Wednesday, 2015-01-21

*** ayoung has joined #openstack-keystone00:09
*** ChanServ sets mode: +v ayoung00:09
*** topol has quit IRC00:12
*** jaosorior has quit IRC00:13
*** marg7175 has quit IRC00:14
*** ayoung has quit IRC00:18
openstackgerritMerged openstack/keystone-specs: Enable the storing of domain specific configuration in SQL.  https://review.openstack.org/12323800:27
*** shakamunyi has joined #openstack-keystone00:29
*** shakamunyi has quit IRC00:30
*** shakamunyi has joined #openstack-keystone00:32
*** shakamunyi has quit IRC00:38
*** henrynash has quit IRC00:38
openstackgerritSteve Martinelli proposed openstack/keystone-specs: Visual Page for WebSSO  https://review.openstack.org/13352900:40
*** stevemar has quit IRC00:45
*** packet has quit IRC00:49
*** henrynash has joined #openstack-keystone00:51
*** ChanServ sets mode: +v henrynash00:51
*** abhirc has joined #openstack-keystone00:51
*** chrisshattuck has joined #openstack-keystone00:53
*** zzzeek has quit IRC00:53
*** abhirc has quit IRC01:10
*** abhirc has joined #openstack-keystone01:19
*** zigo_ has joined #openstack-keystone01:21
*** abhirc has quit IRC01:21
*** abhirc has joined #openstack-keystone01:21
*** zigo has quit IRC01:21
*** rwsu has quit IRC01:23
*** radez is now known as radez_g0n301:25
*** ncoghlan has joined #openstack-keystone01:26
*** zigo has joined #openstack-keystone01:27
*** zigo_ has quit IRC01:27
*** _cjones_ has quit IRC01:30
*** henrynash has quit IRC01:31
*** chrisshattuck has quit IRC01:38
*** abhirc has quit IRC01:42
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Removes unnecessary checks when cleaning a domain  https://review.openstack.org/14626401:43
*** zigo has quit IRC01:46
*** zigo has joined #openstack-keystone01:47
*** abhirc has joined #openstack-keystone01:52
*** ljfisher has joined #openstack-keystone01:57
*** g2` is now known as nixter102901:58
*** nixter1029 is now known as g2`01:58
*** g2` is now known as Quest2647701:59
openstackgerritIan Cordasco proposed openstack/python-keystoneclient: Configure TCP Keep-Alive for all Sessions  https://review.openstack.org/14770702:00
*** zigo has quit IRC02:00
*** zigo has joined #openstack-keystone02:00
*** Quest26477 is now known as g2`02:01
*** tellesnobrega has quit IRC02:06
*** dims__ has quit IRC02:09
*** chrisshattuck has joined #openstack-keystone02:27
*** erkules_ has joined #openstack-keystone02:32
*** erkules has quit IRC02:34
*** afazekas has quit IRC02:35
*** harlowja is now known as harlowja_away02:42
*** KanagarajM has joined #openstack-keystone02:45
*** marg7175 has joined #openstack-keystone02:52
*** marekd-mobile has joined #openstack-keystone02:54
*** chrisshattuck has quit IRC03:02
*** avozza is now known as zz_avozza03:04
*** richm has quit IRC03:09
*** chrisshattuck has joined #openstack-keystone03:28
*** wanghong_away is now known as wanghong03:29
*** klaas_ has quit IRC03:32
*** klaas__ has joined #openstack-keystone03:47
*** klaas__ has quit IRC03:52
*** ljfisher has quit IRC03:52
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Enforce that some plugin options are required  https://review.openstack.org/14878404:02
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Enforce that some plugin options are required  https://review.openstack.org/14878404:08
*** klaas__ has joined #openstack-keystone04:14
*** diegows has joined #openstack-keystone04:26
*** boltR has quit IRC04:29
*** lhcheng has joined #openstack-keystone04:43
*** abhirc has quit IRC04:44
*** diegows has quit IRC04:48
*** klaas__ has quit IRC04:49
jamielennoxwanghong: did you do a bug for: https://review.openstack.org/#/c/144422/2 ?04:50
*** samueldmq has quit IRC04:56
wanghongjamielennox, I will report soon04:57
jamielennoxwanghong: no worries04:57
openstackgerritguang-yee proposed openstack/keystone-specs: Tokenless authorization with X.509 SSL client certificate  https://review.openstack.org/10591304:59
wanghongjamielennox, here is the bug: https://bugs.launchpad.net/python-keystoneclient/+bug/141307105:08
openstackgerritwanghong proposed openstack/python-keystoneclient: fix enabled parameter of update doesn't default to None  https://review.openstack.org/14442205:10
openstackgerritwanghong proposed openstack/python-keystoneclient: make req_ref doesn't require id  https://review.openstack.org/14849905:12
*** henrynash has joined #openstack-keystone05:15
*** ChanServ sets mode: +v henrynash05:15
*** MasterPiece has joined #openstack-keystone05:18
*** junhongl has quit IRC05:33
*** junhongl has joined #openstack-keystone05:36
*** chrisshattuck has quit IRC06:03
*** henrynash has quit IRC06:04
*** jaosorior has joined #openstack-keystone06:05
*** tellesnobrega_ has quit IRC06:22
*** jamielennox is now known as jamielennox|away06:25
openstackgerritwanghong proposed openstack/python-keystoneclient: make req_ref doesn't require id  https://review.openstack.org/14849906:30
*** MasterPiece has quit IRC06:31
openstackgerritwanghong proposed openstack/keystone: move region and service exist checks into manager layer  https://review.openstack.org/14197706:39
*** stevemar has joined #openstack-keystone06:39
*** ChanServ sets mode: +v stevemar06:39
*** MasterPiece has joined #openstack-keystone06:44
*** KanagarajM has quit IRC06:46
*** KanagarajM has joined #openstack-keystone06:48
*** lhcheng has quit IRC06:55
*** oomichi has quit IRC06:59
*** stevemar has quit IRC07:25
*** zz_avozza is now known as avozza07:28
*** markvoelker has quit IRC07:29
*** avozza is now known as zz_avozza07:37
*** zz_avozza is now known as avozza07:39
*** aix has joined #openstack-keystone07:45
*** chlong has quit IRC07:46
*** avozza is now known as zz_avozza07:49
*** oomichi has joined #openstack-keystone07:52
*** bjornar has joined #openstack-keystone07:54
*** erkules_ is now known as erkules07:56
*** krykowski has joined #openstack-keystone08:17
*** krykowski_ has joined #openstack-keystone08:25
*** zz_avozza is now known as avozza08:27
*** krykowski has quit IRC08:28
*** oomichi has quit IRC08:28
*** boris-42 has quit IRC08:33
*** krykowski_ has quit IRC08:35
*** avozza is now known as zz_avozza08:37
*** krykowski has joined #openstack-keystone08:41
*** marg7175 has quit IRC08:49
*** zz_avozza is now known as avozza09:03
*** ncoghlan has quit IRC09:08
*** jistr has joined #openstack-keystone09:09
*** josecastroleon has quit IRC09:36
*** josecastroleon has joined #openstack-keystone09:37
*** mzbik has joined #openstack-keystone09:40
mzbikamakarov_away, Hi, it looks like your patch for keystone role names (https://review.openstack.org/148642 ) works and helped with heat delegation :D Thanks!09:41
*** krykowski has quit IRC09:49
*** jistr has quit IRC09:50
*** jistr has joined #openstack-keystone09:56
*** tellesnobrega_ has joined #openstack-keystone10:15
*** krykowski has joined #openstack-keystone10:19
*** afazekas has joined #openstack-keystone10:28
*** nellysmitt has joined #openstack-keystone10:32
*** aix has quit IRC10:45
*** marg7175 has joined #openstack-keystone10:50
*** KanagarajM has quit IRC10:56
*** boris-42 has joined #openstack-keystone11:05
*** tellesnobrega_ has quit IRC11:13
*** aix has joined #openstack-keystone11:16
*** marekd-mobile has quit IRC11:20
*** amakarov_away is now known as amakarov11:29
openstackgerritRodrigo Duarte proposed openstack/keystone-specs: API changes for subtree_ids and parents_ids params  https://review.openstack.org/14787111:38
*** krykowski has quit IRC11:46
*** rdo has quit IRC11:46
*** tellesnobrega has joined #openstack-keystone11:47
*** rdo has joined #openstack-keystone11:48
*** krykowski has joined #openstack-keystone11:49
amakarovmzbik, cheers!11:52
mzbikamakarov, :)11:53
mzbikamakarov, but I think I just found issue11:53
amakarovmzbik, please share :)11:54
mzbikamakarov, http://wklej.org/id/1602988/11:54
*** krykowski has quit IRC11:55
mzbikit happend when deleting heat stack, however stack was created without problems - after your patch11:56
mzbikso It might be connected11:56
mzbikbut not sure11:57
amakarovmzbik, well, looks like validation needs to check role format by itself11:57
amakarovok, follow my patch then, fixing now :)11:58
mzbik:)11:58
*** jamielennox|away is now known as jamielennox12:01
*** krykowski has joined #openstack-keystone12:01
*** saltsa has quit IRC12:02
*** chlong has joined #openstack-keystone12:02
*** saltsa has joined #openstack-keystone12:03
*** raildo has joined #openstack-keystone12:03
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Improve List Role Assignments Filters Performance  https://review.openstack.org/13720212:08
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Improve creation of expected assignments in tests  https://review.openstack.org/14454412:08
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Improve List Role Assignment Tests  https://review.openstack.org/13702112:08
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Refactor check of targets and actors on RoleV3  https://review.openstack.org/14470212:08
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Check for invalid filtering on v3/role_assignments  https://review.openstack.org/14470312:08
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Refactor role assignment assertions  https://review.openstack.org/14454312:08
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Fixes 'OS-INHERIT:inherited_to' info in tests  https://review.openstack.org/14454212:08
*** krykowski has quit IRC12:08
openstackgerritAlexander Makarov proposed openstack/keystone: Chain a trust with a role specified by name  https://review.openstack.org/14864212:19
amakarovmzbik, ^^12:20
mzbikchecking12:20
mzbiksome progress12:36
openstackgerritMarek Denis proposed openstack/keystone-specs: Reorder parameters in federation API docs.  https://review.openstack.org/14891112:37
openstackgerritRodrigo Duarte proposed openstack/keystone: Implements parents_ids query param  https://review.openstack.org/14856712:42
openstackgerritRodrigo Duarte proposed openstack/keystone: Implements subtree_ids query param  https://review.openstack.org/14861812:42
mzbikLook like your patch works, but I have problem with roles: Some of requested roles are not in redelegated trust12:43
mzbikneed to trace it :)12:43
mzbikthanks12:43
*** diegows has joined #openstack-keystone12:47
*** krykowski has joined #openstack-keystone12:53
openstackgerritHenrique Truta proposed openstack/python-keystoneclient: Creating parameter to list inherited role assignments  https://review.openstack.org/11730012:54
*** nellysmitt has quit IRC13:01
*** krykowski has quit IRC13:02
*** marg7175 has quit IRC13:03
*** krykowski has joined #openstack-keystone13:08
*** dims__ has joined #openstack-keystone13:10
*** jamielennox is now known as jamielennox|away13:21
*** rdo has quit IRC13:22
openstackgerritBrant Knudson proposed openstack/python-keystoneclient: Correct failures for check H238  https://review.openstack.org/14633713:27
*** abhirc has joined #openstack-keystone13:28
openstackgerritBrant Knudson proposed openstack/oslo.policy: Update .gitignore  https://review.openstack.org/14867113:33
*** ljfisher has joined #openstack-keystone13:40
*** rdo has joined #openstack-keystone13:41
*** ljfisher has quit IRC13:44
*** abhirc has quit IRC13:45
*** gordc has joined #openstack-keystone13:45
*** lhcheng has joined #openstack-keystone13:45
openstackgerritBrant Knudson proposed openstack/python-keystoneclient: Switch from oslo.utils to oslo_utils  https://review.openstack.org/14596813:48
*** abhirc has joined #openstack-keystone13:49
*** ljfisher has joined #openstack-keystone13:51
*** abhirc has quit IRC13:52
openstackgerritBrant Knudson proposed openstack/python-keystoneclient: Change oslo.serialization to oslo_serialization  https://review.openstack.org/14863213:52
*** tellesnobrega has quit IRC13:54
*** samueldmq-away has quit IRC13:55
*** raildo has quit IRC13:55
*** htruta has quit IRC13:55
openstackgerritBrant Knudson proposed openstack/python-keystoneclient: Change oslo.config to oslo_config  https://review.openstack.org/14525213:55
*** krykowski has quit IRC14:00
*** radez_g0n3 is now known as radez14:00
*** krykowski has joined #openstack-keystone14:04
*** lhcheng has quit IRC14:04
*** htruta has joined #openstack-keystone14:06
*** raildo has joined #openstack-keystone14:06
*** mattfarina has joined #openstack-keystone14:06
*** samueldmq-away has joined #openstack-keystone14:06
*** tellesnobrega has joined #openstack-keystone14:06
*** kashyap has joined #openstack-keystone14:06
openstackgerritBoris Bobrov proposed openstack/keystone: Use migration_cli for db migrations  https://review.openstack.org/14754814:07
kashyapHeya, so - with current Keystone git master, DevStack invocations started failing with:14:08
kashyap"2015-01-21 13:58:42.440 | The service catalog is empty."14:08
kashyapThe above occurs when Neutron is trying to create a private network14:09
kashyapContextual log from DevStack: http://paste.openstack.org/show/159743/ . Any hints as to what could be the root cause?14:09
*** joesavak has joined #openstack-keystone14:10
*** sriram has joined #openstack-keystone14:13
kashyapHmm, the IP address of the DevStack VM changed, probably something related to that in Keystone configs. . /me double checks14:13
openstackgerritHenrique Truta proposed openstack/python-keystoneclient: Creating parameter to list inherited role assignments  https://review.openstack.org/11730014:14
*** richm has joined #openstack-keystone14:26
*** diegows has quit IRC14:37
mzbikamakarov, any idea how to debug this: https://github.com/openstack/keystone/blob/4325113f163137976ccb625ea5f324e75beed44e/keystone/trust/core.py#L82-L8714:40
mzbikwe have no idea what role is missing :/14:40
mzbikuh, this is somwhere you created patch14:42
mzbikhttps://review.openstack.org/#/c/148642/4/keystone/trust/core.py --> if role[key] not in p_roles[key]:14:43
amakarovmzbik, yes - the problem is that I expected roles to be stored with id14:45
mzbikhmm14:46
amakarovlast patch checks against id and name14:46
mzbikMaybe this is heat bug?14:46
mzbikBut why I was able to create stack, and it fail only when I want to delete it oO14:46
amakarovso if you redelegate role by name then it will validate against parent trust's role names14:47
mzbikso it looks like it was redelegated by name, but now heat expects ids?14:48
amakarovI cant say for sure without traceback or something like that14:49
mzbiktrying to get sth more than Json requests14:50
amakarovWhat goes wrong?14:50
mzbikand error from heat14:50
amakarovok, can you see the keystone response?14:50
mzbikhttp://wklej.org/id/1603188/14:51
mzbikhttp://wklej.org/hash/6da1bd37fa8/ <-- keystone response for using trust14:52
mzbikhttp://wklej.org/hash/1287dbb61f5/ <-- creating trust (it was before using it of course ;) )14:52
*** ljfisher has quit IRC14:53
mzbikthis is trust created from trust to be exact14:53
mzbikmaybe this is problem14:53
mzbikwe created "oryginal" trust with two roles: _member_ and heat_stack_owner14:53
amakarovmzbik, can you get 2b621f0a1e44488c8205227355f33e7c trust?14:54
mzbiksure14:54
*** ljfisher has joined #openstack-keystone14:58
amakarovmzbik, I'd like to see "roles" from it, I have a suspicion that ids may differ14:59
mzbikhttp://wklej.org/hash/7cd5c58a8b4/ <-- create that trust14:59
amakarovcool, thanks15:00
* amakarov compares role ids15:00
mzbikhttp://wklej.org/hash/1812cdaa8d2/ <-- first use (in my tcpdump ;) )15:00
mzbikhttp://wklej.org/hash/51bba223eaa/ <-- second use15:00
amakarovok, my suspicion was wrong...15:01
amakarovmzbik, let me think for a while15:02
*** nellysmitt has joined #openstack-keystone15:02
mzbikamakarov, take your time15:02
*** rushiagr_away is now known as rushiagr15:05
*** nellysmitt has quit IRC15:06
*** gpanda has joined #openstack-keystone15:08
amakarovmzbik, looks like my test was not complete, I reproduced it, thanks!15:08
*** jasondotstar has joined #openstack-keystone15:08
mzbik:)15:08
*** jasondotstar has quit IRC15:08
*** jasondotstar has joined #openstack-keystone15:09
*** krykowski has quit IRC15:09
*** gpanda has quit IRC15:11
*** kashyap has left #openstack-keystone15:13
*** krykowski has joined #openstack-keystone15:15
*** thedodd has joined #openstack-keystone15:16
*** marg7175 has joined #openstack-keystone15:21
*** topol has joined #openstack-keystone15:21
*** ChanServ sets mode: +v topol15:21
*** ayoung has joined #openstack-keystone15:21
*** ChanServ sets mode: +v ayoung15:21
*** abhirc has joined #openstack-keystone15:22
*** bknudson has joined #openstack-keystone15:23
*** ChanServ sets mode: +v bknudson15:23
*** topol has quit IRC15:24
*** stevemar has joined #openstack-keystone15:24
*** ChanServ sets mode: +v stevemar15:24
*** topol has joined #openstack-keystone15:24
*** ChanServ sets mode: +v topol15:24
*** stevemar has quit IRC15:25
*** henrynash has joined #openstack-keystone15:25
*** ChanServ sets mode: +v henrynash15:25
*** mzbik has quit IRC15:26
*** pnavarro has joined #openstack-keystone15:27
henrynashlbragstad: https://review.openstack.org/#/c/144650/515:28
*** stevemar has joined #openstack-keystone15:29
*** ChanServ sets mode: +v stevemar15:29
marekdstevemar: ayoung: https://review.openstack.org/#/c/14257315:31
marekdstevemar's already +1'd it.15:31
stevemarwebsso?15:31
marekdstevemar: nope, direct group mapping15:32
marekdstevemar: sorry, white/blacklists15:32
stevemarah15:32
marekdstevemar: for the websso added a "to-check" comment.15:32
*** fpatwa has joined #openstack-keystone15:35
rodrigodsstevemar, ping re: replied your comment in https://review.openstack.org/#/c/147871/15:37
stevemarrodrigods, still catching up!15:37
*** jasondotstar has quit IRC15:38
*** atiwari has joined #openstack-keystone15:39
*** lhcheng has joined #openstack-keystone15:40
stevemarrodrigods, okay, makes sense15:40
rodrigodsstevemar, did you see the second reply?15:41
*** MasterPiece has quit IRC15:42
*** jxxxxx has quit IRC15:43
stevemarrodrigods, yeah, let me ask around here15:45
rodrigodsstevemar, ++15:46
openstackgerrithenry-nash proposed openstack/keystone: Move projects and domains to their own backend  https://review.openstack.org/14482415:47
openstackgerritMerged openstack/keystone-specs: Reorder parameters in federation API docs.  https://review.openstack.org/14891115:50
openstackgerrithenry-nash proposed openstack/keystone: Remove unused pointer to assignment in identity driver  https://review.openstack.org/14502215:51
openstackgerrithenry-nash proposed openstack/keystone: Make controllers and managers reference new resource manager  https://review.openstack.org/13352515:52
*** krykowski has quit IRC15:54
openstackgerritBrant Knudson proposed openstack/python-keystoneclient-federation: Workflow documentation is now in infra-manual  https://review.openstack.org/13937615:54
*** stevemar has quit IRC15:57
*** stevemar has joined #openstack-keystone15:57
*** ChanServ sets mode: +v stevemar15:57
*** jasondotstar has joined #openstack-keystone16:01
*** krykowski has joined #openstack-keystone16:03
openstackgerrithenry-nash proposed openstack/keystone: Make unit tests call the new resource manager  https://review.openstack.org/13095416:07
*** fpatwa has quit IRC16:08
openstackgerritBoris Bobrov proposed openstack/keystone: Use migration_cli for db migrations  https://review.openstack.org/14754816:09
openstackgerritDavid Stanek proposed openstack/keystone: Fixes a type check to make it work in Python 3  https://review.openstack.org/12541016:11
openstackgerritDavid Stanek proposed openstack/keystone: Updates Python3 requirements  https://review.openstack.org/13057916:11
openstackgerritDavid Stanek proposed openstack/keystone: Mocks out the memcache library for tests  https://review.openstack.org/12540916:11
openstackgerritDavid Stanek proposed openstack/keystone: Adds a fork of python-ldap for Py3 testing  https://review.openstack.org/9582716:11
*** krykowski has quit IRC16:13
*** briancurtin has joined #openstack-keystone16:14
*** atiwari has quit IRC16:15
*** atiwari has joined #openstack-keystone16:15
*** lhcheng has quit IRC16:20
*** lhcheng has joined #openstack-keystone16:20
openstackgerritguang-yee proposed openstack/keystone-specs: Tokenless authorization with X.509 SSL client certificate  https://review.openstack.org/10591316:23
gordcstevemar: any concerns with me moving https://github.com/openstack/pycadf/blob/master/pycadf/audit/api.py to keystonemiddleware?16:24
gordcthe code is very middleware specific.16:24
*** abhirc has quit IRC16:25
*** jasondotstar has quit IRC16:27
stevemargordc, at which point you won't have anything left in pycadf!16:27
stevemarnah, i think it makes sense16:28
stevemari guess pycadf will just create the payload/content, which makes sense16:28
gordcstevemar: my grand scheme. :)16:28
stevemaryou want something else to actually send it off16:28
stevemarpropose a spec16:29
gordcstevemar: yeah. i want to make pycadf to be just the schema... and validation.16:29
stevemarcause you'll need to move the the mappings and the tests over too16:29
stevemar:(16:29
*** atiwari has quit IRC16:29
gordcstevemar: the actually building i wanted to offload... unless it's super generic.16:29
stevemaryep16:29
stevemarat which point the keystone team will have to decide what they want to do when there is no service catalog, and auditing is enabled :O16:30
gordcstevemar: crap... yeah.. test cases...16:30
gordci'm going to make the service catalog usage optional... ie. adding a 'enable_discovery' opt16:30
gordci'll just move it over sans unit tests... and if it's cool i'll move over tests as well16:33
*** abhirc has joined #openstack-keystone16:33
*** lhcheng_ has joined #openstack-keystone16:34
*** lhcheng has quit IRC16:38
raildoayoung, ping, I'm implementing the sql migration to domain as project. Do you decide something about what I have to do when i found some namespace clashing and Id clashing?16:41
openstackgerritMerged openstack/python-keystoneclient-federation: Workflow documentation is now in infra-manual  https://review.openstack.org/13937616:43
openstackgerritguang-yee proposed openstack/keystone-specs: Tokenless authorization with X.509 SSL client certificate  https://review.openstack.org/10591316:45
openstackgerritMerged openstack/oslo.policy: Move project imports after 3rd party imports  https://review.openstack.org/14874316:45
openstackgerritAlexander Makarov proposed openstack/keystone: Chain a trust with a role specified by name  https://review.openstack.org/14864216:48
*** nellysmitt has joined #openstack-keystone16:48
*** dims__ has quit IRC16:50
stevemarrodrigods, OK, we talked it over16:54
rodrigodsstevemar, great, thx for that16:55
*** jsavak has joined #openstack-keystone16:58
*** dims__ has joined #openstack-keystone17:01
*** joesavak has quit IRC17:01
*** joesavak has joined #openstack-keystone17:02
*** packet has joined #openstack-keystone17:02
openstackgerritRodrigo Duarte proposed openstack/keystone-specs: API changes for subtree_as_ids and parents_as_ids  https://review.openstack.org/14787117:03
*** jsavak has quit IRC17:03
*** rwsu has joined #openstack-keystone17:04
openstackgerritRodrigo Duarte proposed openstack/keystone-specs: API changes for subtree_as_ids and parents_as_ids  https://review.openstack.org/14787117:05
*** andreaf has joined #openstack-keystone17:06
rodrigodsstevemar, morganfainberg, henrynash, thx for clarifying this ^17:06
*** _cjones_ has joined #openstack-keystone17:07
*** _cjones_ has quit IRC17:09
*** _cjones_ has joined #openstack-keystone17:09
raildomorganfainberg, henrynash, topol  Enjoying the rodrigods comment... I fixed what you requested in the reseler spec :) https://review.openstack.org/#/c/139824/17/specs/kilo/reseller.rst Is there anything else that I can do?17:13
*** atiwari has joined #openstack-keystone17:14
*** rushiagr is now known as rushiagr_away17:16
*** samueldmq-away is now known as samueldmq17:19
samueldmqhenrynash, was reviewing 'Make unit tests call the new resource manager'17:19
henrynashyes17:19
samueldmqhenrynash, it took so long that you uploaded a new patch set, and I am on 13th17:20
samueldmqhenrynash, :/17:20
henrynashsorry!17:20
samueldmqhenrynash, will adapt and submit, :p17:20
henrynashit was only a rebase, I think17:20
henrynashbtw, see my comemnt on https://review.openstack.org/#/c/137202/17:20
samueldmqhenrynash, np, that should not take so long to put my comments there :)17:20
henrynashjust submut the comments on the older patch…I’ll pick them up17:21
samueldmqhenrynash, going to see17:21
samueldmqhenrynash, ok, submitted17:21
henrynashthx17:21
anteayadstanek: http://git.openstack.org/cgit/openstack-infra/system-config/tree/modules/openstack_project/templates/nodepool/nodepool.yaml.erb17:22
samueldmqhenrynash, regarding your comment, we defined we cannot ask for effective + user + domain17:22
samueldmqhenrynash, effective + domain is invalid17:23
henrynashsamueldmq: I’m not that’s true, what if I want the group roles on a domain expanded out for the user17:23
rodrigodssamueldmq, henrynash, ++ I think we we're considering only the inherited role assignments use case17:24
openstackgerritRodrigo Duarte proposed openstack/keystone: Implements parents_as_ids query param  https://review.openstack.org/14856717:24
openstackgerritRodrigo Duarte proposed openstack/keystone: Implements subtree_as_ids query param  https://review.openstack.org/14861817:24
henrynashagreed…..I found this wwhile working in the metadata removal patch (which I have rebased on yours)..let me post a WIP17:25
openstackgerrithenry-nash proposed openstack/keystone: Remove manager-driver assignment metadata construct  https://review.openstack.org/14899517:27
henrynashsamueldmq, rodigods: see changes to assignment/core.py in https://review.openstack.org/14899517:28
samueldmqhenrynash, so we should be able to have the ability to query domain+user and expand only groups ..17:30
henrynashsamueldmq; exactly17:30
samueldmqhenrynash, any other special case you have in mind?17:30
henrynashsamueldmq: not so far :-)…implementing this metadata removal is quiet a good test of whether we have the fucntionality we need….f17:31
samueldmqhenrynash, I kind of noticed this when cleaning up older methods to compute assignments on assignment/core... will recheck17:31
samueldmqhenrynash, ++17:31
*** radez is now known as radez_g0n317:35
*** marg7175 has quit IRC17:36
*** marg7175 has joined #openstack-keystone17:37
*** afazekas has quit IRC17:37
openstackgerritRodrigo Duarte proposed openstack/keystone-specs: Recursive deletion and project disabling  https://review.openstack.org/14873017:37
samueldmqhenrynash, please take a look at http://paste.openstack.org/show/159844/17:39
samueldmqhenrynash, I listed the methods on assignment core that will need to simply call list_role_assignments in order to compute their results17:39
henrynashlooking17:40
samueldmqhenrynash, the ones that have no commentary in front of is because list_role_assignments can already return what they want17:40
samueldmqhenrynash, there are 2 more special cases we need to care about ther17:40
henrynashsamueldmq: ah, yes, of course list_projects_for_groups…..used by fedration, forgot about that one17:42
henrynashsamuledmq: nice17:42
samueldmqhenrynash, does federation issue tokens for groups?17:43
henrynashsamuledmq: so maybe prioritise the user/domain one….since we need it for metadata removal17:43
henrynashbe good to do this is too patches anyway17:43
openstackgerritSteve Martinelli proposed openstack/pycadf: Pull out some CADF taxonomy to be constants  https://review.openstack.org/14901117:44
samueldmqhenrynash, :-)17:44
*** jasondotstar has joined #openstack-keystone17:44
samueldmqhenrynash, since role assignments refactoring I already made has not changed the behavior of list_role_assignments17:44
samueldmqhenrynash, it should be correct ... these cases we're talking about were not covered, right?17:45
samueldmqhenrynash, should I address in a followon patch ?17:45
*** thedodd has quit IRC17:45
samueldmqhenrynash, just grabbed some coffee, waiting to agree how to attack this and I am able to start :)17:50
henrynashsamueldmq: true…so yes add a follow on patch17:50
*** avozza is now known as zz_avozza17:50
henrynashsamueldmq: then I’ll rebase my patch on that one17:50
samueldmqhenrynash, great! starting *right* now17:50
henrynashsamueldmq: fantastic17:50
samueldmqhenrynash, that shouldn't take me so long17:50
samueldmqhenrynash, I'll add the functionality and then I ping you for your rebase, after I can revisit tests17:51
samueldmqhenrynash, just to get your patch consistent asap17:51
henrynashsamueldmq: thx, appreciated17:51
*** thedodd has joined #openstack-keystone17:52
*** Drago has joined #openstack-keystone17:52
*** boris-42 has quit IRC17:53
samueldmqhenrynash, np ... regarding inherited flag, have you discussed about in midcycle?17:56
samueldmqhenrynash, inherited being True/False, etc17:56
*** jistr has quit IRC17:56
henrynashsamueldmq: ah, not really…I’ll try and see if we ahev time to raise that17:56
openstackgerritSteve Martinelli proposed openstack/pycadf: Add new CADF taxonomy types  https://review.openstack.org/14901317:57
samueldmqhenrynash, I think I found one problem on keeping only inherited flag as we do today17:58
*** thedodd has quit IRC17:58
henrynashsamueldmq: ok17:58
openstackgerritSteve Martinelli proposed openstack/pycadf: Add new CADF taxonomy types  https://review.openstack.org/14901317:59
*** atiwari has quit IRC17:59
*** thedodd has joined #openstack-keystone18:00
samueldmqhenrynash, if one get a proejct token with scope {inherited_to:projects}, he/she can't realize if that role assignment is *TO BE* inherited by that project's subtree or if that came from inheritance from some parent of that project18:00
samueldmqhenrynash, maybe we should have something like  scope {inherited_FROM:parent_id} for effective assignments, so that we can distinguish easily18:01
henrynashsamueldmq: you mean when processing the output of list_assignments ?18:02
samueldmqhenrynash, yep... because if you get a token with {inherited_to:projects} you can't realize what that flag means ..18:03
samueldmqhenrynash, you'll only know that if you look at links:assignment and compare the project_id there with scope:project:id18:04
samueldmqhenrynash, did you get my point?18:04
henrynashsamueldmq: so surely it depends if you are looking at effective or not…18:04
henrynashsamuledmq: not quire18:04
*** _cjones_ has quit IRC18:04
samueldmqhenrynash, ok, an example18:04
raildohenrynash, do you have some time to discuss this topol's comments here? https://review.openstack.org/#/c/139824/17/specs/kilo/reseller.rst18:07
samueldmqhenrynash, have this assignment: {role:{id:123}, scope:{project:{id:**X**}, inherited_to:projects}, user{id:abc}, links{assignment:{/projects/**Y**/users/abc/roles/123}}}18:07
*** zzzeek has joined #openstack-keystone18:07
samueldmqhenrynash, how do you know if inherited_to:projects that mean if 1) this assignment was applied there to only affect its subtree18:08
samueldmqhenrynash, or 2) if it has came from inheritance18:08
henrynashsamueldmq: don’t you know becuase  of whther you asked for effective or not?18:08
samueldmqhenrynash, yes.. but do we always know if we've asked for effective? I was wondering if one could have a token and then be able to easily read it18:09
samueldmqhenrynash, if we had :  {role:{id:123}, scope:{project:{id:**X**}, INHERITED_FROM:**Y**}, user{id:abc}, links{assignment:{/projects/**Y**/users/abc/roles/123}}}18:09
samueldmqhenrynash, it should be able to distinguish each case ..18:10
henrynashsamueldmq: sure…that would clearer…but not suiqte convinved we ever don’t know if we are doing effective or not….let me mull on it for a bit18:10
samueldmqhenrynash, we can deduce if we compare project_id on scope and project_id on assignment link18:11
samueldmqhenrynash, ok18:11
*** _cjones_ has joined #openstack-keystone18:13
*** thedodd has quit IRC18:13
amakarovsamueldmq, hi! Please see my comment in https://review.openstack.org/#/c/141854/18:14
samueldmqamakarov, sure18:15
*** thedodd has joined #openstack-keystone18:16
samueldmqamakarov, done.. I think you just need to document the difference between notifications then ..18:17
samueldmqamakarov, so it will be easier to one understand what's going on :)18:18
samueldmqamakarov, thx18:18
amakarovsamueldmq, for me all this notification stuff is a mess :)18:18
samueldmqamakarov, if so that's just one more argument to you adding a comment there :D18:19
*** harlowja_away is now known as harlowja18:20
*** jasondotstar has quit IRC18:24
*** bknudson has quit IRC18:27
openstackgerritAlexander Makarov proposed openstack/keystone: Group role revocation invalidates all user tokens  https://review.openstack.org/14185418:28
amakarovsamueldmq, ^^18:28
*** boris-42 has joined #openstack-keystone18:28
openstackgerrithenry-nash proposed openstack/keystone: Remove manager-driver assignment metadata construct  https://review.openstack.org/14899518:29
*** thedodd has quit IRC18:31
samueldmqamakarov, great, thx18:31
samueldmqamakarov, +118:31
amakarovsamueldmq, :)18:32
*** stevemar has quit IRC18:33
*** henrynash has quit IRC18:34
*** jsavak has joined #openstack-keystone18:34
*** topol has quit IRC18:34
*** lhcheng_ has quit IRC18:34
*** thedodd has joined #openstack-keystone18:35
*** joesavak has quit IRC18:37
*** ayoung has quit IRC18:40
*** marg7175 has quit IRC18:46
openstackgerritMerged openstack/keystone: Refactor assignment manager/driver methods  https://review.openstack.org/14465018:59
*** dims__ has quit IRC19:00
openstackgerritMerged openstack/keystone: Correct comment about circular dependency  https://review.openstack.org/14485019:02
*** aix has quit IRC19:04
*** dims__ has joined #openstack-keystone19:18
*** dims__ has quit IRC19:23
*** carlosmarin has joined #openstack-keystone19:23
*** marg7175 has joined #openstack-keystone19:27
*** dims_ has joined #openstack-keystone19:34
*** thedodd has quit IRC19:34
*** dims_ has quit IRC19:37
*** dims__ has joined #openstack-keystone19:37
*** dims_ has joined #openstack-keystone19:40
openstackgerritAlexander Makarov proposed openstack/keystone: Assignment sql backend create_grant refactoring  https://review.openstack.org/14135219:42
*** dims___ has joined #openstack-keystone19:42
*** dims___ has quit IRC19:43
*** dims___ has joined #openstack-keystone19:43
*** dims__ has quit IRC19:43
openstackgerritAlexander Makarov proposed openstack/keystone: Assignment sql backend create_grant refactoring  https://review.openstack.org/14135219:44
*** dims_ has quit IRC19:46
*** fifieldt__ has joined #openstack-keystone19:53
samueldmqamakarov, just rebased ? ^19:54
amakarovsamueldmq, yes, it was a conflict19:54
*** _cjones_ has quit IRC19:55
*** fifieldt_ has quit IRC19:56
*** diegows has joined #openstack-keystone19:57
openstackgerritAlexander Makarov proposed openstack/keystone: Chain a trust with a role specified by name  https://review.openstack.org/14864219:58
*** thedodd has joined #openstack-keystone19:59
*** thedodd has quit IRC19:59
*** harlowja is now known as harlowja_away19:59
*** marg7175 has quit IRC20:00
*** _cjones_ has joined #openstack-keystone20:02
openstackgerritIan Cordasco proposed openstack/python-keystoneclient: Configure TCP Keep-Alive for certain Sessions  https://review.openstack.org/14770720:02
*** chrisshattuck has joined #openstack-keystone20:02
*** amakarov is now known as amakarov_away20:03
*** harlowja_away is now known as harlowja20:04
*** jasondotstar has joined #openstack-keystone20:04
*** marg7175 has joined #openstack-keystone20:06
*** jasondotstar has quit IRC20:09
*** vhoward has left #openstack-keystone20:13
*** marg7175 has quit IRC20:16
*** marg7175 has joined #openstack-keystone20:17
*** henrynash has joined #openstack-keystone20:20
*** ChanServ sets mode: +v henrynash20:20
samueldmqhenrynash, almost finished... just need to agree one thing20:21
henrynashsamueldmq: hi20:21
samueldmqhenrynash, will we expose effective + domain to controller ? (in which we just expand group membership)20:21
samueldmqhenrynash, or just use it internally ?20:22
henrynashsamueldmq: I think this is *meant* to be exposed via the existing API...20:22
samueldmqhenrynash, well... we cant do this with the existing api ..20:23
henrynashsamueldmq: don’t we support: GET20:25
henrynashGET /role_assignments?user.id={user_id}&scope.domain_id={domain_id}&effective20:26
samueldmqhenrynash, with actual implementation, default v3 filtering is applied to the resultant list (in wrapper v3)20:26
samueldmqhenrynash, using ?effective the resultant list has not domain assingment20:27
samueldmqhenrynash, so filtering by domain id returns nothing20:27
henrynashsamueldmq: are you taling abour what happens today or what youthink should happen?20:27
samueldmqhenrynash, what happens today20:27
samueldmqhenrynash, but we need to support that, as we talked earlier20:28
henrynashsamueldmq: so that maybe true…but I think it is meant to be supported…but is a bug!20:28
*** andreaf has quit IRC20:29
samueldmqhenrynash, ok so in order to support the two operations we defined earlier (http://paste.openstack.org/show/159844/)20:31
henrynashsamueldmq: so the api spec even has an example of domains being included in the response of an ?effective call…(although it isn’t actually a group role)20:31
samueldmqhenrynash, if effective + domain is specified, just expand group membership20:31
samueldmqhenrynash, if effective + group is specified, just expand inheritance20:31
samueldmqhenrynash, will look20:32
henrynashsamueldms: yes, to the firtst20:32
henrynashsamueldmq: if effective + group + project, you have to expand group and inheritance20:32
samueldmqhenrynash, yes20:33
henrynashsamueldmq: I think the current master code works for effective + domain20:35
henrynashsamueldmq: hmm, maybe not...20:37
*** jdennis has quit IRC20:37
*** nellysmitt has quit IRC20:37
samueldmqhenrynash, that's why I want to be exhaustive on combining filters for this api call20:37
samueldmqhenrynash, we need to test *everything* :)20:37
henrynashyep20:37
samueldmqhenrynash, did you take a look in my tests patch?20:38
*** nellysmitt has joined #openstack-keystone20:38
*** vhoward has joined #openstack-keystone20:39
henrynashstarted….will do more later20:39
samueldmqhenrynash, nice ... what I propose is:20:40
henrynashsamuledmq: …and actually I think the current code DOES support the domain-group expansion.....20:40
samueldmqhenrynash, I'll remove effective + group and effetive + domain from invalid options on (https://review.openstack.org/#/c/144703/)20:41
samueldmqhenrynash, current code = on master?20:41
henrynashif that’s true, then we need to fix this is the current patch…rather than a follow on…otherwise we are breaking existing functionalu20:41
henrynashI think so, we call: _build_user_assignment_equivalent_of_group(20:41
henrynashfor any non-inherited group assignments in effective mode20:42
samueldmqhenrynash, domain-group expansion for GET /role_assignments/user.id=<>&scope.project.id=<> ?20:42
henrynashblock of code starts at 866 in assignment/core20:43
samueldmqhenrynash, yes, we do support inheritance + group expansion, that's the current behavior20:43
samueldmqhenrynash, always expanding both group and inheritance20:43
henrynashwell no…..that’s a more complicated case...20:43
samueldmqhenrynash, what we cant is to expand just one of them20:43
henrynashGET /role_assignments?user.id={user_id}&scope.domain_id={domain_id}&effective20:43
*** andreaf has joined #openstack-keystone20:44
henrynashshould list me all the roles I have as a user on the domain, including any by virtue of group membership20:44
samueldmqhenrynash, so the rationally is: if a group_id is provided, dont expand group membership20:46
samueldmqhenrynash, if a domain id is provided, dont expand inheritance20:46
samueldmqhenrynash, am i right?20:46
henrynashsamueldmq: hmm, sure if that’s the way to think about it20:46
henrynashsamueldmq: the way to think about  it(not necessarily code it)  is that if effective mode is on…20:47
henrynash…then you conceptually expand ALL the roles assignments in the entire systems - but filter the results by whatever filter params are provide in the call….i,e, in this case and that result in matches for user_id on domain_id20:48
*** jdennis has joined #openstack-keystone20:49
henrynashi’m not sure effective and group can be supplied together….thinking about that…20:49
samueldmqif not, we could not supply effective + domain20:50
henrynashyes we can!20:50
henrynashthink about how I described it above20:50
henrynashyou conceptually expand ALL the roles assignments in the entire systems - but filter the results by whatever filter params are provide in the call….i,e, in this case and that result in matches for user_id on domain_id20:50
samueldmq expand ALL the roles assignments in the entire systems20:51
samueldmqif we do that, we expand inherited assignments right?20:51
henrynash(I said that’s not necesarily how you code it)20:51
samueldmqowww, but there are assignments on the domain that are not inherited20:51
henrynashyes20:51
henrynashyes, should still be in the answer20:52
samueldmqgreat! your mind still works well20:52
samueldmqmine got crazy with this functionality :D20:52
henrynash:-)20:52
samueldmq(this is the most complex functionality I've ever developed)20:52
samueldmqhaving fun with it20:52
henrynashgood !!20:53
samueldmqso effective + group does not make sense20:53
henrynashnot at the api level20:53
samueldmqexactly, but we can reuse the existing methods to do what federation needs (internally at assignemnt manager)20:54
henrynashi need to think about federation thought20:54
henrynashhmmm20:54
henrynashin effective mode you can only have user (optionally) and optionally one of domain or project20:55
henrynasheffective mode is the equivilent of building a token20:55
henrynash(and in fact that what the token code should eventually call)20:55
henrynashbut fedration migt have a subtle additional need20:56
henrynashit has a need to list all the groups that have a role on a particualr project or domain...20:57
samueldmqhenrynash, does federation generate tokens for groups ?20:57
henrynash…and if it is for a project, include any groups who have an inherited role onto this project20:58
* samueldmq needs to study and deeply understand federation to contribute to it as well20:58
henrynashso the part of fedration in question doesn’t actually do a keystone token gernation, but needs to generate a SAML assertion that includees all the groups for which teh user is a member and have a role on a given project20:59
henrynashhmmm…I need to think about this!!!!20:59
*** _cjones_ has quit IRC21:00
samueldmqhenrynash, yep, that should not be that hard to implement with the existing methods used by list_role_assignmtns21:03
samueldmqhenrynash, but isnt a behavior supported by list_role_assignments api :)21:03
raildohenrynash, i answered the question about name and id clashing here: https://review.openstack.org/#/c/139824/17/specs/kilo/reseller.rst21:04
henrynashsamueldmq: and maybe we leave it that way….and don’t try and shoe-horn it into list_assignments21:05
henrynashraildo: you answered muy issue?21:06
henrynashraildo: you saw my comment about the domain name in the domain specific config file name?21:06
henrynashsamueldmq: I mean, we don’t shoe-horn in the fedration requirement into list_assignment21:07
samueldmqhenrynash, ++21:09
samueldmqhenrynash, so I think we've agreed :)21:09
samueldmqhenrynash, nexts steps: 1) allow effective + domain in https://review.openstack.org/#/c/144703/21:10
henrynashsamueldmq: yep…although if the group expansion for domains is supported in today’s code, you need to add it to the your existing patch, rather than in a follow on patch…otherwise we are breaking current functionalty21:10
samueldmqhenrynash, add tests for that case in https://review.openstack.org/#/c/137021/21:10
samueldmqhenrynash, and fix my refactoring, if needed21:10
henrynashagreed21:10
samueldmqhenrynash, yes, keeping in mind it's a refactoring21:10
samueldmqhenrynash, got it21:10
*** marg7175 has quit IRC21:12
samueldmqhenrynash, got to go .... will work on this and ping you since this is done21:14
henrynashsamueldmq: one other minor point…in assignment/core….all the support methods for list_assignment, e.g. _create_expanded_assignment() etc…..is there a reason those methods are not local to list_assignment()21:14
samueldmqhenrynash, if you guys have no more time to discuss about hte role inheritance api changes, we can do it in the meeting next week21:14
henrynashsamueldmq: I think we lost a quorum for that, sadly21:14
*** zz_avozza is now known as avozza21:15
samueldmqhenrynash, well, scoping them to list_assignments() is good, but it should have an impact on performance (I dont know how much)21:15
samueldmqhenrynash, since python evaluates inner functions each time outer function is called21:16
samueldmqhenrynash, I meant, creates the function object (or something similar)21:16
henrynashsamueldmq: for me, it’s just more of a conceptual scope thing…leaving them outside hints that we expect to call them from somewhere else…which I don’t think we do...21:16
samueldmqhenrynash, no we dont... maybe in the federation methdo list_projects_for_groups ...21:17
samueldmqhenrynash, as we were discussing ..21:17
henrynashI don’t think we will need them for that....21:17
*** marg7175 has joined #openstack-keystone21:18
samueldmqmaybe not, since federation stuff doesnt even need the response formatted by the controller21:18
samueldmqhenrynash, ok I agree, will scope them to role_assignments, will be clearer21:19
henrynashagreed21:19
samueldmqhenrynash, sorry, need to go home now .. will be back in about an hour21:20
henrynashno problem!21:20
*** samueldmq is now known as samueldmq-away21:20
henrynashmayeb sepak later21:20
samueldmq-awaysure21:20
*** _cjones_ has joined #openstack-keystone21:31
*** _cjones_ has quit IRC21:31
*** _cjones_ has joined #openstack-keystone21:31
*** drjones has joined #openstack-keystone21:35
*** _cjones_ has quit IRC21:35
*** samueldmq has joined #openstack-keystone21:35
*** drjones has quit IRC21:37
*** _cjones_ has joined #openstack-keystone21:37
*** drjones has joined #openstack-keystone21:40
*** _cjones_ has quit IRC21:40
*** _cjones_ has joined #openstack-keystone21:42
*** drjones has quit IRC21:43
*** _cjones_ has quit IRC21:44
*** _cjones_ has joined #openstack-keystone21:44
*** david-lyle has joined #openstack-keystone21:46
*** lhcheng has joined #openstack-keystone22:00
*** sriram has quit IRC22:02
*** chlong has quit IRC22:05
*** henrynash has quit IRC22:07
*** nellysmitt has quit IRC22:08
*** lhcheng_ has joined #openstack-keystone22:09
*** nellysmitt has joined #openstack-keystone22:09
*** nellysmitt has quit IRC22:09
*** david-lyle has quit IRC22:11
*** david-lyle has joined #openstack-keystone22:11
*** lhcheng has quit IRC22:12
*** jsavak has quit IRC22:13
*** _cjones_ has quit IRC22:14
*** _cjones_ has joined #openstack-keystone22:14
*** radez_g0n3 is now known as radez22:14
*** david-lyle has quit IRC22:15
*** lhcheng_ is now known as lhcheng22:16
*** drjones has joined #openstack-keystone22:16
*** _cjones_ has quit IRC22:16
*** drjones has quit IRC22:21
*** mattfarina has quit IRC22:24
*** _cjones_ has joined #openstack-keystone22:28
openstackgerritMorgan Fainberg proposed openstack/keystone: DO NOT MERGE: StrictABC Prototype  https://review.openstack.org/14835422:31
*** tellesnobrega_ has joined #openstack-keystone22:32
*** _cjones_ has quit IRC22:32
*** _cjones_ has joined #openstack-keystone22:32
openstackgerritMorgan Fainberg proposed openstack/keystone: DO NOT MERGE: StrictABC Prototype  https://review.openstack.org/14835422:34
*** jaosorior has quit IRC22:34
openstackgerritMorgan Fainberg proposed openstack/keystone: DO NOT MERGE: StrictABC Prototype  https://review.openstack.org/14835422:36
*** _cjones_ has quit IRC22:37
*** _cjones_ has joined #openstack-keystone22:38
openstackgerritguang-yee proposed openstack/keystone-specs: Tokenless authorization with X.509 SSL client certificate  https://review.openstack.org/10591322:39
morganfainbergdstanek, i feel almost dirty (first stab at testing, published without being run): https://review.openstack.org/#/c/14835422:39
*** ljfisher has quit IRC22:40
dstanekmorganfainberg: clever way to get around the import problem22:40
morganfainberg:)22:40
dstanekmorganfainberg: are you in the air or at the airport?22:41
morganfainbergairport22:41
*** drjones has joined #openstack-keystone22:41
*** tellesnobrega_ has quit IRC22:41
*** _cjones_ has quit IRC22:42
morganfainbergdstanek, i realize i need one more layer for the subclass tests22:42
morganfainbergright now they test the exact same thing as the other two tests just with redefinition of the methods22:42
*** henrynash has joined #openstack-keystone22:43
*** ChanServ sets mode: +v henrynash22:43
morganfainbergbut easy to add in.22:43
morganfainbergdstanek, this will fail / should fail at import time if the method signatures are a mismatch22:43
*** drjones has quit IRC22:44
*** _cjones_ has joined #openstack-keystone22:45
dstanekmorganfainberg: i do like this idea22:45
*** dims___ has quit IRC22:46
*** samueldmq has joined #openstack-keystone22:47
*** henrynash has quit IRC22:48
openstackgerritMorgan Fainberg proposed openstack/keystone: DO NOT MERGE: StrictABC Prototype  https://review.openstack.org/14835422:48
morganfainbergdstanek, ok there we go, that should actually test things provided tests actually work. will run them once i get settled in and have a VM running22:48
*** tellesnobrega_ has joined #openstack-keystone22:49
*** _cjones_ has quit IRC22:50
*** _cjones_ has joined #openstack-keystone22:53
*** henrynash has joined #openstack-keystone22:54
*** ChanServ sets mode: +v henrynash22:54
openstackgerritMarek Denis proposed openstack/keystone-specs: Allow for direct mapping in federated authN.  https://review.openstack.org/14907122:56
*** david-lyle has joined #openstack-keystone22:58
*** tellesnobrega_ has quit IRC23:00
*** diegows has quit IRC23:07
*** david-lyle has quit IRC23:09
*** _cjones_ has quit IRC23:16
*** _cjones_ has joined #openstack-keystone23:24
*** carlosmarin has quit IRC23:25
*** _cjones_ has quit IRC23:26
*** drjones has joined #openstack-keystone23:26
*** jamielennox|away is now known as jamielennox23:27
*** henrynash has quit IRC23:28
*** _cjones_ has joined #openstack-keystone23:29
*** drjones has quit IRC23:31
*** _cjones_ has quit IRC23:31
*** _cjones_ has joined #openstack-keystone23:32
*** henrynash has joined #openstack-keystone23:33
*** ChanServ sets mode: +v henrynash23:33
*** chlong has joined #openstack-keystone23:33
*** drjones has joined #openstack-keystone23:35
*** _cjones_ has quit IRC23:36
*** chrisshattuck has quit IRC23:38
*** _cjones_ has joined #openstack-keystone23:38
*** drjones has quit IRC23:38
*** drjones has joined #openstack-keystone23:41
*** _cjones_ has quit IRC23:41
*** gothicmindfood has quit IRC23:42
*** drjones has quit IRC23:43
*** _cjones_ has joined #openstack-keystone23:44
*** gothicmindfood has joined #openstack-keystone23:45
*** drjones has joined #openstack-keystone23:46
*** dims__ has joined #openstack-keystone23:46
*** _cjones_ has quit IRC23:46
*** drjones has quit IRC23:48
*** _cjones_ has joined #openstack-keystone23:48
*** _cjones_ has quit IRC23:50
*** _cjones_ has joined #openstack-keystone23:50
*** oomichi_ has joined #openstack-keystone23:50
*** dims__ has quit IRC23:52
*** drjones has joined #openstack-keystone23:55
*** _cjones_ has quit IRC23:55
*** lhcheng has quit IRC23:56
*** _cjones_ has joined #openstack-keystone23:58
*** drjones has quit IRC23:58

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!