Thursday, 2015-03-12

openstackgerrithenry-nash proposed openstack/keystone: Support upload domain config files to database  https://review.openstack.org/16036400:02
openstackgerrithenry-nash proposed openstack/keystone: Mark the domain config API as experimental  https://review.openstack.org/16003200:06
openstackgerrithenry-nash proposed openstack/keystone: Support upload domain config files to database  https://review.openstack.org/16036400:07
*** joesavak has quit IRC00:07
*** boris-42 has joined #openstack-keystone00:15
openstackgerrithenry-nash proposed openstack/keystone: Reload drivers when their domain config is updated  https://review.openstack.org/16332200:15
openstackgerritBrant Knudson proposed openstack/keystone: Sync oslo-incubator to f2cfbba  https://review.openstack.org/16365300:19
openstackgerritMerged openstack/keystone: Fix typo in name of variable in resource router  https://review.openstack.org/16280800:20
samueldmqhenrynash, hi - I am available to talk about 'Enable sensitive substitutions into whitelisted domain configs' if you have some time00:21
*** arunkant has quit IRC00:21
samueldmqhenrynash, or maybe tomorrow :)00:23
henrynashhi…sorry…about to hit the sack….I added a comment to the review00:23
openstackgerritBrant Knudson proposed openstack/keystone: Update sample config file.  https://review.openstack.org/16365400:24
*** henrynash has quit IRC00:29
*** gyee has quit IRC00:31
*** spandhe has joined #openstack-keystone00:31
*** spandhe_ has joined #openstack-keystone00:34
*** spandhe has quit IRC00:35
*** spandhe_ is now known as spandhe00:35
*** vishy has quit IRC00:41
*** vishy has joined #openstack-keystone00:42
*** zzzeek has quit IRC00:44
*** csoukup has quit IRC00:47
stevemarlhcheng, thanks so much for the chat :)00:50
openstackgerritBrant Knudson proposed openstack/keystone: Fix deprecated group for eventlet_server options  https://review.openstack.org/16365800:51
jamielennoxstevemar: does https://review.openstack.org/#/c/153910/ solve a need for the horizon websso thing?00:51
lhchengstevemar: np, thanks for all the help in setting it up!00:51
jamielennoxi feel like it did, but i'm not sure how to answer that last comment00:51
stevemarjamielennox, it all depends on if you provide a tokenAuth piece00:54
*** chlong has quit IRC00:55
stevemarjamielennox, yeah, i think we depend on token auth00:55
*** chlong has joined #openstack-keystone00:55
stevemarso it doesn't help just yet00:55
stevemarthis is what we're doing for the sso bits https://review.openstack.org/#/c/136178/16/openstack_auth/backend.py00:55
jamielennoxright, so i was thinking in the pluggable method you would just need to add a handler that did the backend bit00:56
jamielennoxso the block at line 80 is easy to replace with a plugin00:56
jamielennoxthe block at line 118 is a problem00:56
jamielennoxdidn't we fix that?00:56
*** _cjones_ has quit IRC01:02
*** rwsu is now known as rwsu-afk01:04
*** gokrokve has quit IRC01:15
*** sigmavirus24 is now known as sigmavirus24_awa01:19
dstanekgoing to start doing some more reviews again tonight...any special requests?01:23
dstanekotherwise i'm going down the list of blockers01:23
*** topol has joined #openstack-keystone01:24
*** ChanServ sets mode: +v topol01:25
*** markvoelker has quit IRC01:27
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/16235001:27
rodrigodsdstanek, https://review.openstack.org/#/c/159944/ o/01:27
rodrigods:)01:27
*** markvoelker has joined #openstack-keystone01:27
dstanekrodrigods: k01:30
rodrigodsdstanek, thanks01:30
*** markvoelker has quit IRC01:32
*** ayoung has joined #openstack-keystone01:35
*** ChanServ sets mode: +v ayoung01:35
*** wwriverrat has left #openstack-keystone01:44
openstackgerritEric Brown proposed openstack/keystonemiddleware: Use oslo_config choices support  https://review.openstack.org/16003101:48
openstackgerritEric Brown proposed openstack/keystonemiddleware: Use oslo_config choices support  https://review.openstack.org/16003101:49
*** dims_ has quit IRC01:53
*** tqtran_ has quit IRC02:06
*** lhcheng has quit IRC02:12
morganfainbergstevemar, was https://bugs.launchpad.net/keystone/+bug/1428946 addressed by the cadf fixes?02:20
openstackLaunchpad bug 1428946 in Keystone "add keystone service id to observer audit" [Undecided,New]02:20
stevemarmorganfainberg, right - i was going to ask you about that just now02:20
stevemarwe can tell say that if they want info about user_id and project_id, then use cadf02:21
stevemarhowever, it's in the payload, *not* the context02:21
morganfainbergsurrre02:21
morganfainbergthat one isn't the context one02:21
morganfainbergi closed the context one02:22
morganfainbergthat one is the observer audit?02:22
morganfainbergservice_id that is02:22
morganfainberg?02:22
stevemaruser id == initiator id02:22
stevemarproject_id == initiator.project_id02:22
morganfainberg"observer": {02:22
morganfainberg            "typeURI": "service/security",02:22
morganfainberg            "id": "openstack:3d4a50a9-2b59-438b-bf19-c231f9c7625a"02:22
morganfainberg        },02:22
stevemarthe 'observer' is keystone02:22
morganfainbergfrom the bug: The ID field should be the ID of the keystone/identity service.02:22
morganfainbergoh you filed it02:23
morganfainberghaha02:23
morganfainberggod.02:23
stevemaryes i did :)02:23
morganfainbergbraindead02:23
* morganfainberg needs food.02:23
stevemari wasn't sure about how to get the keystone service Id02:23
morganfainbergoh02:23
morganfainberguh02:23
morganfainberguhhhhhh02:23
stevemarit's in the backends, but then i'd need access to the manager02:23
stevemarand thats uh... not as pretty if not accessing from a class02:23
morganfainbergwell i think it02:23
*** samueldmq has quit IRC02:24
morganfainbergs fair that keystone knows itself somehow02:24
morganfainbergit doesn't need to be found in the notification code, it could be found somewhere else02:24
*** richm has quit IRC02:24
*** _cjones_ has joined #openstack-keystone02:24
morganfainbergand notification code could just reference it02:24
stevemartrue02:24
morganfainbergthats the route i'd take02:24
morganfainbergsomewhere where we can access it and propagate it to something usable by notifications02:25
morganfainbergok i need to get food before it's too late here02:26
stevemargo go02:26
morganfainbergand i need to check out... i'm a bit fried.02:26
stevemarcheck out away sir02:26
stevemargit checkout -b morgan02:26
*** erkules_ has joined #openstack-keystone02:28
*** erkules has quit IRC02:31
openstackgerritDolph Mathews proposed openstack/keystone: Replace the expiration timestamp in Fernet tokens with a ttl  https://review.openstack.org/16368302:40
*** david-lyle is now known as david-lyle_afk02:45
*** rushiagr_away is now known as rushiagr02:52
*** dims_ has joined #openstack-keystone02:54
*** gokrokve has joined #openstack-keystone02:54
*** rushiagr is now known as rushiagr_away02:54
*** rushiagr_away is now known as rushiagr02:55
*** samueldmq has joined #openstack-keystone02:55
*** dims_ has quit IRC02:59
*** lhcheng has joined #openstack-keystone03:11
*** rushiagr is now known as rushiagr_away03:12
*** drjones has joined #openstack-keystone03:13
openstackgerritMerged openstack/keystone: Fix deprecated group for eventlet_server options  https://review.openstack.org/16365803:14
*** _cjones_ has quit IRC03:16
*** radez_g0n3 is now known as radez03:22
openstackgerritSteve Martinelli proposed openstack/pycadf: Add a section for audit maps  https://review.openstack.org/16242903:36
*** samueldmq has quit IRC03:37
openstackgerritDolph Mathews proposed openstack/keystone: Remove redundant creation timestamp from fernet tokens  https://review.openstack.org/16189703:44
*** lhcheng has quit IRC03:47
stevemarayoung, up for a few reviews :)03:48
*** rushiagr_away is now known as rushiagr03:53
openstackgerritLance Bragstad proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360103:54
openstackgerritJorge Munoz proposed openstack/keystone: Implement Fernet tokens for v2.0 tokens  https://review.openstack.org/15922903:55
*** drjones has quit IRC03:59
*** gokrokve_ has joined #openstack-keystone04:18
*** gokrokve has quit IRC04:21
*** radez is now known as radez_g0n304:21
*** gokrokve_ has quit IRC04:22
*** devlaps has quit IRC04:25
nkinderjamielennox: you around?04:36
jamielennoxnkinder: yep04:37
nkinderjamielennox: This looks like a bug - http://git.openstack.org/cgit/openstack/python-keystoneclient/tree/keystoneclient/_discover.py#n8404:37
nkindernotice how num is never used unless we hit an exception?04:37
nkinderjamielennox: I think this is causing auth_version = v3 to not work04:37
nkinderjamielennox: that nova auth thing we worked on last week would work if you set 'auth_version = v3.0', but not plain 'v3'04:38
jamielennoxnkinder: off the top of my head i think that works fine04:38
jamielennoxbecause the output of that try/except should have version as a str04:38
jamielennoxalthough i guess it's wrong because float("1.2") would work04:39
nkinderjamielennox: but it ends up returning at http://git.openstack.org/cgit/openstack/python-keystoneclient/tree/keystoneclient/_discover.py#n9304:39
nkinderand it returns (3,)04:40
nkinderI think we want it to return (3,0)04:40
jamielennoxi think we want (3, 0) as well04:40
nkinderjamielennox: I think if 'num = float(version)' succeeds, we want to 'version = num'04:41
nkinderof just 'version = float(version)' in the try block04:41
jamielennoxnkinder: but we want to version.split('.') in the next part04:42
nkinderyeah, we need to convert it to a string04:42
jamielennoxi get str(float("3")) == "3.0"04:42
nkinderyeah, version = str(float(version))04:43
nkinderthen the split line will end up making it (3, 0)04:44
nkinderright now, we do nothing with the result of float()04:45
jamielennox?04:45
jamielennoxif the float call works the else will run04:46
jamielennoxso it'll convert it back to a string04:46
jamielennoxwas a cheap way of making "3" -> "3.0"04:46
jamielennoxso in my checkout04:46
jamielennoxIn [3]: d.normalize_version_number('v3')04:46
jamielennoxOut[3]: (3, 0)04:46
*** lhcheng has joined #openstack-keystone04:48
nkinderjamielennox: ah, right.  I was looking at it wrong.04:49
nkinderjamielennox: I'm not sure why "v3" doesn't work for that nova issue though.04:49
nkinderjamielennox: but "v3.0" does04:49
jamielennoxthere did used to be a hardcoded check in auth_token04:50
jamielennoxhttps://github.com/openstack/keystonemiddleware/blob/1.0.0/keystonemiddleware/auth_token.py#L109704:50
nkinderjamielennox: ah, yeah.  That looks like the culprit.04:51
nkinderjamielennox: I don't have my environment up right now, but I bet that's it.04:51
jamielennoxyea, its a proper string compare so you have to have it right04:52
jamielennoxit's gone now, but not that long ago04:52
*** lhcheng has quit IRC04:52
nkinderjamielennox: yeah, I think it's still in RDO Juno04:52
openstackgerritDolph Mathews proposed openstack/keystone: Drop Fernet token prefixes & add domain-scoped Fernet tokens  https://review.openstack.org/16203104:54
nkinderjamielennox: https://bugs.launchpad.net/keystonemiddleware/+bug/138385304:55
openstackLaunchpad bug 1383853 in keystonemiddleware "auth_token middleware hard coded to check for version 3.0" [Medium,Fix released] - Assigned to wanghong (w-wanghong)04:55
jamielennoxwow - more recent than i though04:56
*** gokrokve has joined #openstack-keystone04:58
nkinderjamielennox: thanks for setting me straight on that04:58
nkinderjamielennox: I'm off to bed.  Talk to you tomorrow.04:58
jamielennoxnkinder: inght04:58
openstackgerritDolph Mathews proposed openstack/keystone: Convert audit_ids to bytes  https://review.openstack.org/16099305:01
*** gokrokve_ has joined #openstack-keystone05:04
*** david-ly_ has joined #openstack-keystone05:04
*** telemons1er has joined #openstack-keystone05:07
*** mestery_ has joined #openstack-keystone05:07
*** mestery has quit IRC05:08
morganfainbergdolphm, https://review.openstack.org/#/c/161897/ i think this still has a hold-over on TTL/expires_at not being in the token. and there is an import issue with the test file (datetime was still used). otherwise this looks pretty good.05:09
*** david-lyle_afk has quit IRC05:09
*** telemonster has quit IRC05:09
*** gokrokve has quit IRC05:09
*** BAKfr has quit IRC05:09
dolphmmorganfainberg: bah, alright05:09
morganfainbergdolphm, seriously lgtm except the minor issues.05:10
dolphmmorganfainberg: i'm almost out of rebase hell - i'll finish the sequence and go back for that :)05:10
morganfainbergdolphm, ++ sounds good.05:10
openstackgerritDolph Mathews proposed openstack/keystone: Refactor: make Fernet token creation/validation API agnostic  https://review.openstack.org/16233805:12
*** BAKfr has joined #openstack-keystone05:13
dolphmmorganfainberg: i was using deprecated config for vim-flake8 earlier today, and only recently it was giving me a deprecation warning about my config INSTEAD of reporting on any violations. hence the pep8 violation slipping in...05:13
morganfainbergthe pep8 violation is the same as the test violation though :P05:14
*** rushiagr is now known as rushiagr_away05:14
morganfainbergmissing import05:14
morganfainbergi mean sure...05:14
morganfainbergsame net effect though :)05:14
openstackgerritDolph Mathews proposed openstack/keystone: Remove redundant creation timestamp from fernet tokens  https://review.openstack.org/16189705:15
openstackgerritDolph Mathews proposed openstack/keystone: Drop Fernet token prefixes & add domain-scoped Fernet tokens  https://review.openstack.org/16203105:17
openstackgerritDolph Mathews proposed openstack/keystone: Refactor: make Fernet token creation/validation API agnostic  https://review.openstack.org/16233805:18
openstackgerritDolph Mathews proposed openstack/keystone: Convert audit_ids to bytes  https://review.openstack.org/16099305:18
stevemarmorganfainberg, let me know if you/gyee/hp find this patch useful: https://review.openstack.org/#/c/162866/05:19
stevemari don't want to spend any more time on it if it's not going to be used :P05:20
morganfainbergstevemar, my only question is would it break anyone today05:20
morganfainbergif it would break someone, we can't do that.05:20
stevemarmorganfainberg, no, and its k2k specific which was experimental05:20
morganfainbergis there any case making this assumption would be terminally bad05:21
morganfainberg?05:21
morganfainberge.g. WebSSO [with browsers involved] future looking05:21
morganfainbergif the answer is no there too, we could potentially add it. (though i'd like to see jamielennox and marekd's opinion on it)05:22
stevemarsure05:22
jamielennoxhmm?05:22
morganfainbergstevemar, but if the answer is "wont break anyone, isn't a bad idea, and jamielennox and marekd say 'cool'" i think it's worth it.05:22
morganfainbergi can see a benefit to making the response a client needs to consume less onerous05:23
stevemarmorganfainberg, it's basically, instead of 'give me a saml assertion' we the ability to say 'give me a saml assertion that wrapped in SOAP, so i can hand it off to my ecp client'05:24
stevemarmorganfainberg, but i get what you're saying!05:24
openstackgerritDolph Mathews proposed openstack/keystone: Federated token formatter  https://review.openstack.org/16138005:24
stevemarif marek thinks it's useful then he's my prime concern05:24
*** markvoelker has joined #openstack-keystone05:25
stevemari'm just referring to rodrigods blog: http://blog.rodrigods.com/playing-with-keystone-to-keystone-federation/ he had to make a 'transform_assertion_into_ecp' function05:25
*** markvoelker has quit IRC05:30
*** topol has quit IRC05:30
stevemarmorganfainberg, oh... can you do a quick once over on: https://review.openstack.org/#/c/152018/05:33
morganfainbergstevemar mayyyybew05:33
stevemaryou +2'ed the previous ps05:34
stevemarand it's got the brant blessing05:34
stevemarif thats not the ingredients for +3, then i dunno what is?!05:34
morganfainbergstevemar, so https://review.openstack.org/#/c/161897/ should be a relatively easy review.05:35
morganfainbergstevemar, way simpler than the previous (ones) for fernet05:35
*** DaveChen has quit IRC05:35
*** davechen has joined #openstack-keystone05:35
stevemaralright, i'll trade you for https://review.openstack.org/#/c/159045/05:36
morganfainbergeiuuuuww cadf05:36
* morganfainberg will get the context manager notifier working one of these days...05:37
stevemarmorganfainberg, i dunno what you're smokin but that one isn't easy so far05:37
stevemar!05:37
morganfainbergstevemar, the fernet one? yeah it is:P05:37
morganfainbergstevemar, it's doing some date manipulation and removing created_at from the payload05:38
stevemarwhat's struct.unpack(">Q", timestamp_bytes)[0]05:38
morganfainbergQ unsigned long, < little endian05:39
morganfainbergerm > big endian05:39
morganfainbergso >Q is big endian unsigned long05:39
morganfainbergsorry unsigned long long05:39
morganfainberghttps://docs.python.org/2/library/struct.html05:39
stevemari see examples in lots of bitcoin code https://github.com/jgarzik/python-bitcoinlib/blob/master/bitcoin/messages.py05:40
stevemardolphm, is trying to steal all my bitcoins05:40
*** harlowja_ is now known as harlowja_away05:41
morganfainbergstevemar, hah05:41
openstackgerritDolph Mathews proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360105:43
stevemarmorganfainberg, it wasn't so bad :)05:44
morganfainbergnah05:44
stevemarmorganfainberg, is getting fernet tokens to work for v2 a hard requirement?05:46
morganfainbergstevemar, yes.05:46
morganfainbergstevemar, fernet token SPFE was granted on the condition that the tokens matched all current use-cases of tokens (uuid/pki[z])05:47
stevemargotcha05:47
stevemargood luck dolphm lbragstad05:47
morganfainbergthey really aren't far off05:48
morganfainbergall the patches up until the v2 one should be near ready to gate05:48
morganfainbergthe v2 one should be able to go in tomorrow / friday [i hope]05:48
morganfainbergthat and henry's last ~2 for domain sql are the priorities05:48
morganfainbergi'm going to break apart the utf8 thing tomorrow so we can land whitelist/blacklist [that can easily FFE]05:49
morganfainbergs/whitelist\/blacklist/idp registration05:49
morganfainbergand whitelist/blacklist will be easier to land now that dstanek did a pass on it05:49
stevemaryeah, that was some slick work05:50
morganfainbergthis one could go, lance's -1 was just because it needed a rebase05:50
*** browne1 has quit IRC05:56
*** rushiagr_away is now known as rushiagr05:58
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/16370506:02
openstackgerritDolph Mathews proposed openstack/keystone: Drop Fernet token prefixes & add domain-scoped Fernet tokens  https://review.openstack.org/16203106:08
*** bknudson has quit IRC06:10
openstackgerritDolph Mathews proposed openstack/keystone: Convert audit_ids to bytes  https://review.openstack.org/16099306:11
openstackgerritDolph Mathews proposed openstack/keystone: Refactor: make Fernet token creation/validation API agnostic  https://review.openstack.org/16233806:11
openstackgerritDolph Mathews proposed openstack/keystone: Federated token formatter  https://review.openstack.org/16138006:11
openstackgerritDolph Mathews proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360106:13
*** spandhe has quit IRC06:18
*** gokrokve has joined #openstack-keystone06:20
openstackgerritMerged openstack/keystone: Add documentation for key terms and basic authenticating  https://review.openstack.org/15201806:22
*** gokrokve_ has quit IRC06:23
*** lhcheng has joined #openstack-keystone06:25
*** afazekas is now known as __afazekas06:25
*** markvoelker has joined #openstack-keystone06:26
*** markvoelker has quit IRC06:32
*** dims_ has joined #openstack-keystone06:32
*** dims_ has quit IRC06:38
openstackgerritSteve Martinelli proposed openstack/keystone: Add API to create ecp wrapped saml assertion  https://review.openstack.org/16286606:53
stevemarmarekd, awake?06:55
marekdstevemar: yes, reading the logs from the night06:56
marekd(IRC logs)06:56
marekdstevemar: https://review.openstack.org/#/c/162866/ i don't have any objections against this. If we need a pure saml assertion we can always add ?noecp flag06:57
marekdmorganfainberg: ^^06:57
stevemarmarekd, i was leaving it open-ended06:57
stevemarif you think it'll help adoption then i am not against it either06:58
stevemari can't seem to figure out the <generatedkey> tag though06:58
marekdstevemar: where?06:58
marekdstevemar: hehe, OpenStack will make ECP a real standard on top of SAML, not a super unpopular extension :P06:59
stevemarmarekd,  the bug has it: <samlec:GeneratedKey> https://bugs.launchpad.net/keystone/+bug/142612806:59
openstackLaunchpad bug 1426128 in Keystone "Add ECP related bits to saml generation code" [Undecided,In progress] - Assigned to Steve Martinelli (stevemar)06:59
marekdstevemar: ah, you are asking where this key value comes from?07:00
stevemaryeah, and i don't think pysaml2 has support for it either :)07:00
stevemarso i don't have those bits in the patch yet: https://review.openstack.org/#/c/162866/3/keystone/contrib/federation/idp.py07:00
marekdstevemar: i don't know now.07:00
stevemari'm wondering how it ever worked for other people who i sent rodrigods example for? i would think they copy/pasted07:01
marekdvery likely07:01
marekdnoone wants to read and understand xml headers07:01
stevemarmarekd, i wanted to ask about https://review.openstack.org/#/c/162547/07:02
stevemaras it's my last bug to fix :)07:02
stevemarand there is a +A'ed change that depends on it, ehehe07:03
marekdstevemar: yeah, so my question was whether you really want to somewhere later check if you have project_id attribute07:03
marekdnot assign it always and sometimes put None value07:04
marekdbut as long you say this is fine i am fine too :-)07:04
stevemarmarekd, how would i sometimes add it if it has None value?07:05
stevemarohhh07:05
marekdproject_id can be None because of line 407 for instance,07:05
stevemarright rihgt07:05
marekdif you always call initialtor.project_id = project_id07:05
marekdthen you will always add an attribute project_id07:06
stevemaryou're asking why i only *sometimes* do it07:06
marekdyou are doin it when project_id is not None07:06
stevemarright07:06
stevemarwhich is what i want07:06
stevemarif it's None then I don't want to report it07:06
stevemarkeep it as it was before07:07
marekdaaaah, cause it would be used for reports.07:07
marekdok, so i get it now.07:07
stevemaryep07:07
marekdvoted :-)07:07
stevemar\o/07:07
marekdnow you can rest07:07
openstackgerritMerged openstack/keystone: Remove redundant creation timestamp from fernet tokens  https://review.openstack.org/16189707:07
stevemaroh my07:08
stevemarit is 3am07:08
stevemari should sleep07:08
marekdstevemar: i am grepping this: https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/contrib/auth/v3/saml2.py and GeneratedKey doesn't seem to occur.07:08
marekd3 or 2 am?07:08
stevemar3 now, we did our silly daylight savings time thing last week07:09
marekdoooh07:09
stevemarwhich is why the last keystone meeting was funny07:10
marekdsadly, i had to skip it07:10
stevemartopol and i showed up early07:10
marekdand the rest?07:12
stevemarthe rest showed up on time and laughed at us07:15
stevemarmarekd, alright tomorrow i'm reviewing fernet patches and revisiting my ksc patches!07:17
stevemaroh and maybe sso docs07:17
stevemarlhcheng and i had some fun redoing the sso setup :)07:17
stevemarmarekd, see you in < 8 hrs!07:17
marekdFernet was a long chain last week, at some point i got lost what was where :-)07:17
marekdstevemar: redoing setup?07:17
*** _cjones_ has joined #openstack-keystone07:19
*** _cjones_ has quit IRC07:21
*** stevemar has quit IRC07:22
*** markvoelker has joined #openstack-keystone07:28
*** markvoelker has quit IRC07:33
*** leonchio_ has quit IRC07:38
*** david8hu has quit IRC07:39
*** david8hu has joined #openstack-keystone07:39
*** leonchio__ has joined #openstack-keystone07:39
*** sluo_wfh has joined #openstack-keystone07:42
openstackgerritMarek Denis proposed openstack/keystone: Abstract the direct map concept into an object  https://review.openstack.org/16356907:51
openstackgerritMarek Denis proposed openstack/keystone: Implements whitelist and blacklist mapping rules  https://review.openstack.org/16357007:52
*** sluo_wfh has quit IRC07:53
*** david8hu has quit IRC08:00
*** leonchio__ has quit IRC08:00
*** leonchio__ has joined #openstack-keystone08:00
*** david8hu has joined #openstack-keystone08:00
*** jistr has joined #openstack-keystone08:03
*** afazekas_ has joined #openstack-keystone08:06
openstackgerritMerged openstack/keystone: Add scope info to initiator data for CADF notifications  https://review.openstack.org/16254708:07
openstackgerritMerged openstack/keystone: add cadf notifications for oauth  https://review.openstack.org/15904508:07
*** rushiagr is now known as rushiagr_away08:11
*** gokrokve has quit IRC08:14
*** gokrokve has joined #openstack-keystone08:14
*** sluo_wfh has joined #openstack-keystone08:18
*** gokrokve has quit IRC08:19
*** henrynash has joined #openstack-keystone08:28
*** ChanServ sets mode: +v henrynash08:28
*** markvoelker has joined #openstack-keystone08:29
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Federation Service Providers CRUD operations  https://review.openstack.org/15901808:31
*** markvoelker has quit IRC08:34
*** erkules_ is now known as erkules08:40
*** erkules has quit IRC08:40
*** erkules has joined #openstack-keystone08:40
*** amakarov_away is now known as amakarov08:40
*** gokrokve has joined #openstack-keystone08:45
openstackgerrithenry-nash proposed openstack/keystone: Enable sensitive substitutions into whitelisted domain configs  https://review.openstack.org/15992808:49
openstackgerrithenry-nash proposed openstack/keystone: Enable sensitive substitutions into whitelisted domain configs  https://review.openstack.org/15992808:50
*** gokrokve has quit IRC08:50
*** pnavarro has joined #openstack-keystone08:51
*** henrynash has quit IRC08:58
*** nellysmitt has joined #openstack-keystone09:02
*** pnavarro is now known as pnavarro|off09:07
*** gokrokve has joined #openstack-keystone09:14
*** gokrokve has quit IRC09:15
*** gokrokve has joined #openstack-keystone09:16
*** gokrokve has quit IRC09:20
*** markvoelker has joined #openstack-keystone09:30
*** markvoelker has quit IRC09:35
*** leonchio__ has quit IRC09:37
*** david8hu has quit IRC09:37
*** leonchio_ has joined #openstack-keystone09:38
*** david8hu has joined #openstack-keystone09:38
*** bdossant has joined #openstack-keystone09:39
*** dims__ has joined #openstack-keystone09:54
openstackgerritAbhishek Kekane proposed openstack/keystone: Eventlet green threads not released back to pool  https://review.openstack.org/13082409:59
*** topol has joined #openstack-keystone10:15
*** ChanServ sets mode: +v topol10:15
*** gokrokve has joined #openstack-keystone10:16
*** gokrokve has quit IRC10:21
*** _cjones_ has joined #openstack-keystone10:22
*** _cjones_ has quit IRC10:26
*** markvoelker has joined #openstack-keystone10:31
*** BAKfr has quit IRC10:35
*** BAKfr has joined #openstack-keystone10:35
*** samueldmq has joined #openstack-keystone10:35
*** markvoelker has quit IRC10:36
*** jistr has quit IRC10:36
openstackgerritMarco Fargetta proposed openstack/keystone: IdP ID registration and validation  https://review.openstack.org/15215610:42
openstackgerritMarco Fargetta proposed openstack/keystone: Correct utf8/innodb issues with tables  https://review.openstack.org/15980310:42
*** BAKfr has quit IRC10:44
*** BAKfr has joined #openstack-keystone10:44
*** topol has quit IRC10:52
*** jistr has joined #openstack-keystone10:53
marekdI am grepping glance source code and cannot really find any spot where keystonemiddleware/keystoneclient is called for user authentication/authorization.10:57
openstackgerritDavanum Srinivas (dims) proposed openstack/oslo.policy: Switch to non-namespaced module imports  https://review.openstack.org/16376811:11
*** gokrokve has joined #openstack-keystone11:14
rodrigodsmarekd,isn't here https://github.com/openstack/glance/blob/master/etc/glance-api-paste.ini#L67-L69 ?11:14
marekdrodrigods: yeah11:17
marekdand how is that later used....11:17
marekd?11:17
*** aix has joined #openstack-keystone11:19
*** gokrokve has quit IRC11:19
*** nellysmi_ has joined #openstack-keystone11:24
*** fmarco76 has joined #openstack-keystone11:24
*** nellysmitt has quit IRC11:26
rodrigodsmarekd, when you receive the request, the wsgi pipeline is executed. When its time for the authtoken, it authenticates the request: https://github.com/openstack/glance/blob/master/etc/glance-api-paste.ini#L1511:28
marekdrodrigods: i figured how the pipe is being actually choosen (flavor option in glance-*.)11:30
marekdrodrigods: next step11:31
marekdwhat is the first call executed in kmw ?11:31
marekd__init__.filter_factory()11:32
*** markvoelker has joined #openstack-keystone11:33
marekdI think we might want to add some federation bits in keystonemiddleware.11:36
*** markvoelker has quit IRC11:37
rodrigodsmarekd, hmm11:38
rodrigodsyeah...11:38
marekdi may want to acutally issue my assertion and go directly to...say glance11:39
marekdkmw would then validate the assertion with keystone11:39
rodrigods++11:42
marekdI am wondering what morganfainberg  and jamielennox think about it.11:43
rodrigodsyep, let's discuss this when they appear online :)11:46
openstackgerritTelles Mota Vidal Nóbrega proposed openstack/keystone: List projects filtering by is_domain flag  https://review.openstack.org/15839811:49
openstackgerritTelles Mota Vidal Nóbrega proposed openstack/keystone: Creating domain and filtering by parent_id  https://review.openstack.org/16137811:49
bretonI'm researching https://bugs.launchpad.net/keystone/+bug/1430433 now. I hope no one minds that it's slow, because I use it as a possibility to understand Fernet tokens and the whole auth flow better11:57
openstackLaunchpad bug 1430433 in Keystone "Fernet token validation doesn't return catalog and role information for domain scoped tokens" [Undecided,New] - Assigned to Boris Bobrov (bbobrov)11:57
*** lhcheng has quit IRC11:58
*** aix has quit IRC11:59
*** ljfisher has joined #openstack-keystone12:04
*** gokrokve has joined #openstack-keystone12:14
*** markvoelker has joined #openstack-keystone12:15
*** gokrokve has quit IRC12:16
*** gokrokve has joined #openstack-keystone12:16
*** gokrokve has quit IRC12:21
*** rushiagr_away is now known as rushiagr12:28
*** dims__ has quit IRC12:35
*** dims_ has joined #openstack-keystone12:36
*** ljfisher has quit IRC12:42
*** bdossant has quit IRC12:43
*** radez_g0n3 is now known as radez12:48
openstackgerritRodrigo Duarte proposed openstack/keystone: Add domain_id checking in create_project  https://review.openstack.org/15994412:48
openstackgerritHenrique Truta proposed openstack/keystone: Honor domain operations in project table  https://review.openstack.org/14376312:54
*** aix has joined #openstack-keystone12:58
*** lhcheng has joined #openstack-keystone12:58
*** ljfisher has joined #openstack-keystone13:00
*** lhcheng has quit IRC13:02
*** raildo has joined #openstack-keystone13:06
*** mestery_ has quit IRC13:08
*** gokrokve has joined #openstack-keystone13:14
*** gokrokve has quit IRC13:18
*** stevemar has joined #openstack-keystone13:18
*** ChanServ sets mode: +v stevemar13:18
*** mestery has joined #openstack-keystone13:20
*** bknudson has joined #openstack-keystone13:26
*** ChanServ sets mode: +v bknudson13:26
*** richm has joined #openstack-keystone13:28
rodrigodsmarekd, looking at SP code... I think there is some attributes that mandatory, right?13:42
*** gordc has joined #openstack-keystone13:43
*** joesavak has joined #openstack-keystone13:48
*** sigmavirus24_awa is now known as sigmavirus2413:51
stevemargdi bknudson !13:53
bknudsonstevemar: what's up?13:54
stevemarhow were *you* not picky about the commit message on https://review.openstack.org/#/c/163768/13:54
stevemarit's an oslo sync13:54
stevemarand i mean this in a very fun and loving way13:54
bknudsonstevemar: I didn't look at the filename...13:54
bknudson-2 it.13:54
stevemari spent several minutes looking up commit numbers only to come back to the patch and realize it's +A'ed :P13:55
stevemarmeh, i don't mind, it's 1 character change13:55
stevemarand that *is* the only difference13:55
marekdrodrigods: ksc?13:55
bknudsonsurprised that we have oslo-incubator in a library as small as oslo.policy13:55
stevemarbknudson, it's that silly fileutils guy13:56
bknudsonread_cached_file seems like something that only oslo.policy would use.13:57
stevemarbknudson, i plan on graduating him in L13:57
rodrigodsmarekd, keystone, actually13:57
marekdrodrigods: name the line :D13:58
stevemarprobably13:58
marekdrodrigods: what's that you dont like?13:58
rodrigodsmarekd, I was reviewing the ksc code and was about to suggest a test to avoid creation of SPs without mandatory fields13:58
amakarovayoung, Hi! Are you here?13:58
stevemarbknudson, the plan was to call that library oslo.io but no one has picked up the work yet13:58
rodrigodswhen I look keystone code13:58
rodrigodsmarekd, we can create SPs without auth_url and sp_url13:58
ayoungamakarov, no, I'm way over here13:59
rodrigodsmarekd, which doesn't make sense to me13:59
rodrigodsshould have noticed during the review process :(13:59
marekdrodrigods: now i am trying to recall if i had done it on purpose.13:59
amakarovayoung, cool! When you get back, can you please suggest what to do with group role revocation? And is there any bp/spec about revocation optimization?14:00
openstackgerritSteve Martinelli proposed openstack/python-keystoneclient: WIP - add support to samlize a token  https://review.openstack.org/15902214:00
ayoungamakarov, nuke it from orbit14:01
ayoungThe reason I was so draconian in the first place was due to limitations in the token enumeration14:01
bknudson./neutron/neutron/openstack/common/policy.py:            reloaded, data = fileutils.read_cached_file(14:01
bknudsonneutron still hasn't switched to oslo.policy14:01
ayoungamakarov, if groups were in the token, we'd have an obvious approach14:01
amakarovayoung, ++14:01
bknudsonand ceilometer14:01
ayoungbut we don't know at the token level that the role assignment cam via group membership14:01
amakarovayoung, alas they are not )14:01
bknudsonand cinder... I guess nobody has switched to oslo.policy.14:02
rodrigodsmarekd, https://github.com/openstack/keystone/blob/master/keystone/contrib/federation/controllers.py#L323-L324 seems like this would fail14:02
bknudsonmaybe I should be bringing this up with the other oslo liaisons.14:02
bknudson./nova/nova/utils.py:def read_cached_file(filename, cache_info, reload_func=None):14:03
marekdrodrigods: it wouldn't fail14:03
amakarovayoung, so postpone it and double-check against Fernet?14:03
*** r-daneel has joined #openstack-keystone14:03
marekdit would return None14:03
bknudsonseveral projects have their own implementation of read_cached_file outside of oslo-incubator even.14:03
ayoungamakarov, yeah14:03
rodrigodsmarekd, not the get(), but if None, the next steps would fail14:03
stevemarbknudson, ceilometer should have switched over yesterday to oslo.policy14:03
ayoungamakarov, maybe make it something that can be disabled?  I don't now14:04
ayoungknow14:04
*** krykowski has joined #openstack-keystone14:04
bknudsonI don't think ceilometer even uses policy.json.14:04
rodrigodsmarekd, likes 339 and 34814:04
bknudsonhttp://git.openstack.org/cgit/openstack/ceilometer/tree/etc/ceilometer/policy.json -- actually, they've got one now!14:04
stevemarrodrigods, marekd make a schema for for the request14:04
stevemarbknudson, thats rough14:05
marekdstevemar: jsonschema?14:05
amakarovayoung, will Fernet tokens have group_id?14:05
stevemarmarekd, yeah, we do that for a few others14:05
marekdyeah14:05
stevemaramakarov, dolphm and lbragstad are working on that14:05
stevemarmarekd, we probably just overlooked it14:05
stevemarfile a bug and fix it14:06
marekd++14:06
ayoungamakarov, for Federation tokens, yes14:06
ayoungand maybe that is the answer...for all fedeartion tokens, PKI included, we add in the groups14:06
ayoungactually, we may still be stuck14:06
rodrigodsstevemar, marekd, I'm on this right now... will be full time k2k for the next week or so14:07
ayoungI think federation tokens only have groups in the unscoped tokebns.  marekd is that right ?14:07
rodrigodswill file a bug14:07
amakarovayoung, stevemar, the 2nd question: is current revocation engine performance enough?14:07
marekdayoung: negative. The OS-FEDERATION obj is part of the user.14:08
amakarovI'm surprized that sql backend doesn't used for tree storage/search14:08
*** mattfarina has joined #openstack-keystone14:08
amakarovs/doesn't/isn't/14:08
marekdayoung: https://github.com/openstack/keystone-specs/blob/master/api/v3/identity-api-v3-os-federation-ext.rst#request-a-scoped-os-federation-token14:08
ayoungmarekd, so every federated token can and will have the groups in it?14:08
marekdayoung: yes, that's the only information that defines what you can do in the system14:09
ayoungmarekd, so, I'm thinking that we make everything behave the same in the future.14:10
ayoungLet's make the Federation path the normal path in Liberty14:10
stevemarayoung, i want that more than anyone and i don't see it happening in L14:11
ayoungstevemar, good topic for Vancouver14:11
marekdlet's make SAML assertion a standard token.14:11
ayoungmarekd, different issue14:11
marekdayoung: a topic for vancouver is how to actually make inter clouds.14:12
amakarovmarekd, and use XML ))14:12
stevemarfor sure, it'll be a great topic14:12
marekdamakarov: let it be oidc as long as it's as powerful as saml14:14
ayoungmarekd, I mean that instead of  going to /auth/token to get an unscoped, we use the Federation approach, to include the idp and protocol data14:14
rodrigodsstevemar, marekd https://bugs.launchpad.net/keystone/+bug/143137714:14
openstackLaunchpad bug 1431377 in Keystone "service provider object accepts null values for mandatory fields" [Low,Confirmed]14:14
marekdrodrigods: thanks14:14
marekdwhat do you think about buildin some federation bits in keystonemiddleware ?14:14
*** gokrokve has joined #openstack-keystone14:14
dstanekmarekd: do you have thoughts on what would need to go in there?14:14
*** rushiagr is now known as rushiagr_away14:14
marekddstanek: a use case you mean or a way how to do this?14:15
*** iamjarvo has joined #openstack-keystone14:18
marekda use case...i think i do. Let's say image sharing between the clouds. I want my local glance to fetch an image available at other federated cloud. I would issue an assertion with my local keystone, pass it to the glance and request for fetching an image X from glance X-g. The glance (or client in general) would pass the assertion to glance. Keystonemiddleware would have to pass it to the Keystone, because it's keystone that knows (along wi14:18
*** gokrokve has quit IRC14:19
marekdnow, for 'transport layer' i would try to use bittorrent protocol but it's a kind of different story and also there might be a problem with keeping the infrastructure under control.14:21
amakarovayoung, maybe I missed something, wasn't there an idea to merge assignments and trusts? As for me, they have much in common. And having assignment id attached as we have trust id now can be useful for revocation purposes14:22
marekddstanek: as how to do this: I think it's more like passing the assertion and checking whether the assertion is validated or not.14:23
marekddstanek: and probably more work would be on keystone side, where one can list accessible projects in one step, with the assertion as an input, not assertion -> unscoped token -> /auth/projects / /auth/domains14:24
dstanekmarekd: if the client passes he assertion to keystone why would the middleware need to check the assertion?14:25
marekddstanek: the point is not to pass the assertion to the keystone14:25
dstanek"Keystonemiddleware would have to pass it to the Keystone"14:26
dstanekmarekd: a picture or flow diagram may be the easiest way to talk through the flow of data14:26
marekddstanek: local glance ----- (SAML assertion) ---> remote glance  (with help of kmw) --(SAML ASSERTION)--> Keystone14:28
marekddstanek: see, here, we never have an openstack token14:28
*** timcline has joined #openstack-keystone14:28
marekdSAML assertion is a 'token' here14:28
*** jorge_munoz has joined #openstack-keystone14:29
marekdand myself, or a service acting on my behalf contacts directly a remote service14:29
openstackgerritMerged openstack/oslo.policy: Switch to non-namespaced module imports  https://review.openstack.org/16376814:29
marekddstanek: picture it as fetching a image from local glance where you put your uuid token in the request. Glance will validate it with the keystone.14:30
*** csoukup has joined #openstack-keystone14:31
marekdis the overall idea of using mapping engine ALWAYS with every token auth a good idea?14:31
marekdjust asking for a future reference.14:31
*** mattfarina has quit IRC14:31
rodrigodsstevemar, for the db migration (not allowing auth_url and sp_url to be null), we'd need to add a default value if we already have stored SPs with such fields null14:32
rodrigodsstevemar, any suggestions?14:32
rodrigodsmarekd, ^14:32
*** gokrokve has joined #openstack-keystone14:33
*** samueldmq_ has joined #openstack-keystone14:33
marekdrodrigods: localhosts14:35
marekdor make sure controllers wil not blow up when the null is there and deal with that.14:35
rodrigodsmarekd, think the second is more informative, we can raise an exception telling the user to update such fields14:36
stevemarrodrigods, what db migration is needed? and it should be fine to add a new one, we just introduced them a few weeks ago14:36
marekdstevemar: he wants to make sp_url and auth_url not nullable in db14:37
stevemarrodrigods, okay, add a new migration then, should be fine to add, don't need to worry about existing setups, it was either introduced in K or experimental in J14:39
rodrigodsstevemar, great, thanks14:39
stevemarif we have a schema though, it'll ensure that auth_url and sp_url are never null. but i guess for good practice we should make the column nullable=False also14:40
stevemarrodrigods, can you split that into 2 patches?14:40
openstackgerritLance Bragstad proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360114:40
rodrigodsstevemar, absolutely :)14:41
*** r-daneel has quit IRC14:42
openstackgerritHenrique Truta proposed openstack/keystone: Add is_domain field in Project Table  https://review.openstack.org/15742714:44
openstackgerritHenrique Truta proposed openstack/keystone: Honor domain operations in project table  https://review.openstack.org/14376314:44
openstackgerritHenrique Truta proposed openstack/keystone: Change project name constraint  https://review.openstack.org/15837214:44
*** r-daneel has joined #openstack-keystone14:45
*** lhcheng has joined #openstack-keystone14:47
samueldmq_have we converged on the way to represent experimental APIs?14:48
samueldmq_'hints': 'experimental' inside a resource ?14:48
openstackgerritAlexander Makarov proposed openstack/keystone: Redis token backend  https://review.openstack.org/15084414:52
*** lhcheng has quit IRC14:52
*** thedodd has joined #openstack-keystone14:53
*** obutenko has joined #openstack-keystone14:54
openstackgerritLance Bragstad proposed openstack/keystone: Federated token formatter  https://review.openstack.org/16138014:58
*** mattfarina has joined #openstack-keystone15:00
openstackgerritLance Bragstad proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360115:04
bretonI'm getting TypeError: 'NoneType' object has no attribute '__getitem__' if I don't send "X-Subject-Token". It's not normal, yes?15:04
breton(please don't fix it if it's not normal, I want to try myself)15:04
*** gokrokve_ has joined #openstack-keystone15:07
*** chrisshattuck has joined #openstack-keystone15:09
*** gokrokve has quit IRC15:11
openstackgerritMerged openstack/pycadf: Add a section for audit maps  https://review.openstack.org/16242915:21
*** david-ly_ is now known as david-lyle15:23
*** joesavak has quit IRC15:23
stevemardstanek, poke - https://review.openstack.org/#/c/162428/15:24
*** nellysmi_ has quit IRC15:24
*** joesavak has joined #openstack-keystone15:26
dstanekstevemar: were the docs themed at some point?15:26
stevemarif they ever were, they aren't now15:27
lbragstaddolphm: I reviewed the api agnostic patch. There was some commented out code in the tests, should that be removed?15:27
stevemardstanek, it was never used https://github.com/openstack/pycadf/commit/1d5428afa7c4442762737fdca8bad3d533f5e27515:29
stevemarjust copy pasta15:29
*** rushiagr_away is now known as rushiagr15:30
dstanekstevemar: should we also remove the dir from the conf file?15:30
stevemari suppose!15:31
*** arunkant_ has joined #openstack-keystone15:31
*** chrisshattuck has quit IRC15:32
*** rwsu-afk is now known as rwsu15:33
lbragstaddolphm: s/api agnostic/domain-scoped fernet tokens/15:35
*** _cjones_ has joined #openstack-keystone15:40
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone.  https://review.openstack.org/16387815:43
dolphmlbragstad: hmm, those _validate_tokens don't work (i think) because we're using the same user as both the admin in those tests and the subject of the test15:44
dolphmlbragstad: so i think they should be there, but it would take a refactor to get them working15:45
lbragstaddolphm: ok, makes sense15:46
iamjarvois the service that runs on port 35357 the adimin interface?15:46
dolphmiamjarvo: for v2, yes15:47
openstackgerritSteve Martinelli proposed openstack/pycadf: Remove empty _templates folder  https://review.openstack.org/16242815:47
stevemardstanek, ^15:47
dolphmiamjarvo: /v3/ is the same on both :5000 and :3535715:47
stevemar35357 is only useful for admin actions with the v2 api15:47
bretonit also seems that admin_token is not fully supported with fernet tokens, right?15:47
stevemarbreton, why would that be? admin_token creates no auth_context15:48
bretonat least yet15:48
dolphmbreton: admin_token?15:48
bretonI'm trying to create user with "X-Auth-Token:ADMIN" and getting "This is not a recognized Fernet formatted token: ADM"15:49
bretonsomething happens in _get_domain_id_from_token15:49
bretondolphm: [DEFAULT]admin_token of keystone.conf15:50
stevemarbreton, sounds like a bug, but i expect it to work15:51
dolphmbreton: and ADMIN is the value you have configured?15:51
bretondolphm: yep15:51
bretonok, bugreport then15:52
dolphmbreton: include a backtrace!15:52
bretonthere is none for this concrete issue15:52
dolphmbreton: (assuming you're getting one)15:52
openstackgerritayoung proposed openstack/keystone-specs: Template for testijng document  https://review.openstack.org/16388215:53
richmbreton: are you using the v3 api?15:53
richmbreton: and are you using the v3 policy file?15:53
bretonrichm: yes, v3 api. I have no idea about policy file. How do I check?15:54
richmbreton: as root - ls -al /etc/keystone15:55
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone.  https://review.openstack.org/16388315:56
bretonrichm: there is no policy.json. Still need full output?15:56
richmbreton: grep policy_file /etc/keystone/keystone.conf15:56
breton#policy_file=policy.json15:57
*** browne has joined #openstack-keystone15:57
richmhmm - so no policy - so what policy does it use if there is no policy specified in the keystone.conf?15:58
richmThe reason I'm asking is that I ran into a similar problem - the admin_token would not work in many cases when using the v3 api and v3 policy15:58
richmI had to add "is_admin:1" to many of the rules in the v3 policy - the problem is that the admin_token has no domain, so many of the rules fail because they require a domain in the token15:59
richmbut in your case - what policy is it using?15:59
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone.  https://review.openstack.org/16387815:59
*** thedodd has quit IRC16:00
*** carlosmarin has quit IRC16:02
*** samueldmq_ has quit IRC16:02
marekdrodrigods: did you manage to hack something ?16:02
*** tqtran has joined #openstack-keystone16:04
marekddstanek: https://review.openstack.org/#/c/163569/3 are you planning on adding anything else here?16:04
dstanekmarekd: no16:05
dstanekmarekd: thanks for the update16:05
marekdit's nothing.16:05
bretondolphm: https://bugs.launchpad.net/keystone/+bug/143143416:06
openstackLaunchpad bug 1431434 in Keystone "user creation with fernet tokens results in 401" [Undecided,New]16:06
dolphmbreton: thank you, sir! would you be willing to test a patch that's still in review?16:09
openstackgerritayoung proposed openstack/keystone-specs: Template for testing document  https://review.openstack.org/16388216:10
bretondolphm: yep16:10
dolphmbreton: this one will certainly impact the check you're running into https://review.openstack.org/#/c/162031/16:10
marekdDo we have functional tests for osc working?16:13
*** amakarov is now known as amakarov_away16:13
bretondolphm: 401: The request you have made requires authentication.16:13
*** iamjarvo has quit IRC16:14
dolphmbreton: slightly different error?16:14
bretondolphm: yes16:14
dolphmmarekd: i'd consider devstack's use of osc to be in that camp16:14
dolphmmarekd: although they probably lean more towards integration tests16:15
marekddolphm: ack16:15
morganfainbergmarekd, you're going to run into some issues with folks running reverse proxies for keystone.16:18
morganfainbergmarekd, and i need to mull over the federation bits in middleware16:19
*** iamjarvo has joined #openstack-keystone16:19
ayoungmarekd, stevemar please kick this one ahead.  It is a pre-req to the group mapping stuff we want to land16:19
*** iamjarvo has quit IRC16:19
ayoungand should be pretty non-contentious16:19
marekdmorganfainberg: you are talking now about fed + keystonemiddleware?16:19
morganfainbergmarekd, yeah16:19
*** iamjarvo has joined #openstack-keystone16:20
marekd:(16:20
ayoungdstanek, is https://review.openstack.org/#/c/142573/17  ready for primt time?  IF so, add a +1 to it.  I realize you wrote it, so +2 is a bit much, but a lot of cores are touching that, and I'd expect a bunch of +1s from the different authors16:20
marekdmorganfainberg: so, looks like there is really any other way than making a client that will be fully stateful and juggle with tokens.16:22
marekdisn't16:22
dstanekayoung: just added a +116:25
ayoungdstanek, very cool.  So you solved the `extends` issue?16:25
dstanekayoung: the issues isn't solved, but it is abstracted away16:26
ayoungdstanek, Since this is only admin right now, I assume the risk of breakage is small?16:26
*** afazekas_ has quit IRC16:27
*** amerine has quit IRC16:27
dstanekayoung: we could be breaking the mapping code16:28
ayoungdstanek, explain please?16:29
dstanekayoung: all of these changes are about federation mappig16:29
*** jsavak has joined #openstack-keystone16:29
*** iamjarvo has quit IRC16:29
*** joesavak has quit IRC16:32
*** joesavak has joined #openstack-keystone16:34
morganfainbergayoung, for https://review.openstack.org/#/c/159803/ i think we need to go back to the original code that fixes utf8, where federation is in the migration_helpers, *then* backport, then we move forward with a better fix16:37
*** jsavak has quit IRC16:37
morganfainbergayoung, the better fix will not land/be viable until after k3, and this blocks up something that is otherwise ready for review/landing in k316:37
ayoungmorganfainberg, right.  So one :disable sanity check,  2 go to the origianl fix16:38
morganfainbergno16:38
ayoung3  something generic like this16:38
morganfainbergfix where it does the change in-line16:38
morganfainbergas it was before16:39
morganfainbergbackport,16:39
ayoungyou mean in the core code?16:39
morganfainbergthen disable sanity check16:39
morganfainbergthen move forward16:39
morganfainbergyes16:39
ayoungwhy?16:39
morganfainbergit needs to be backported16:39
ayoungjust due to time?16:39
morganfainbergi dont want to backport devstack crazy16:39
ayoungI don't understand16:39
*** zzzeek has joined #openstack-keystone16:40
morganfainbergi just don't want to try and implement fixes for the sanity check in devstack for gate.16:40
ayoungI'm supportive, and willing to be pragmatic16:40
morganfainbergetc16:40
ayoungjust make it clear16:40
morganfainbergsorry let me rephrase16:40
ayoungah16:40
ayoungis sanity check run outside of keystone code?16:40
morganfainbergi don't want to try and backport stuff for devstack to fix this16:40
morganfainbergsanity check is run out of oslo.db code16:40
morganfainbergit's inline via the keystone-manage cli,16:40
morganfainbergso my thought is we backport the simplest fix, where everything was in migration_helpers16:41
ayoungso if some other project ran it, it might break16:41
morganfainbergthen we fix it better post k316:41
morganfainbergwell not in how we're trying to fix it16:41
morganfainbergit wont affect anyone else, but i really am hesitant to backport changing the sanity check16:41
ayoungmorganfainberg, ok, tell you what, repost it to the state that you think it needs to be in, and I'll review that16:41
morganfainbergsounds good.16:42
morganfainbergayoung, was just a heads up that because we need a backport here, we should fix it in-line, then do the disable sanity check + fixes in devstack for forward looking16:42
ayoung++16:42
*** jistr has quit IRC16:45
openstackgerritMorgan Fainberg proposed openstack/keystone: Adding utf8 to federation tables  https://review.openstack.org/15980316:46
morganfainbergayoung, ^16:47
morganfainbergayoung, back to the simplest version of the change.16:47
morganfainbergayoung, and updated commit to reflect the plan16:47
openstackgerritMorgan Fainberg proposed openstack/keystone: IdP ID registration and validation  https://review.openstack.org/15215616:48
ayoungmorganfainberg, OK if I just +2a that now?16:49
morganfainbergayoung, if you like the code.16:49
ayoungyeah, it is fine16:49
openstackgerritSteve Martinelli proposed openstack/keystone: Implements whitelist and blacklist mapping rules  https://review.openstack.org/14257316:49
morganfainbergayoung, since it is no longer my code i also +2'd16:49
ayoungI mean, I don't want the core stuff staying long term16:49
ayoungbut I'm pragmatic here16:49
morganfainbergayoung, neither do i. i think we can fix that post k3 in some cleanup16:50
*** amerine has joined #openstack-keystone16:50
ayoungworks for me16:50
morganfainbergayoung, but the key was i was looking at backportability, and it started making my skin crawl. this is backportable16:50
stevemarayoung, oh btw did you end up using an empty blacklist in your mapping?16:50
ayoungstevemar, I put a junk value in there16:50
ayoung['nevermore']16:50
ayoung['closeenoughforadamswork']16:51
stevemarayoung, okay, i think we will want to change the conditional for the black/white list to check `if blacklist is not None`16:51
morganfainbergayoung, ['TheEnd']16:51
ayoungsure16:51
breton"and \"16:51
bretonhttps://review.openstack.org/#/c/159803/17/keystone/common/sql/migration_helpers.py16:51
stevemarcause the empty list caused it to not enter the direct mapping logic16:51
bretonseriously?16:51
marekdstevemar: i think we will have to redefine mapping language :P16:51
stevemarmarekd, hehe16:52
marekdstevemar: dstanek changes are good but...are they perfect?16:52
marekdstevemar: or at least constraint a 'grammar' there a little bit.16:52
morganfainbergbreton, bike shed?16:52
stevemarmarekd, it's a logical step forward for now16:52
marekdpersonally i would go away from using {0} and format()16:52
marekdlet's trat everything as objects and serialize at the very end.16:52
marekds/trat/treat/16:53
morganfainbergbreton, 'and \' is less friendly, but ultimately a minor issue and we're re-writing the whole way this works soon.16:53
stevemarmarekd, yep, we can definitely improve on things16:53
morganfainbergbreton, this code was (at this patch level) ready except the forward looking stuff was sub-optimal.16:53
dstanekmarekd: you also need a way to represent lists16:53
marekddstanek: hm?16:53
marekdin the rules?16:54
dstanekmarekd: yes, in the local16:54
marekddstanek: i am starting to regret we didn't provider versions from the very beginning16:54
marekdwe would simply go with the next(version) and have two separate paths.16:55
dstanekmarekd: versioning is easy; add a 2.0 to new mappings and assume that if you don't have a version it is the original value16:55
marekddstanek: ++16:55
bretonmorganfainberg: I think I missed the discussion about how and when it's going to be rewrited. Got any link to it?16:55
morganfainbergbreton, in the irc channel backscroll, but in short, we need to backport this.16:55
morganfainbergbreton, the new stuff wont be backportable.16:56
morganfainbergbreton, so the ultimate fix will be to change when/how we sanity check so we can't wedge developers, it'll involve how devstack runs. we migrate, then we sanity check16:56
morganfainbergbreton, catches errors where utf8 doesn't exist, but wont wedge deployers in bad ways in real deployments. basically kesytone-manage db_sanity_check16:57
stevemardstanek, marekd mappingv2 for the win!16:57
morganfainbergbreton, but backporting a fix for the tables *and* working to make devstack happy for juno et al becomes more dicy. so we fix it the simplest way in-tree for backport, then work on the forward looking cleanup16:58
marekdstevemar: i guess it's standard developers work to cycle around the same things all the time...16:58
stevemarmarekd, happens to the best of intentions16:58
morganfainbergbreton, solving the immidiate problem and letting us address the bigger re-write post FF since it's not a feature change, it's a tech-debt paydown that is easy to sell16:58
stevemarwe needed something immediately and didn't know all the combinations16:58
stevemarit happens16:58
openstackgerritRodrigo Duarte proposed openstack/keystone: Add JSON schema validation for service providers  https://review.openstack.org/16390316:59
morganfainbergstevemar, we are allowed to fix bugs and iterate on design ;)16:59
marekdstevemar: oh, i am not complainint - the engine was complete at that time!16:59
morganfainbergmarekd, ^ cc16:59
*** afazekas has joined #openstack-keystone16:59
marekdmorganfainberg: but it makes us so error prone and so imperfect :-)16:59
morganfainbergmarekd, OMG really?! :P16:59
morganfainbergmarekd, ^_^16:59
rodrigodsstevemar, marekd ^json schema patch16:59
stevemar:D16:59
stevemarthanks rodrigods17:00
* morganfainberg goes to meeting.17:00
marekdmorganfainberg: and makes me feel this is not professional - how could I not predict it ? :P17:00
marekdmorganfainberg: does it also happen in closed-source software? :P17:00
rodrigodsstevemar, missing the DB part, kind unsure how to handle it17:00
stevemarmarekd, haha, everything comes out perfect with closed-source17:01
stevemarit's all as-designed17:01
bretonmorganfainberg: thank you. So, when you're talking about backporting in the backscroll, you meant backporting to juno?17:01
morganfainbergyes17:01
marekdstevemar: this is called 'visibility', because this is how i see it :D17:02
marekd(due to closed ticketing system)17:02
marekdstevemar: heard that oracle db has ~10 000 open bugs17:03
dstanekmarekd: one of them is mine!17:03
*** krykowski has quit IRC17:03
stevemardstanek, you are just always helping17:04
marekdstevemar: heard oracle has ~9999 open bugs and one from dstanek17:04
stevemarhehe17:05
dstanekstevemar: i'm glad i don't have to deal wit that anymore17:05
marekdseriously?17:05
marekdmysql is better?17:05
marekdpostgres is better?17:05
marekdhadoop is better?17:05
*** harlowja_away is now known as harlowja_17:06
dstanekmuch17:06
dstanekwell, not hadoop17:06
samueldmqmorganfainberg, have we decided the way we'll mark a resource as experimental?17:06
dstaneki hating dealing with Oracle and all the strange issues17:07
samueldmqmorganfainberg, I want this info to be able to review this ( https://review.openstack.org/#/c/160032/ )17:07
* samueldmq wonders if it will be 'hints': 'experimental', doing something similar to what is proposed in the json home spec17:09
*** lhcheng has joined #openstack-keystone17:11
stevemarmorganfainberg, when is the next juno release happening?17:17
morganfainbergno idea17:17
stevemarah17:17
morganfainbergsamueldmq, the hints bit is how we show it in code.17:17
stevemari've been trying to get this one https://review.openstack.org/#/c/151411/ un -2'ed for ages now17:18
morganfainbergsamueldmq, api spec will show in our docs.17:18
morganfainbergsamueldmq, etc17:18
morganfainbergstevemar, i think we are close, i saw some FFE.17:18
stevemarmarekd, we found the same issue, yay!17:19
marekd:D17:19
samueldmqmorganfainberg, but here  (https://review.openstack.org/#/c/160032/21/keystone/common/wsgi.py) we are specifically adding it to the wsgi resource17:19
samueldmqmorganfainberg, exactly how it will be exposed via json home, right?17:20
morganfainbergsamueldmq, yes.17:20
samueldmqmorganfainberg, ok, that was my original question, maybe I wasnt clear17:20
marekdstevemar: jsonschema validates request body17:20
marekdnot the response, right?17:20
marekdi mean..it does not validate the response17:20
marekd???17:20
marekdlbragstad: bknudson ^^ ?17:21
samueldmqmorganfainberg, in addtion, will we have 'status': 'stable' for stable apis? or just nothing means stable17:21
samueldmq?17:21
lbragstadmarekd: correct17:22
bknudsonmarekd: yes, it's the request body17:22
bknudsonit could be used to validate the response in tests I guess.17:22
bknudsonnot sure what the point would be for the server responses.17:22
lbragstadthere are some places where that is used. I believe tempest does that17:22
bknudsonwe should plan do to that in our functional tests.17:23
lbragstadbknudson: ++17:23
rodrigodsstevemar, marekd, can I update a sp id?17:24
stevemarrodrigods, nope17:24
rodrigodsthanks17:24
* morganfainberg needs food and disappears for this magical thing and coffee... did i mention coffee?17:24
*** aix has quit IRC17:25
*** devlaps has joined #openstack-keystone17:26
dstanekbknudson: use jsonschema to validate responses in tests?17:29
bknudsondstanek: yes.17:29
bknudsonmakes sure the response doesn't change on us.17:29
bknudsonespecially tokens for example.17:30
dstanekbknudson: why would we not just assert what we expect the response to be?17:30
bknudsondstanek: that's what jsonschema does.17:30
dstanekbknudson: not really; it says i expect this thing and i'll be this data type. in tests i would rather be much stronger in our assertions17:31
*** joesavak has quit IRC17:32
bknudsondstanek: some things might take a lot of work in assertions in python... like saying this field is an int or bool or string.... if you could put that in the JSON Schema it would be a quick check before getting to the interesting aspects of the response.17:33
bknudsonit's easy to check for falsy, but checking if it's actually an empty string or actually the bool false, requires some work that could be handled by the json schema.17:34
dstanekbknudson: but i want to say this field should be equal to True, not that it's supposed to be a boolean17:34
dstanekor that i get a specific string back and not just any string17:35
bknudsony, you have to do that too.17:35
bknudsonif you just check if a field is True then that might mean it's a non-zero number or a non-empty string.17:36
*** fmarco76 has quit IRC17:37
dstaneki think you can get by without needing to do jsonschema; i couldn't even imagine the size of the schemas in the testing code17:37
openstackgerritRodrigo Duarte proposed openstack/keystone: Add JSON schema validation for service providers  https://review.openstack.org/16390317:38
ayoungmorganfainberg, I just +2Aed https://review.openstack.org/#/c/142573/18  since it has 2 +1s from cores beyond me (they both touched the code)  but if you want me to kaibosch it, tell me now and I will17:38
openstackgerritayoung proposed openstack/keystone: ignore unknown groups  https://review.openstack.org/16278817:38
*** iamjarvo has joined #openstack-keystone18:00
*** dims__ has joined #openstack-keystone18:03
*** dims__ has quit IRC18:03
*** dims__ has joined #openstack-keystone18:04
dstanekdolphm, lbragstad: you guys are all about the classmethods18:06
dolphmdstanek: that's mostly me18:06
*** dims_ has quit IRC18:07
lbragstaddstanek: I'm all about the class methods by way of building on dolphm's stuff18:09
*** dims__ has quit IRC18:09
*** edmondsw has joined #openstack-keystone18:13
openstackgerritMerged openstack/keystone: Abstract the direct map concept into an object  https://review.openstack.org/16356918:17
samueldmqdolphm, err.. 404 on your gist :/18:26
dolphmsamueldmq: ?18:26
*** samueldmq has left #openstack-keystone18:26
*** afazekas has quit IRC18:26
*** samueldmq has joined #openstack-keystone18:26
dolphmsamueldmq: the link in the /topic works for me, if that's what you mean? updated 9 minutes ago18:27
samueldmqdolphm, ah, forget .. I think I edited the channel topic by myself in my irc client18:27
samueldmqdolphm, facepalm :/18:27
dolphmsamueldmq: lol no worries. i moved the bot to it's own server so i won't mess with it unnecessarily18:28
dolphmsamueldmq: should be pretty stable until we can turn it into a real site18:28
samueldmqdolphm, o/18:28
samueldmqdolphm, you uploaded the bot's code to git ?18:29
* samueldmq would like to see how your bot works :)18:29
*** htruta has joined #openstack-keystone18:35
*** dims has joined #openstack-keystone18:35
*** nellysmitt has joined #openstack-keystone18:35
*** pnavarro|off has quit IRC18:45
*** chrisshattuck has joined #openstack-keystone18:46
dolphmsamueldmq: it's just this configured to query for starred reviews in keystone https://github.com/dolph/launchpad/blob/master/patches_in_review.py and append the output to a markdown file18:47
samueldmqdolphm, nice, thanks! I like to see hacking things18:48
ayoungdolphm, just got this test failure with fernet  http://paste.openstack.org/show/191906/18:49
ayoungis that a known issue?18:50
dolphmayoung: that looks like the issue brant fixed a couple days ago - what's your system timezone?18:50
ayoungEaster I think18:51
samueldmqayoung, lol daylight saving times18:51
ayoungHa.  Prolly18:51
bknudsonayoung: https://review.openstack.org/#/c/162489/18:51
ayoungThu Mar 12 14:51:32 EDT 201518:51
bknudsondo you have that?18:51
ayoungbknudson, nope.,  was testing a different patch18:52
ayounglet me cherry pick18:52
bknudsonI don't know why that appeared after the time change, but the fix was to work in utc.18:53
ayoungdolphm, with fernet tokens...if we disable "revoke on role change" type rules, we'll pick up the updated role assignments when the token is validated, right?18:53
ayoungI'm thinking specifically for groups.  When a role assignment for a group changes, we have to invalidate a lot of tokens18:53
ayoungand we can't really do that for Federation, cuz we don't know group membership18:54
dolphmayoung: test against master!18:54
ayoungIN this case, the tokens would still be valid, but they would not have the role assignments.18:54
dolphmayoung: and yes18:54
ayoungDo you think that is the right approach?  I don;t like the change of roles with the same token18:55
ayoungbut I can't see a way around it18:55
dolphmayoung: but events occurring when your authorization is reduced should trigger earlier cache invalidation so the new authorization takes effect faster18:55
dolphm(because you were forced to get a new token)18:55
*** thedodd has joined #openstack-keystone18:55
ayoungwould you be forced to get a new token?18:56
ayoungI don't think so, we have no link from group to the token18:56
marekdrodrigods: i voted.18:56
dolphmayoung: depends on the enforcement of revocation events in keystonemiddleware18:57
ayoungdolphm, yeah, but lets assume that we are not doing that, and instead are doing just online validation, which I think is the norm18:57
ayoungwe don't have revoke in the client yet18:57
dolphmayoung: then it entirely depends on caching config in keystonemiddleware18:58
ayoungdolphm, right, but that is true anyways...I was just talking about initial validation18:58
ayoungI know tokens don't tend to get used more than once from the CLI, but from Horizon I could see it happening18:59
dolphmayoung: then it's computed by keystone on that first validation18:59
ayoungdolphm, and cached?18:59
dolphmayoung: not in keystone18:59
ayoungright...so on second validation, if the roles have updated, the token will show the update role assignments18:59
dolphmayoung: you could - and should - put a cache in front of keystone18:59
dolphmayoung: correct19:00
dolphmlbragstad: jorge_munoz: briancurtin: i get this with novaclient too - any timeline update for rackspace identity? https://github.com/rackspace/pyrax/issues/52819:02
ayoungI would think that the cache would need to be invalidated upon role assignment change.19:02
dolphmayoung: that's where token revocation events should come into play19:03
briancurtindolphm: last i heard that environment would be updated middle of this month19:03
ayoungdolphm, ok, then what is the right behaviour on group role-change:  revoke tokens for all users in that group in the known identity sources?19:04
dolphmayoung: role removal?19:05
ayoungdolphm, yeah...we have an outstanding bug for dealing with that19:05
dolphmayoung: and token validation responses don't include groups?19:06
ayoungright...there is no way to see the groups for the user in the token...and I think we want to continue that patern, otherwise the fernet side of things will explode19:06
dolphmayoung: that seems like the simplest solution19:07
dolphmayoung: (adding an enumeration of groups to the token used to produce the included authorization)19:07
ayoungdolphm, on the PKI token side...the situation is worse19:07
ayoungthere is no way to revoke the tokens for users that don't show up persisted in groups19:07
ayoungthere, I could see the argument that we should have groups in the token19:07
ayoungand then process a revoke by group id19:08
ayoungdolphm, and...if we put the group id in the response, it would work for cached fernet tokens as well when we get to middleware side token revocation event checks19:09
ayoungbut...we wouldn't have any way to add the groups to the Fernet tokens...cuz we don't record the group membership  dangit19:10
morganfainbergzzzeek: so if I were to convert dogpile to using pymemcache would you want a transition period? Supporting both? Or not relevant.19:14
morganfainbergzzzeek: this is important because I need to fix something in keystonemiddleware soon. And I'd like to ditch some baaaaaaaaaad code for dogpile in the process19:14
morganfainbergayoung: maybe we need a new class of revocation event: cache invalidate. It doesn't mean a token is bad, just don't rely on the cache. Then again that is mucking up what revocation events are ... Bah I don't like it as I type it.19:16
ayoungmorganfainberg, still doesn't solve the problem19:16
ayoungmorganfainberg, the issue is that a user has a role due to group membership,  but that membership is only recorded in the assertion that came in, and the application of the mapping19:17
morganfainbergNot for pki. For fernet. And we could just wedge the group data in the. It would work.19:17
morganfainbergThen*19:17
morganfainbergor we could move to allowing for revocations on roles but that gets wonky to match on.19:18
ayoungmorganfainberg, none of that works19:18
morganfainbergBut an event per user in a group per role does.19:18
ayoungthe onl;y thing that works is recording group membership somehow19:18
morganfainbergIn federation it works for the group: so issue for group, then for any non federated users in group issue event for role if they don't still have the role (we can calculate that)19:19
morganfainbergIt's not pretty but it would work.19:19
ayoungwha19:19
ayoungmorganfainberg, a scoped fernet token does not have the groups in it19:20
ayoungonly unscoped19:20
ayoungand more than one group can go in to the scoping of a token19:20
*** rushiagr is now known as rushiagr_away19:20
morganfainbergFederation you mean? I thought marekd said all federation tokens had it.19:20
ayounglet me confirm19:21
*** edmondsw has quit IRC19:21
morganfainbergWe did this and I'm almost positive all federation tokens had roles.19:21
morganfainbergErm groups19:21
morganfainbergSorry.19:21
morganfainbergGroups19:21
ayoungmorganfainberg, so when I hand in an unscoped token to get a scoped token, and that origianl unscoped token was a federation token,  we add groups to it?19:21
ayoungTHat is waht marekd seemed to say19:22
morganfainbergI think we maintain the groups in it. Not just add. So the scoped has the same group info as the unscoped.19:22
morganfainbergThat was my understanding.19:22
ayoungI'd like to move toward a system where there is only "one" of anything...one role in a token, one group, etc...hierarchical19:23
morganfainbergThat's not today though.19:23
ayoungnope19:23
ayoungbuit would fix the max size of the tokens,19:24
ayoungso fdifferent revocation check for federated tokens then unfederated19:24
morganfainbergSo let's stick with today issues for k319:24
ayoungsomeone needs to write that19:24
morganfainbergWe can't fix that this cycle.19:24
marekdayoung: morganfainberg groups are essentially part of the user object in the fed tokens19:24
ayoungshould be written as a backportable fix if someone decdies it is a security concern19:25
morganfainbergmarekd: thought so.19:25
morganfainbergayoung: won't be back ported.19:25
morganfainbergIt's aassive amount of new code.19:25
morganfainbergMassive*19:25
ayoungmorganfainberg, no, I mean revoke by group19:27
ayoungthat would not be massive19:27
ayoungbut won't happen for k319:27
morganfainbergAh right.19:27
*** sigmavirus24 is now known as sigmavirus24_awa19:27
morganfainbergThat is likely a bug more than a feature.19:27
morganfainbergFwiw19:27
*** sigmavirus24_awa is now known as sigmavirus2419:28
lbragstaddstanek: answer to your msgpack question http://cdn.pasteraw.com/gp45itmhposwmqljqdi75gysc72rv7419:28
rodrigodsmorganfainberg, so I want to write a migration to change sp_url and auth_url to not be nullable (https://github.com/openstack/keystone/blob/master/keystone/contrib/federation/migrate_repo/versions/005_add_service_provider_table.py#L23-L27)19:32
morganfainbergrodrigods, what does the API say? i think it's reaosnable to do so19:32
morganfainbergAPI doc that is19:32
rodrigodsmorganfainberg, I created a bug regarding those fields being null19:33
rodrigodswould break k2k auth19:33
rodrigodsmorganfainberg, need to update the API as well, right?19:33
rodrigodsmorganfainberg, my doubt regarding the migration is: since it merged in Kilo, do I need to take care of old data in db? and what should be the approach, a new migration script or a method to fix it in the __init__19:34
openstackgerritJorge Munoz proposed openstack/keystone: Implement Fernet tokens for v2.0 tokens  https://review.openstack.org/15922919:34
dstaneklbragstad: that's what i thought19:34
lbragstaddstanek: we can wrap map with list() and it should work with both 2 and 319:34
lbragstaddstanek: I posted responses here with traces with each https://review.openstack.org/#/c/160993/22/keystone/token/providers/fernet/token_formatters.py19:35
bknudsonpython 3 change map from a function to a constructor?19:35
bknudsonhttps://docs.python.org/3.4/library/functions.html#map19:36
bknudsonit's the same.19:36
dstanekbknudson: it's now am object19:36
lbragstadbknudson: yeah, map() returns an object19:36
bknudsonahh, ok.19:36
lbragstadversus always returning a list like it did in 219:36
*** iamjarvo has quit IRC19:37
dstanekthey made it more list imap19:37
bknudsonthere's a six.map()19:37
rodrigodsmorganfainberg, the API doesn't say anything about being null https://github.com/openstack/keystone-specs/blob/master/api/v3/identity-api-v3-os-federation-ext.rst#service-providers19:37
rodrigodsor not null19:37
lbragstadbknudson: we just need it to be a list before passing to msgpack19:38
bknudsonmsgpack should take an iterator.19:38
*** timcline has quit IRC19:38
bknudsonmaybe it needs the len19:38
*** _cjones_ has quit IRC19:39
lbragstadbknudson: dstanek I checked the type returned from map in python 3 and is was of type `map`.19:39
dstaneklbragstad: yep, your list(map(...)) is what i do for code i'm converting19:39
*** openstackgerrit has quit IRC19:40
*** openstackgerrit has joined #openstack-keystone19:40
*** iamjarvo has joined #openstack-keystone19:42
morganfainbergrodrigods, sounds like we should update the spec with the bug, but i'm in support of this change.19:42
lbragstaddstanek: do you want a comment added explaining why we're wrapping list(map()) ?19:44
lbragstaddstanek: on every occurrence?19:44
dstaneklbragstad: i don't19:45
openstackgerritMerged openstack/pycadf: Remove empty _templates folder  https://review.openstack.org/16242819:45
openstackgerritLance Bragstad proposed openstack/keystone: Convert audit_ids to bytes  https://review.openstack.org/16099319:45
openstackgerritLance Bragstad proposed openstack/keystone: Refactor: make Fernet token creation/validation API agnostic  https://review.openstack.org/16233819:47
rodrigodsmorganfainberg, ok... any suggestions about how to handle the db migration?19:48
morganfainbergrodrigods, standard db migrate, should be really easy19:48
morganfainbergrodrigods, you just alter the column to not_null, and make the controller/schema/etc enforce19:48
iamjarvohi all, so my user now has access to the default domain. i can get back a token using curl. doesn't seem like i have access to anything else though. http://pastie.org/private/zw1kdbb1jowj9zn2pyvuq19:49
rodrigodsmorganfainberg, great, thanks19:49
rodrigodsmorganfainberg, the schema change is already submitted: https://review.openstack.org/#/c/163903/19:50
morganfainbergrodrigods, you'll need to do the API change saying these are not_null first.19:50
morganfainbergrodrigods, but that should be non-controversial19:50
rodrigodsmorganfainberg, of course, submitting now19:50
stevemarlhcheng, did you have to configure trusted_dashboards for sso too?19:52
openstackgerritLance Bragstad proposed openstack/keystone: Federated token formatter  https://review.openstack.org/16138019:53
openstackgerritLance Bragstad proposed openstack/keystone: Federated token formatter  https://review.openstack.org/16138019:53
*** gokrokve_ has quit IRC19:53
*** gokrokve has joined #openstack-keystone19:54
rodrigodsmorganfainberg, seems like the pattern in our API is to inform when it can be null, not the other way around. In this way, the API doc is already ok19:55
iamjarvoi also get this when trying to add a tenant keystone user-role-add --user cloud_admin --role admin --tenant admin19:55
iamjarvoWARNING: Bypassing authentication using a token & endpoint (authentication credentials are being ignored).19:55
iamjarvoConflict occurred attempting to store role grant - User 5251a786b4d90da09a5b045341e73ee12e162d3749bfe7e6d16b88710280c64a already has role 8eeaa452086142558ec3edd15d55ac2c in tenant d5b4f61c034b454ebd8db9c34cad8776 (HTTP 409)19:55
*** gokrokve_ has joined #openstack-keystone19:55
lbragstaddstanek: as far as this comment goes, https://review.openstack.org/#/c/163601/6/keystone/token/providers/fernet/token_formatters.py would putting it in keystone/token/provider.py make sense?19:55
dstaneklbragstad: i'm really not sure19:58
*** _cjones_ has joined #openstack-keystone19:59
lbragstaddstanek: I agree that it makes sense to put it with "auth" but not sure at the same time since token_formatters.py would be the only thing using it19:59
*** gokrokve has quit IRC19:59
dstanekfeels like maybe something keystone.auth.plugins would know - if you add a plugin you have to know about formatters too19:59
lhchengstevemar: yeah. I had to add trusted_dashboards = http://<host>/auth/websso/20:00
stevemarlhcheng, cool cool20:00
*** timcline has joined #openstack-keystone20:00
stevemari wonder how badly that will mess up if using a proxy20:00
lhchengstevemar: I assume horizon should be sending the hostname in front of load balancer. I think it will work.20:03
ayoungOK, test reporting is annoying...there is so much log spew I can't find the name of the test that failed,  and the summary doesn't list it, and there is no good short circuit mechanism to stop on first failure20:04
ayoungthis is hostile to me20:04
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone.  https://review.openstack.org/16387820:06
lbragstaddstanek: that makes sense, I'll see if I can put it in plugins.core20:10
*** gordc has quit IRC20:11
dstaneklbragstad: i'm also worried that it's a little fragile; the numbers being what they are is significant, but i don't know if that shows in the code20:11
iamjarvoneeded to add all the service users to the service project20:12
lbragstaddstanek: makes sense, the main thing that it needs to accomplish is preserving the info in methods_names into a small format that we can pack in the token.20:12
lbragstaddstanek: there's probably a better way to do that20:12
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone.  https://review.openstack.org/16387820:13
dstaneklbragstad: if nothing else it is definitely clever20:14
zzzeekmorganfainberg: easy enough to add a pymemcache backend to dogpile?  no need to “convert”20:16
openstackgerritBrant Knudson proposed openstack/keystone: Fix sending invalid query parameters to database  https://review.openstack.org/16394920:18
*** nellysmitt has quit IRC20:22
rodrigodsmarekd, stevemar, where do we test sql migrations related to federation? test_sql_migrate_extensions?20:26
stevemaryep20:26
rodrigodsstevemar, thx20:27
openstackgerritLance Bragstad proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360120:33
openstackgerritIoram Schechtman Sette proposed openstack/keystone-specs: Policy rules mangaged from a database  https://review.openstack.org/13381420:33
openstackgerritIoram Schechtman Sette proposed openstack/keystone-specs: Policy rules mangaged from a database  https://review.openstack.org/13381420:35
morganfainbergzzzeek, i was looking at if there is a win to keeping the awful, atrocious, terrible python-memcache at all20:36
zzzeekmorganfainberg: well if people are using it i dont see the harm in keeping it as one of the options…20:37
morganfainbergzzzeek, i think the right answer is to supersede the old one with the pymemcache on eventually20:38
morganfainbergzzzeek, but yeah probably run both in paralell for a while at least.20:38
morganfainbergbecause it's going to make the thread.local issues go away.20:38
morganfainbergbut i'll need to do some work to isolate it for the older python-memcache.20:38
morganfainbergzzzeek, i'll submit a new backend using pymemcache as a PR soonish20:39
zzzeekdogpile.cache.memcached and dogpile.cache.pymemcached, i dont see why we’d change it more than that, unless python-memcached is totally abandoned in some obivous way20:39
morganfainbergzzzeek, its pretty bad. not python3 compat, and has seen very litttle work20:40
openstackgerritJorge Munoz proposed openstack/keystone: Implement Fernet tokens for v2.0 tokens  https://review.openstack.org/15922920:40
openstackgerritIoram Schechtman Sette proposed openstack/keystone-specs: Policy rules mangaged from a database  https://review.openstack.org/13381420:40
morganfainbergzzzeek, i'm getting the feeling it's just short of abandoned20:40
zzzeekmorganfainberg: its still maintained: https://github.com/linsomniac/python-memcached and also that’s sean reifschneider who isn’t exactly a ghost….20:40
morganfainbergzzzeek, my experience talking with folks trying to work with them is it is really just short of abandoned20:41
openstackgerritBrant Knudson proposed openstack/keystone: Fix sending invalid query parameters to database  https://review.openstack.org/16394920:41
zzzeekmorganfainberg: OK.   I sorta know-ish sean from pycons, would be curious to hear what he says20:42
morganfainbergzzzeek, but i haven't spent much time with it beyond it making some really bad assumptions and being hard to debug due to thr way the code is structured20:42
morganfainbergzzzeek, i'm relying on some folks who were trying to py3 enable it etc.20:43
openstackgerritJorge Munoz proposed openstack/keystone: Implement Fernet tokens for v2.0 tokens  https://review.openstack.org/15922920:43
openstackgerritLance Bragstad proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360120:43
*** ljfisher has quit IRC20:43
openstackgerritBrant Knudson proposed openstack/keystone: Fix sending invalid query parameters to database  https://review.openstack.org/16394920:43
zzzeekmorganfainberg: is this because of the “its wrapped in a thread local “ thing?20:43
openstackgerritIoram Schechtman Sette proposed openstack/keystone-specs: Policy rules mangaged from a database  https://review.openstack.org/13381420:44
morganfainbergzzzeek, the move to pymemcache is because it is 1) already py3 friendly, 2) no thread.local issues, 3) code is well structured and easy to work with.20:44
morganfainbergzzzeek, unfortunately pymemcache guys didn't make it a drop-in replacement interface wise for python-memcache20:44
morganfainberg:(20:44
morganfainbergthat is my biggest complaint20:44
openstackgerritHenrique Truta proposed openstack/keystone: Honor domain operations in project table  https://review.openstack.org/14376320:45
morganfainbergdelete_many vs delete_multi (for example)20:45
morganfainbergit's minor20:45
morganfainberganyway, i'll post up some pymemcache love for dogpile soon™20:47
morganfainbergsince i really want to move over to dogpile in keystonemiddleware.20:47
morganfainbergbut solving some of these thread.local things in friendlier ways is important if i'm doing that work20:48
morganfainbergand python3.20:48
*** ljfisher has joined #openstack-keystone20:48
*** thedodd has quit IRC20:50
marekdmorganfainberg: dogpile is some lib/wrapper for pymemcache? how do they correspond?20:52
morganfainbergmarekd, dogpile is a wrapper for a lot of different caching/key-value-store wrappers20:52
morganfainbergmarekd, memcache is just one of them.20:52
morganfainbergmarekd, redis, file-based, in-memory dictionary, etc are all possible20:52
morganfainbergwe even have a mongo driver in keystone's tree.20:52
*** thedodd has joined #openstack-keystone20:53
marekdmorganfainberg: thank you, sir!20:53
*** thedodd has quit IRC20:54
*** raildo has quit IRC20:58
*** harlowja_ has quit IRC21:03
*** samueldmq has quit IRC21:03
*** harlowja has joined #openstack-keystone21:04
jamielennoxayoung: what we were talking about the other day in terms of a base federation plugin that can be used for kerb/x509: https://review.openstack.org/#/c/163271/21:08
nkinderjamielennox: cool21:10
*** thedodd has joined #openstack-keystone21:14
ayoungjamielennox, so, do the ABC thing and I think that one is good21:18
ayoungpersonally, I don't care about ABC, but if we are going to use it, use it21:18
*** samueldmq has joined #openstack-keystone21:18
jamielennoxayoung: yea, it'll need some tests as well - considering marekd's comment about another abstraction level21:18
ayoungI wonder, though, if we want to be able to overload the protocol paramter21:18
ayoungI don't think we need it21:18
jamielennoxayoung: i'm not sure, do we consider that standard (defined by the plugin) or a user param?21:19
jamielennoxi like the idea of whatever we can remove from user control21:19
ayoungI think the plugin gives a default, but the user can set an override value for protocol21:19
*** mattfarina has quit IRC21:19
ayoungfor examle, there might be two different mappings, and the only way to trigger is to swap either idp or protocol21:20
ayoungso there might be kerberos and kerberos_modified21:20
ayoungmore likely with SAML or X509 that provides more attributes to play with21:20
ayoungI could see there being something like that in the case of a cross realm trust21:20
ayoungits not pretty, but it would give the end deployer something to work with21:20
ayoungjust a thought21:21
ayoungok...gotta take my kid to an event. Back on line in a few21:21
jamielennoxnp21:21
*** ayoung has quit IRC21:24
marekdjamielennox: actually param must be provided by a user.21:30
*** emily__ has joined #openstack-keystone21:31
jamielennoxmarekd: param?21:32
marekdjamielennox: sorry, protocol.21:32
jamielennoxok - _must_ be?21:32
jamielennoxas in there no point with the abstractproperty21:32
*** timcline has quit IRC21:32
jamielennoxmy though was i'd make it accept both, given the class property = None and then override with a user property21:33
marekdjamielennox: yes, i just though of it again.21:33
marekdjamielennox: it's just...we don't explicitely say "if we use mod_shib the protocol object in keystone will have id 'saml2'"21:33
marekdit can have any name21:33
jamielennoxmarekd: we don't - should we?21:33
jamielennoxthis wouldn't be the only time we've defined these things, like service_type21:34
jamielennoxit would only take us writing it into the docs21:34
marekdjamielennox: that's a more philosophical question whether we should hardcode protocol names. For now we allow users choose whatever name they want and it'd be hard to change it just like that.21:34
jamielennoxmarekd: ok - so don't offer the class property at all?21:35
marekdjamielennox: yeah, that's a good thing i think.21:36
*** emily__ is now known as elowing21:36
jamielennoxok, i'll respin it21:36
marekdjamielennox: thanks.21:36
jamielennoxmarekd: i left a comment on the first one as well21:36
marekdjamielennox:  link pls?21:37
jamielennoxhttps://review.openstack.org/#/c/163259/221:37
jamielennoxso many tabs21:37
jamielennoxmarekd: and you think rename this to MappedBase or something21:40
*** tqtran has quit IRC21:40
jamielennoxi like the idea of removing the word 'federated' because it's not really true for all these cases21:40
jamielennoxbut it's all going through OS-FEDERATION so i don't know if it matters21:40
marekdIt depends if for the kerb/x509 we are going to use faked idp/protocols (just to get mappings) or not. If not, then I propose a tree MappedBase, KerbAuth(MappedBase), X509Auth(MappedBase), FederatedBase(MappedBase), Saml2(FederatedBase), ADFS(FederatedBase)21:44
*** tqtran has joined #openstack-keystone21:44
jamielennoxwhat would FederatedBase provide that MappedBase didn't21:45
marekdThere is an abstraction of IdP and Protocol in real federations, but I think there is none of it in technologies like Kerberos21:45
stevemardstanek, i am not about to try out the entire steps for abfab21:45
marekdjamielennox: identity-provider, protocol for instance21:45
jamielennoxmarekd: there's not, however the only way to trigger these mappings and such at the moment is to mount them at /OS-FEDERATION/{idp}/protocol/{protocol}21:46
dstanekstevemar: i'm planning on it if i can get an easy to use IdP; i'm curious :-)21:46
stevemardstanek, it might just use mod_shib21:46
jamielennoxso we still need those values to build the url don't we?21:46
dstanekfor an IdP?21:46
stevemardstanek, i think ... maybe21:47
marekdjamielennox: we do, but if we find another way to actually fetch the mapping then we don't need it.21:48
marekdjamielennox: i imagine there will be only one mapping set for x509, right?21:49
jamielennoxmarekd: i don't know - i could imagine multiple x509 providers one per idp21:49
jamielennoxmarekd: let's look to pass this as federated for now, it's fairly easy to extract a subclass and maintain compatibility21:50
marekdjamielennox: yes.21:50
jamielennoxmarekd: we can discuss at summit or somewhere how we can make the mapping engine more central, so it doesn't need {idp} and {protocol} params21:50
marekdso I'd rename to MappedBase and inherit everything from it.21:51
jamielennoxit's going to take some time to get to the point where kerberos and x509 are there21:51
marekdjamielennox: why?21:51
jamielennoxi guess it's just testing21:51
jamielennoxwe were talking about this because i don't really like kerberos being mounted at /krb21:52
jamielennoxi'd prefer it work just like any other apache based plugin21:52
marekdaha21:52
jamielennoxand that blog that ayoung did the other day, he had it hacked up so that he was using kerberos, but triggering the mapping plugin via the 'method'21:52
marekdunderstand.21:53
marekdjamielennox: ok, i am going to bed now. I will take a look at it tomorrow.21:53
marekdbye21:53
*** marekd is now known as marekd|away21:53
jamielennoxmarekd: cya21:53
*** bknudson has quit IRC21:55
morganfainbergnkinder, ping: re https://bugs.launchpad.net/keystone/+bug/140884521:59
openstackLaunchpad bug 1408845 in Keystone "Disabling user in ldap breaks user-list for project" [Undecided,New]21:59
morganfainbergnkinder, can we confirm / see what is going on there?22:00
nkindermorganfainberg: let me check it out...22:00
morganfainbergnkinder, thanks22:00
nkindermorganfainberg: my guess is that 'keystone user-list' actually does multiple operations22:01
morganfainbergnkinder, i'm sure it does22:01
morganfainbergin really scary ways22:01
nkinderit does a user list call, but they likely makes another call per user (and one doesn't like disabled users it seems)22:01
*** sigmavirus24 is now known as sigmavirus24_awa22:02
nkinderperhaps a call to show roles assigned to the user or something similar22:02
morganfainbergnkinder, i'm in bug triage mode, so hitting the people who know more about bugs than I.22:02
morganfainbergs/bugs/systems in question/22:02
*** harlowja has quit IRC22:02
*** harlowja has joined #openstack-keystone22:04
nkindermorganfainberg: my testbed is torn down right now, but I can try this out a bit later22:05
morganfainbergnkinder, sounds good22:05
morganfainbergoh marvelous... LP is timing out all requests now22:10
* morganfainberg sighs.22:10
*** chrisshattuck has quit IRC22:10
morganfainbergthis is why we can't have nice things .22:11
*** chrisshattuck has joined #openstack-keystone22:11
*** elowing has quit IRC22:24
samueldmqmorganfainberg, the bug reporter said a workaround would be remove the use rrole assignment from user_project_metadata22:24
samueldmqmorganfainberg, it was the old assignment tables ... we had a script to add assignment table (as it is today) in juno22:25
morganfainbergsure.22:25
samueldmqmorganfainberg, 038 and 03922:25
morganfainbergexcept disabling a user shouldn't break anything and removing assignments would be very bad on a disable22:26
samueldmqmorganfainberg, so he is using a version older than juno ...22:26
morganfainbergand wer need to be sure it doesn't still remain broken22:26
morganfainbergif it's still broken, then we need to address it22:26
samueldmqmorganfainberg, need me to dig a bit on this?22:27
morganfainbergor nkinder can.22:27
morganfainbergsomeone just needs to confirm if it's still an issue22:27
morganfainbergunfortunately i don't have a test bed for that type of testing handy atm.22:27
nkinderyeah, I'm building one right now22:27
morganfainbergsamueldmq, don't worry about it then. nkinder will have it :)22:27
samueldmqmorganfainberg, nkinder ok then :)22:28
samueldmqmorganfainberg, nkinder let me know any news, I can work on the fix (if needed, and nkinder is not going to grab it)22:28
* samueldmq is curious to understand what's happening there .. :/22:29
openstackgerritMerged openstack/keystone: Adding utf8 to federation tables  https://review.openstack.org/15980322:30
morganfainbergjamielennox, is https://bugs.launchpad.net/python-keystoneclient/+bug/1420118 still a thing or are we keeping that stuff in ksc's tree?22:31
openstackLaunchpad bug 1420118 in python-keystoneclient-kerberos "Break out the federation plugin" [Undecided,New]22:32
jamielennoxmorganfainberg: it can be repurposed22:32
morganfainbergso, i can close that bug22:32
jamielennoxmorganfainberg: i'm going to bring the base plugin into ksc, then do a ksc-saml or whatever marekd|away wants to call it22:32
morganfainbergand i should kill off the keystoneclient-federation project?22:32
jamielennoxprobably, yea22:32
morganfainbergok22:32
jamielennoxwe are going to need a saml one anyway so you could rename it all if that's easier22:33
jamielennoxbut ask marek what he wants it called22:33
morganfainbergstevemar, ping https://bugs.launchpad.net/python-keystoneclient/+bug/1379872 is that... still a thing or is this something else [we don't have extensions]22:35
openstackLaunchpad bug 1379872 in python-openstackclient "can't list extensions for v3 keystone client" [Low,Confirmed]22:35
openstackgerritMerged openstack/keystone: Implements whitelist and blacklist mapping rules  https://review.openstack.org/14257322:35
*** csoukup has quit IRC22:35
*** ljfisher has quit IRC22:37
morganfainbergjamielennox, is this as easy a fix as it looks: https://bugs.launchpad.net/python-keystoneclient/+bug/1420791 ?22:37
openstackLaunchpad bug 1420791 in python-keystoneclient "python keystoneclient misreports connection error reason" [Undecided,New]22:37
jamielennoxugh, i hate that one - that's a mistake from the guys who did all that apiclient stuff22:38
jamielennoxwhen they renamed all the exceptions - there's another one like it22:38
jamielennoxi had it fixed as part of another review which i had to drop22:38
jamielennoxbut yes - pretty much22:38
stevemarmorganfainberg, i'll kill the bug22:39
stevemarlhcheng, o/22:39
*** thedodd has quit IRC22:39
stevemarlhcheng, do you remember what we set 'remote_id' to yesterday?22:39
stevemarfor the idp?22:39
*** dims_ has joined #openstack-keystone22:46
*** dims has quit IRC22:46
*** r-daneel has quit IRC22:48
lhchengstevemar: accounts.google.com22:50
*** ayoung has joined #openstack-keystone22:50
*** ChanServ sets mode: +v ayoung22:50
stevemarsame as the idp id eh22:50
stevemarlhcheng, get ready to review some docs!22:52
lhchengstevemar: yeah, that makes sense, since that's the same value we used to lookup the IdP22:52
lhchengstevemar: sure, I'll be happy to22:53
*** arunkant_ has quit IRC22:56
ayoungHey guys, send the reviews my way.  If you don't add me to a review, I don't know that it is pressing.22:56
stevemarayoung, this one is sso specific, does that tickle your fancy?22:57
ayoungfire way22:57
stevemari was going to only add lhcheng since we were playing around with it last night22:57
ayoungstevemar, you trying to make K3?22:57
ayoungstevemar, just logged back in...what is the review?22:58
ayoungdon't make me go to evesdrop22:58
stevemarayoung, the code for keystone is actually merged22:59
stevemarthe horizon code is almost there, a few more ui tweaks22:59
*** ljfisher has joined #openstack-keystone22:59
ayoungstevemar, you talking a bout https://review.openstack.org/#/c/151842/22:59
ayoungI'm on that one alreay, was just looking at it22:59
stevemarayoung, i haven't pushed it upstream yet :)22:59
stevemarthis is purely docs23:00
ayoungstevemar, my shout out was a generic shout for review requests, not specific to you23:00
*** dims_ has quit IRC23:00
stevemarayoung, yep!23:00
stevemari knows, just making convo :)23:00
*** dims has joined #openstack-keystone23:00
openstackgerritJorge Munoz proposed openstack/keystone: Implement Fernet tokens for v2.0 tokens  https://review.openstack.org/15922923:01
openstackgerritSteve Martinelli proposed openstack/keystone: Document websso setup  https://review.openstack.org/16401223:02
stevemarlhcheng, ayoung ^23:02
openstackgerritSteve Martinelli proposed openstack/keystone: Document websso setup  https://review.openstack.org/16401223:02
lhchengstevemar: thanks!23:03
stevemargah! whitespace error -_-23:03
ayoungstevemar, make sure you add the people you want as reviewers.23:03
*** dims has quit IRC23:05
*** ayoung has quit IRC23:07
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Add a FederatedBase v3 plugin  https://review.openstack.org/16327123:17
openstackgerritBob Thyne proposed openstack/keystonemiddleware: Add Endpoint Enforcement to Keystonemiddleware  https://review.openstack.org/15329623:17
*** chrisshattuck has quit IRC23:31
morganfainbergdstanek, lbragstad, for https://review.openstack.org/#/c/162031/16/keystone/token/providers/fernet/token_formatters.py what are the real blockers before we can +2 it?23:32
morganfainbergbecause we are at the wire. lets either propose fixes on the end of the chain *or* be clear what we're ok with vs what we're not.23:33
morganfainbergsorry the whole patchset no just that file23:33
dstanekmorganfainberg: i think the issues can be fixed in follow up patches23:34
dstanekmorganfainberg: the only thing that bothers me is the commented out lines on https://review.openstack.org/#/c/162031/16/keystone/tests/unit/test_v3_auth.py23:34
morganfainbergdstanek, ok that is my opinion as well, we can strip those in a followup though [and we should remove them]23:35
morganfainberglet me propose that23:35
dstanekmorganfainberg: dolphm's comment seemed to indicate that they should be there, but just aren't working23:36
morganfainbergthen they should be re-added afterwards.23:36
morganfainbergor they need to be fixed23:36
morganfainbergcommented out = wrong23:36
morganfainberg#TODO for each one is also not correct23:37
dstanekmorganfainberg: if they should be fixed then i vote we do it asap - i haven't run the code yet to see why it's broken23:37
morganfainbergdstanek, yeah23:37
morganfainbergdstanek, my opinion is we weren't doing those before23:37
morganfainbergthey shouldn't be a hard requirement now23:37
morganfainbergso lets strip them out and propose that they are re-added as a followup and we can work on fixing it23:38
dstanekmorganfainberg: i can propose a fix if you aren't already doing it23:40
morganfainbergdstanek i was going to do it as a 2-fer, 1 remove those frm that patch, and 2 new patch re-adding them not commented out23:40
morganfainbergdstanek, already working on it.23:40
*** david-lyle is now known as david-lyle_afk23:41
dstanekmorganfainberg: ok, ping me when you push; i'll be around, but probably not watching chat23:41
morganfainbergdstanek, anything else we need to fix? or otherwise we're good?23:42
dstanekmorganfainberg: i think everything else can be fixed later23:42
dstanekmorganfainberg: it was really a bad comment and i didn't like the classmethod design23:43
morganfainbergno worries23:43
*** iamjarvo has quit IRC23:50
openstackgerritMorgan Fainberg proposed openstack/keystone: Drop Fernet token prefixes & add domain-scoped Fernet tokens  https://review.openstack.org/16203123:52
openstackgerritMorgan Fainberg proposed openstack/keystone: Add in further token validation in v3_auth tests  https://review.openstack.org/16402623:52
morganfainbergdstanek, ^23:52
openstackgerritMorgan Fainberg proposed openstack/keystone: Convert audit_ids to bytes  https://review.openstack.org/16099323:54
openstackgerritMorgan Fainberg proposed openstack/keystone: Refactor: make Fernet token creation/validation API agnostic  https://review.openstack.org/16233823:54
openstackgerritMorgan Fainberg proposed openstack/keystone: Implement Fernet tokens for v2.0 tokens  https://review.openstack.org/15922923:54
openstackgerritMorgan Fainberg proposed openstack/keystone: Federated token formatter  https://review.openstack.org/16138023:54
openstackgerritMorgan Fainberg proposed openstack/keystone: Allow methods to be carried in Fernet tokens.  https://review.openstack.org/16360123:54
dstanekmorganfainberg: did you see https://bugs.launchpad.net/keystone/+bug/1431434 ?23:54
openstackLaunchpad bug 1431434 in Keystone "user creation with fernet tokens results in 401" [High,New]23:54
morganfainbergdstanek, yes and dolph indicated it would be affected by these changes23:55
morganfainbergconsidering fernet wasn't fully finished when that bug was filed, i'd like to revisit as we get into the chain23:55
dstanekmorganfainberg: does affected mean fixes or broken?23:55
morganfainbergdstanek, might be fixed, might be different broken23:55
dstanekmorganfainberg: ah, ok. it would be awesome if boris could have provided a test!23:56
morganfainbergdstanek, yeah, thats why i think i don't want to dig too far until we have more code landed23:56
*** gyee has joined #openstack-keystone23:56
*** ChanServ sets mode: +v gyee23:56
morganfainbergdstanek, with a test it would be easy to do, but lets circle back on it23:56
dstanekmorganfainberg: i'm fine with https://review.openstack.org/#/c/162031/17 as is. do you want me to hold a +2 until you do another pass?23:58
morganfainbergnah23:58
morganfainbergyou can +2, i'm just doing a quick check to make sure i didn't miss anything before i +2A it23:58
morganfainbergif there is another +2 on it23:58

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!