** aix has joined #openstack-keystone20:43
dstanekgabriel-bezerra: did you get it working?20:44
gabriel-bezerradstanek: no, I didn' :(20:46
gabriel-bezerradstanek: how about you?20:46
gabriel-bezerradstanek: this is what I get in shibd.log when the POST comes from the browser https://gist.github.com/gabriel-bezerra/4885b36b40475bbd8e6320:59
gabriel-bezerramarekd: ^20:59
dstanekgabriel-bezerra: i thought i got past that, but it looks like i did not21:04
lbragstadoh geez https://review.openstack.org/#/c/125738/21:15
*** topol has quit IRC21:19
dstaneklbragstad: passing? nice21:25
lbragstadmhmmm!21:26
dstanekgabriel-bezerra: marekd: i don't understand how to setup metadata for mod_shib.  i just keep getting: No MetadataProvider available.21:26
dstaneklbragstad: nice21:26
openstackgerritLance Bragstad proposed openstack/keystone: Add positive test case for content types  https://review.openstack.org/13059121:28
lbragstaddstanek: did you get a spec pushed up for the functional testing bit?21:29
*** jdennis has quit IRC21:29
*** boris-42 has quit IRC21:33
*** jdennis has joined #openstack-keystone21:35
dstaneklbragstad: almost - i reformatted most of it, but i can't break away from getting the IdP working21:37
dstaneklbragstad: today is actually a vacation day so that i can work on the two tutorials i'm giving at a conference next month, but i can't break away :-(21:37
lbragstaddstanek: IdP, the federation testing stuff?21:39
*** jdennis has quit IRC21:40
*** jdennis has joined #openstack-keystone21:44
*** timcline_ has joined #openstack-keystone21:48
*** timcline has quit IRC21:48
dstaneklbragstad: yep21:51
*** boris-42 has joined #openstack-keystone21:55
*** marekd is now known as marekd|away21:55
*** nellysmitt has joined #openstack-keystone22:16
*** tylerdurden has quit IRC22:20
*** shakamunyi has joined #openstack-keystone22:20
*** nellysmitt has quit IRC22:20
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/13479422:21
*** kobtea has joined #openstack-keystone22:22
*** timcline_ has quit IRC22:23
openstackgerritJorge Munoz proposed openstack/keystone-specs: Read/Write LDAP drivers  https://review.openstack.org/14017522:24
*** kobtea has quit IRC22:27
*** r-daneel has quit IRC22:35
morganfainbergdolphm, lbragstad, i think i found an issue with RAX cloud server building22:36
*** stevemar has joined #openstack-keystone22:36
*** ChanServ sets mode: +v stevemar22:36
dolphmmorganfainberg: ?22:36
morganfainbergdolphm, lbragstad, but i think it errors when i use a 8192 length ssh key22:36
* morganfainberg is trying again sans ssh key22:37
morganfainbergbut - i remember something about this when i was at metacloud trying to use rax servers22:37
morganfainbergyep22:37
dolphmmorganfainberg: i don't think i've used a key that long22:37
morganfainbergif i use my 8192 public key it fails the server build22:38
dolphmmorganfainberg: using a seeded key from the web UI?22:38
morganfainbergnope, supplying my own22:38
morganfainbergoh i mean yeah via the key i input in the web ui22:38
morganfainbergyes i know... 8192 is crazypants22:38
dolphmmorganfainberg: yeah... can you login with the provided password?22:38
morganfainbergno the VM fails to build.22:38
dolphmmorganfainberg: oh ha22:39
morganfainbergyeah22:39
dolphmthat's fun22:39
morganfainbergnot supplying the key - no issue building22:39
dolphmmorganfainberg: wonder if that's a known issue... #rackspace might be able to help, or open a ticket22:39
dolphmmorganfainberg: or setup a weaker key for use with rax in sshconfig ..22:40
* morganfainberg doesn't really care22:40
morganfainbergi can use the password for initial login22:40
morganfainbergi mean this is really a 1-off POC / dev box22:40
morganfainbergi wont have more than one22:40
morganfainbergcause i don't want to pay real $ for it.22:40
morganfainbergits just nice to have a stable place to poke at things when on an airplane rather than needing to burn battery on a VM22:41
dolphmmorganfainberg: i was asking if you could login to check the state of authorized_keys ... thinking maybe it was getting truncated or something. but didn't realize you weren't getting that far22:43
*** gordc has quit IRC22:43
morganfainbergand that is the level of work i'll put into it. toss some messages into #rackspace and go about my day. -22:45
*** Haneef has quit IRC22:49
*** dimsum__ has quit IRC22:51
*** dimsum__ has joined #openstack-keystone22:52
*** henrynash has joined #openstack-keystone22:54
*** ChanServ sets mode: +v henrynash22:54
*** aix has quit IRC22:56
*** dimsum__ has quit IRC22:57
openstackgerritMerged openstack/keystone: Cleanup eventlet use in tests  https://review.openstack.org/14083523:02
*** nkinder_away has quit IRC23:13
*** jdennis has quit IRC23:39
*** jdennis has joined #openstack-keystone23:53

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!