Tuesday, 2015-04-28

*** rushil has quit IRC00:03
*** _cjones_ has joined #openstack-keystone00:06
*** openstack has joined #openstack-keystone00:07
*** zzzeek has quit IRC00:09
*** _cjones_ has quit IRC00:13
*** samueldmq has quit IRC00:15
*** _cjones_ has joined #openstack-keystone00:16
*** samueldmq has joined #openstack-keystone00:16
samueldmqlhcheng, hi, you still there ?00:17
samueldmqlhcheng, sorry I was afk00:17
samueldmqdstanek, ping - any news on the devstack thing ?00:17
lhchengsamueldmq: hey, np00:18
samueldmqlhcheng, was just concerning your comment on the 'dynamic policy' overview spec00:18
lhchengsamueldmq: I know are testing v3 on devstack, wondering if you're using the v3 policy file for keystone00:18
samueldmqlhcheng, I replied there00:19
samueldmqlhcheng, yes I am, no for now I am not changing the default for keystone00:19
*** rm_work is now known as rm_work|away00:20
samueldmqlhcheng, btw , my team made some work on checking a cloud policy00:21
samueldmqayoung, cc ^00:21
lhchengsamueldmq: thanks on working on that, looking forward on the revised spec00:21
samueldmqI wonder if that could be useful to have for L00:22
samueldmqmaybe a separate project to validate the policies .. dunno00:22
lhchengsamueldmq: It would be nice if we can get the v3 policy file working00:22
*** markvoelker has quit IRC00:23
lhchengsamueldmq: there are couple of folks from horizon trying to exercise the v3 policy file, and fixing the policy as they go.00:24
samueldmqlhcheng, hmm, I think we had defined different roles for cloud admin + domain admin + project admin00:24
samueldmqlhcheng, tomorrow I can try to retrieve the work we've done last year ..00:24
samueldmqlhcheng, when I get to the laboratory00:24
lhcheng I remember seeing that patch00:25
samueldmqlhcheng, maybe it can help you guys00:25
lhchengI like that idea00:25
samueldmqlhcheng, yeah but I think we didnt get enough people interested on00:25
samueldmqlhcheng, the general idea was to have a cloud policy on all the services00:25
samueldmq(except domain admin in services, since other projects do not knwo about domains  .. )00:26
samueldmqand this will change since they will all be working with v3 auth on L00:26
samueldmq:)00:26
lhchengsamueldmq: bummer, specific roles makes it clearer for deployer. should make their life easier00:26
samueldmqlhcheng, yeah do you know domain-roles?00:27
samueldmqlhcheng, I think that is what you're talking about !00:27
lhchengyeah00:27
*** dims has joined #openstack-keystone00:27
samueldmqlhcheng, https://review.openstack.org/#/c/133855/10/specs/kilo/domain-roles.rst00:27
lhchengsamueldmq: no I am talking about: "cloud admin + domain admin + project admin"00:27
lhchengbut I also know about the domain roles00:28
samueldmqlhcheng, there are conflicting ideas around domain-roles (henrynash) vs hierarchical roles (ayoung)00:28
samueldmqlhcheng, we will talk about it on tomorrow s meeting, to agree on them00:28
lhchengsamueldmq:  two roles enter one role leave00:29
lhcheng:P00:29
samueldmqthree enter :p00:29
lhchenghah00:29
samueldmqwe completely drop the global admin everyone hates00:29
samueldmqlhcheng, trust me , L will be amazing :p00:30
samueldmqlhcheng, everyone running v3 on the gate jobs  + dynamic policies (fine-grained, more powerful roles, etc)00:30
samueldmqlhcheng, I will be focusing on these ^00:30
lhchengsamueldmq: yeah, but consuming v2 policy file is bad though.  I hope we can tackle consuming the v3 policy file too in L.00:31
lhchengv2 -> default00:32
lhchengsamueldmq: looking forward to those :)00:34
lhchengsamueldmq: anyway, we can look at consuming v3 policy later. one step at a time. :)00:34
samueldmqlhcheng, yeah .. but deployers have their custom policy files ...00:35
samueldmqlhcheng, maybe someone already has a fully-working cloud policy working00:35
samueldmqlhcheng, :p00:35
lhchengsamueldmq: we need to have them come out :D00:35
samueldmqlhcheng, I remember we my team was working on this someone said: 'I saw the ops summit and I didnt see anyone blaming the policy file'00:37
samueldmqlhcheng, so I think someone has it working :p00:37
samueldmqlhcheng, but yeah, we will get there00:37
lhchengcool, the horizon folks are submitting bugs too as they go trying to use the v3 policy file.  Hopefully by the time you switch to v3 policy file, all glitch are cleared :)00:39
samueldmqlhcheng, ++00:40
samueldmqlhcheng, they're submitting for all services?00:40
samueldmqlhcheng, also, it will be better to have a full cloud policy when everyone talk v3, then we can have the cloud admin there :)00:41
lhchengno, they're still trying to get all keystone operation to work. Haven't got to other services yet.00:41
samueldmqlhcheng, I meant domain admin00:41
samueldmqlhcheng, since using v3 they will know about domains00:41
samueldmqlhcheng, k makes sense to have it already on keystone00:41
samueldmq++00:41
lhchengsamueldmq: good stuff00:42
lhchengsamueldmq: have to step out for a bit00:42
lhchengsamueldmq: chat with you later00:43
*** _cjones_ has quit IRC00:43
samueldmqlhcheng, np see you00:44
*** markvoelker has joined #openstack-keystone00:54
*** markvoelker has quit IRC00:59
*** stevemar has joined #openstack-keystone01:01
*** ChanServ sets mode: +v stevemar01:01
jamielennoxsamueldmq: so what are you looking at specifically with regard to v3 and devstack as this is something i'm doing a lot around as well01:13
*** edmondsw has quit IRC01:13
jamielennoxi don't think i have patches up for devstack yet, just some WIP stuff but i've mostly been looking at what services break and fixing those up first01:13
*** josecastroleon has joined #openstack-keystone01:17
*** josecastroleon has quit IRC01:18
*** alexsyip has quit IRC01:20
*** junhongl has quit IRC01:24
*** junhongl has joined #openstack-keystone01:25
*** erkules_ has joined #openstack-keystone01:31
*** fifieldt has joined #openstack-keystone01:32
*** erkules has quit IRC01:34
samueldmqjamielennox, hi yes01:35
samueldmqjamielennox, I know you are the guy for v3 auth compatibility :)01:36
samueldmqjamielennox, you have been doing an amazing job on clients, I think most of them work with with sessions / v3 right ?01:36
jamielennoxsamueldmq: cheers - yea, most work, there are still some left - at the moment i'm looking at services and how they use those clients so we can shift those over to v301:37
samueldmqjamielennox, great! what I am doing now is to have experimental jobs with v2 API disabled on devstack, and then tempest set to use auth v3 only01:37
jamielennoxcool, how many errors are you seeing?01:38
samueldmqjamielennox, no one yet, since this is still wip :p01:38
samueldmqjamielennox, I tried to set up devstack manually and then disable v2, set tempest to use v3 all manually01:39
samueldmqjamielennox, but looks like devstack has a bug ... dstanek was looking at it ..01:39
samueldmqafter installed, we're getting 500 from keystone01:39
samueldmq(with no changes, just devstack installing normally)01:39
jamielennoxok, that sounds like a keystone issue, i'll let you guys figure that out01:40
jamielennoxhave you got patches up for devstack v3 only or waiting for that to be sorted otu?01:41
jamielennoxout?01:41
samueldmqno morgan is working on this front01:41
samueldmqI will probably be working on the gate thing01:42
samueldmqwill write the job at project-config, then devstack-gate, and then devstack01:43
samueldmqin this point https://github.com/openstack-dev/devstack/blob/3894170067a4ca26952ef9b1315864c8dde8e1ad/lib/keystone#L19701:43
samueldmqwhere we will need to change the paste deploy in order to remove the /v2.0 endpoints01:43
samueldmqand morgan is taking care of the devstack to change all places it use v2 to v301:44
samueldmqsounds good ? let me know if you have any suggestions :)01:44
samueldmqjamielennox, ^01:44
jamielennoxsamueldmq: yea, that sounds fine - i knew morganfainberg was looking at this as well i just didn't want to see us get in each others way01:46
*** dims has quit IRC01:46
samueldmqjamielennox, yes, we're getting now .. ftw01:47
jamielennoxi know i need a devstack where i can disable v2 for testing rather than doing my own hacks, so i'll just waiting and see what patches people come up with rather than write them again01:47
samueldmqjamielennox, it would be great if we could get it working before summit01:47
jamielennoxwe could maybe disable the CRUD v2 interface by then, v2 auth will still take a while longer01:48
samueldmqjamielennox, well, both we need to deprecate and wait right ?01:48
samueldmqI dont know how many cycles ..  I am new here :/01:48
jamielennoxsamueldmq: sure, we can't get rid of them immediately - it's normally 2 cycles01:49
samueldmqjamielennox, ++01:49
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Create AccessInfo auth plugin from token  https://review.openstack.org/17802401:52
*** ncoghlan has joined #openstack-keystone01:54
*** browne has quit IRC01:55
*** markvoelker has joined #openstack-keystone01:55
ayoungmorganfainberg, marekd OK...public demo of SAML and ECP is up and running01:59
*** ayoung has quit IRC01:59
*** markvoelker has quit IRC01:59
*** ayoung has joined #openstack-keystone02:00
*** ChanServ sets mode: +v ayoung02:00
ayoungmordred, stevemar, dstanek https://review.openstack.org/#/c/138519/  is very much critical path:  it will hold up lots of other patches.  Can you please bump priority of reviewing it02:04
ayounger mordred meant that for morganfainberg02:04
ayoungbut you can look, too02:04
jamielennoxayoung: why not push it to keystone for now02:13
ayoungjamielennox, no more churn.  It needs to be  in both02:14
jamielennoxayoung: i'm still not convinced i want to allow token building facilities in ksc, and with the split out of ksa i think it's going to take a while before it finds a home02:14
ayoungjamielennox, I have the follow on patches that replace the access info in KC with this02:14
ayoungjamielennox, token building will use this, but it is not token building, but just strict parsing02:15
jamielennoxayoung: only because we have a crappy implementation of revocations in client that was copy and pasted from the server02:15
jamielennoxayoung: strict parsing isn't required from a client perspective02:15
jamielennoxs/required/wanted02:15
ayounghttp://c2.com/cgi/wiki?StringlyTyped02:15
ayoungjamielennox, policy enforcement is also going to depend on this.  It needs to be out of Keystone02:16
ayoungclient should be the primary consumer02:16
ayoungand horizon02:16
jamielennoxi'll look again, but from last review i don't see what it provides that a cleaned up accessinfo doesn't, and we get to clean it up with ksa02:17
ayoungjamielennox, the revocation even needs to move from server to client as well, but got held up due to the swtich to Fernet02:17
jamielennoxthere is revocation events in ksc, i tried to make them work with auth_token but it's horrible and relies on its own made up token format02:17
ayoungjamielennox, right now, we can't write policy rules that are enforced the same way on both keysrtone server and on the clients02:17
ayoungjamielennox, right.  Revocation events needs this, too02:18
ayoungjamielennox, once I make some progress on this, I will clean up the client revocation events using this code in place of that bastardized crud02:19
*** richm has quit IRC02:19
jamielennoxayoung: why can't we just create a standard flat @property based interface with the existing AccessInfo02:20
jamielennoxessentially the same as what AccessInfo is now without the dict subclass02:20
jamielennoxand a better factor y02:20
ayoungjamielennox, cuz this is the right way to code.  Properties and dictionaries are marshalled forms of types.02:33
ayoungThis way, we document, cannonically, what we mean the base types to be02:33
ayoungas best as we can in a dynamica language, but it is not that bad02:33
ayoungit should not be flat02:34
ayoungthe json structure is, roughly the right representation02:34
ayoungjust, JSON is a marshalling format02:34
ayoungjamielennox, bascially, we need to enforce the same logic based on the objects regardless of where things live, or how the objects were created.  For example, Keystone policy in the tokenless case needs to be enforced on the same structure as it will be enforced on in the existing token case02:37
ayoungrevocation events should not be aware of whether it is running in the keystone server or external02:38
jamielennoxi agree with the concept, i just think it's dumping all sorts of server specific code into the client02:38
jamielennoxi don't want a way to build tokens in the client02:38
ayoungpretty much anything that needs to consume the access info needs to look the same.  The fact that it has been done as a dict in the client for so long is due to the fact it was coming from marhsslled string02:38
ayoungjamielennox, there is nothing server specific here02:38
jamielennoxi don't want to expose that a domain is an object with properties02:38
jamielennoxthe @property domain_id is good for this02:39
ayoungjamielennox, everything is an object with properties02:39
ayoungthe general pattern is:  parse to cannocial, muinge, marshall to new format02:39
jamielennoxi see no point in exposing the layout of the token as the standard abstraction because it may not always fit02:39
ayoungjamielennox, except that some things need Domain name instead02:39
ayoungWe already do02:40
jamielennox@property domain_name also exists02:40
ayoungthe layougt of the token is the API spec02:40
jamielennoxright - but it changed from v2 to v302:40
jamielennoxand i expect it to change again02:40
ayoungwell, we cleaned it up a bunch02:40
ayoung@properties are for string based operations.  Granted, a domain is a trivial object, but others are less so02:41
ayoungand we treat them all the same02:41
ayoungif you code in python, you should be working with objects, not strings02:41
jamielennoxyou're still working with strings - you're just going through an object to get there02:41
ayoungthis is...basic object oriented programming02:41
ayoungI'm really having trouble explaining it.  It seems so basic and obvious to me.02:43
ayounghmmm02:43
ayoungjamielennox, the problem with doing things in a flat way is that you cannot then convert things to arrays or lists.  And, since both the User and Project domain are both domain objects, if we need to, we can make common code that works with both of them..and it cleans up the service catalog greatly02:45
ayoungit cleans up the roles02:45
jamielennoxwhy do i want to convert an object to an array02:46
ayoungwe had this whole crazy thing where  role names were sometimes joined with their id and sometimes not..they should always be together.  And contractually bound02:46
jamielennoxsure - but that's an abstraction issue02:46
ayoungarray  of roles?  array of projects?02:46
ayoungIts code..it is all abstaction02:46
*** dims has joined #openstack-keystone02:47
ayoungjamielennox, I just glanced through this article, but it lays out a lot of the rationale  http://blogs.forrester.com/mike_gilpin/11-05-27-canonical_information_modeling_a_best_practice_for_soa02:48
ayoungits not just about AccessInfo, its about how you code in general02:48
ayoungit jhust so happens that I am working with AccessInfo today.  I should have done this back when I started on the project, and I think morganfainberg kindof feels the same way.  You do know this was his idea, rioght?02:48
ayounghttp://www.eaipatterns.com/CanonicalDataModel.html02:49
ayoungjamielennox, the goal is to keep this set of classes non-version specific.  Only the endpoints have violated that thus far02:49
ayoungand even there...we could make it work if I was willing to accept the V2 as the baseline, but I like the contract of the v3..so we will keep v2 just for transitions sake02:50
*** dims has quit IRC02:52
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Common Token Model  https://review.openstack.org/17803402:53
jamielennoxayoung: ^ is pretty much my ideal token model02:53
jamielennoxthen if you want to do things on the server to ensure that no-one is adding extra stuff - do it, but i don't need to care on the client02:54
jamielennoxpolicy, revocations etc all target that interface02:54
ayoungjamielennox, so one antiapattern is abuse of inheritance.  FOr a Data tranfer object, it should be the base object itself, and not an abstract base class02:54
ayoungmy way is actually simpler02:55
ayoungyours implies that you are trying to leave the data at rest inside the json and just pull out the value that you need.02:55
jamielennoxrubbish - this is just pythons way of doing an interface, if it was java, c++ or anything else we would just write it slightly differently02:55
ayoungMine is certainly a bit more expensive, but there are actually parses that can optimize that away02:55
*** markvoelker has joined #openstack-keystone02:56
ayoungjamielennox, no, not rubbish. I've spent...decades fighting that particular anitpattern02:56
ayoungDTOs are classes, not interfaces02:56
jamielennoxactually mine very explicitly does not care if you maintain the json format or not02:56
ayoungif this were C++ or Java, I would be making them immutable02:56
ayoung]02:57
ayoungnot interfaces, not abstract base classes, or even mix-ins02:57
ayoungjamielennox, yours does not define the implementation, allowing for varied implementations, with different assumptions.02:58
ayoungMine is designed to make all assumptions documented in the code itself02:58
ayoungcount yourself lucky that you missed the whole J2EE Entity beans debacle02:59
ayoungbut we are in Python, and Python is already a dynaic language, and has wonderful features for treating objects as dictionaries when required03:00
*** markvoelker has quit IRC03:00
jamielennoxit very much allows for different implementations - that's my goal - the only reason i want to define this interface at all is to allow certain methods to work on the client side and on the server side03:01
jamielennoxI guess it's my opinion here that the server should be adopting the client, and not the other way around03:01
ayoungjamielennox, mine stays the same regardless of format:  you have a different builder for every mime type, so it will work for K2k SAML, or qany other format we come up with03:02
ayoungclient side or server side is irrelevant03:02
ayoungand, in order to consume the object, you don't end up with library dependencies on the underlying format.  Only the builder needs those03:03
ayoungSo if you need to conver from one base format to another, it is marshall too cannonical, marshall from cannonical03:03
ayoungand that is the real benefit03:03
ayoungit means we are not tied to the token format, but we do stand by the set of data that we put in it03:03
ayoungso we can support a wider array of content types as necessary, or data stores, LDAP, SQL, NoSQL03:04
ayoungjamielennox, on a different topic03:08
ayoungjamielennox, I have a public demo of both WebSSO and of ECP03:09
jamielennoxI guess it doesn't matter, but i can't change AccessInfo - too much relies on it so it just means we're going to need to maintain two formats again03:09
ayoungbut the ECP does not work with the client... need jdennis and marekd to close the distance03:09
jamielennoxah - nice, i needed to look into those saml2 plugins again for the new repo03:09
*** lhcheng has quit IRC03:10
ayoungjamielennox, so...kerberos needs to be something different, I think03:10
ayoungfor example03:10
ayoungsay I am doing Ipsilon, and I want to do Kerberos to Ipsilon, not to Horizon03:10
ayoungthen I need to add the negotiate header on the call to Ipsilon,03:10
ayoungit needs to be a decorator for other plugins, I think03:11
ayounglike...add Kerberos to the SAML2AuthPlugin or the OAuthPLugin or whatever else we end up with03:11
jamielennoxdecorator? i don't follow - if we do kerberos via federation i thought it was the same workflo03:11
ayoungjamielennox, if we do ECP, then the call from the KC to the IdP needs to be Kerberos03:12
ayoung--negotiate rather03:12
jamielennoxoh - hmm, yea - i remember looking at that at the beginning that basicauth was not the only way to do ECP03:12
ayoungnot webSSO03:12
ayoungthat works OK03:12
jamielennoxyou're supposed to support x509 and kerb as well03:12
jamielennoxso we're down to sub-sub plugins03:13
jamielennoxthe saml plugin needs to accept a way to support the inner auth exchange03:13
ayoungright.  THe setup I have right now bascially coppies jdennis use of a digest in a flat file.  I can do ECP to Ipsilon with Kerberos, but the client would not support it (I think)03:13
jamielennoxit shouldn't be all that hard actually03:14
jamielennoxthough it's getting confusing with all the config options03:14
ayoungjamielennox, If we did multiple plugins, we could have one that just does Neotiate without setting a value in the token body.  I think that is what we would need03:14
ayoungNegotiateDecorator03:14
jamielennoxayoung: so there's two ways to do it03:14
jamielennox1st make saml a base class and subclass for each new method03:15
jamielennoxand name them each something different like --os-auth-plugin kerbsaml203:15
jamielennoxor we make a new plugin structure that handles the inner auth so --os-auth-plugin saml2 --os-method kerb03:15
jamielennoxeither is doable03:16
jamielennoxi have no real preference03:16
ayoungjamielennox,   I think I like  --os-method kerb03:17
ayoungthat way make it something you can specify multiple times?03:17
ayoungit would let you do client cert, kerberos, saml....03:18
jamielennoxyea, could do03:20
jamielennoxthe arg handling could get confusing there but it's doable03:21
ayoungjamielennox, I think we could get away with implementing that only in python-keystonekerberos to start.  I would not be surprised if that ended up being the only place that needed it.03:24
ayoungbut it keeps the kerberso stuff out of the saml, and the reverse03:24
jamielennoxhmm, yea the dependencies are a bit funny there03:25
jamielennoxbecause you need to define the saml extensions in the ksc-saml2 repo and then rely on them from ksc-kerberos03:25
jamielennoxi guess there's no reason to define an ABC in saml2, just specify it needs to be an object with a method named X03:26
*** samueldmq has quit IRC03:38
*** browne has joined #openstack-keystone03:42
ayoungjamielennox, back to waht you said " i can't change AccessInfo - too much relies on it so it just means we're going to need to maintain two formats again"  so you dobn't think this patch will work:  https://review.openstack.org/#/c/160134/903:42
jamielennoxayoung:  i haven't gone through that patch03:44
ayoungjamielennox, that one is the one that uses the model for the existing Access Info use cases, and was instrumental in me getting this righ03:45
ayoungt03:45
ayoungif I hadn't tried to match what the client was already doing, I'd be off in the weeds03:45
ayoungI just tried to keep each patch reviewable03:45
ayoungjamielennox, the predecessor is the one that changes the tests, and is the one that needs to pass the most scruitiny.  I think I mostly cleaned up assumptions in the tests03:46
ayoungthings like putting ids into the endpoints in the sample data and so on03:47
*** lhcheng has joined #openstack-keystone03:48
*** ChanServ sets mode: +v lhcheng03:48
ayoungthe only change to the tests was to remove explicit checks like  self.assertIsInstance(access_info, access.AccessInfoV2)  as the access info is identical now between each version03:48
*** markvoelker has joined #openstack-keystone03:56
*** markvoelker has quit IRC04:01
morganfainbergayoung, does accessinfo live in client o keystoneauth lib long term?04:01
morganfainbergayoung: not immediately fwiw, can port your code to keystoneauth if it ends up there04:02
ayoungmorganfainberg, it doesn't feel like the same thing as keystoneauth,  but what is the fault line?04:02
morganfainbergayoung: well it can't be client long term i don't think, because it breaks the model of not needing ksc04:03
morganfainbergto interact with the plugins etc04:03
morganfainbergand auth04:03
morganfainbergso maybe we do need to move to keystonecommon for things like accessinfo and cms?04:03
ayoungmorganfainberg, its the cannonical representation of what the token data represents, but it doesn't need auth mechanisms...04:03
morganfainbergayoung: but the auth mechanisms should utilize it04:04
ayoungcms should probably be rethought04:04
morganfainbergmeaning we shouldn't need ksc for the keystonauth lib04:04
ayoungI would like it as a standalone mechanism, to support messages as well as tokens04:04
ayoungso what would be in common besides that>04:04
morganfainbergi think today keystoneauth is the closest we have.04:04
ayoungIt might be just this04:04
morganfainbergcommon - no idea if we even need it04:04
ayoungmorganfainberg, so, what is going into keystoneauth?04:04
morganfainbergayoung: session, discovery, catalog04:04
morganfainbergayoung: auth plugins04:05
ayoungcatalog?  then yes04:05
morganfainbergayoung: yeah catalog parser.04:05
morganfainbergit's meant to be everything you need to spin up a session, auth, and hand off to a $client$ or other tool04:05
ayoungmorganfainberg, let me phrase it this way.  Is it OK if Keystone server links in keystoneauth?04:05
morganfainbergyes04:05
ayoungI assume it would need to for K2K, right?04:05
morganfainbergin fact, i would expect it to.04:05
morganfainbergyes04:05
ayoungOK,  then that is where it should go04:06
morganfainbergi expect middleware to be using keystoneauth as well instead of KSC04:06
ayoungand horizon?04:06
morganfainbergsame thing.04:06
morganfainbergDOA can use KSA instead of needing ksc04:06
ayoungOK,  then accessinfo goes to keystoneauth04:06
morganfainbergksc doesn't provide it with anything it needs except extra identity and asscess managment crud interfaces04:06
morganfainbergwhich shouldn't be needed to handle auth stuff04:07
ayoungOh YAY! http://www.freeipa.org/page/V4/User_Certificates04:07
morganfainbergit seemed like a clear delineation04:07
morganfainberg:)04:07
ayounggnigh04:11
*** ayoung has quit IRC04:11
jamielennoxah - missed all that04:13
jamielennoxmorganfainberg: i think with the split to ksa we'll need to do more looking at accessinfo than i had initially thought04:16
morganfainbergjamielennox: likely04:17
jamielennoxbut i really don't know if i want a full multiple object cannonical model, all i want is a way to pull information out of the token04:17
jamielennoxand i don't want to start rejecting tokens on the client side because the model isn't quite perfect04:17
morganfainbergjamielennox: we should discuss that because we have an issue where tokens are poorly defined04:18
jamielennoxi don't see us doing a ksa release before summit04:18
jamielennoxi was hoping the gerrit would be done by now, but either way we can look at it then04:18
morganfainbergjamielennox: i actually expect us to do a 0.x release early04:18
morganfainbergfor testing04:18
morganfainberga 1.x post summit04:18
jamielennoxok, well either way we can't change the property interface that AccessInfo currently has so we can stick with that initially and figure out adams thing later04:19
morganfainbergin 1.x we can make that change04:19
morganfainbergbut the key is we should be discussing that at the summit at the very least04:20
*** jaosorior has joined #openstack-keystone04:34
*** kiran-r has joined #openstack-keystone04:42
*** lhcheng has quit IRC04:47
*** markvoelker has joined #openstack-keystone04:47
*** lhcheng has joined #openstack-keystone05:28
*** ChanServ sets mode: +v lhcheng05:28
*** ajayaa has joined #openstack-keystone05:29
*** rushiagr_away is now known as rushiagr05:29
*** rm_work|away is now known as rm_work05:32
*** mflobo has quit IRC05:42
*** harlowja_ is now known as harlowja_away05:53
*** josecastroleon has joined #openstack-keystone06:01
*** david8hu has quit IRC06:03
*** david8hu has joined #openstack-keystone06:03
*** stevemar has quit IRC06:04
*** krotscheck has quit IRC06:05
*** krotscheck has joined #openstack-keystone06:05
*** henrynash has joined #openstack-keystone06:06
*** ChanServ sets mode: +v henrynash06:06
*** mabrams has joined #openstack-keystone06:06
*** josecastroleon has quit IRC06:09
*** josecastroleon has joined #openstack-keystone06:09
*** lhcheng has quit IRC06:12
*** mflobo has joined #openstack-keystone06:15
openstackgerritJamie Lennox proposed openstack/keystone: Move endpoint_policy migrations into keystone core  https://review.openstack.org/17191606:17
openstackgerritJamie Lennox proposed openstack/keystone: Move endpoint policy into keystone core  https://review.openstack.org/17144806:17
*** mabrams has quit IRC06:35
*** mabrams has joined #openstack-keystone06:36
*** spandhe has joined #openstack-keystone06:39
*** e0ne has joined #openstack-keystone06:39
*** browne has quit IRC06:49
*** browne has joined #openstack-keystone06:50
*** ajayaa has quit IRC06:50
*** spandhe has quit IRC07:10
*** ajayaa has joined #openstack-keystone07:11
*** ajayaa has quit IRC07:21
*** pcaruana has joined #openstack-keystone07:33
*** ajayaa has joined #openstack-keystone07:33
*** afazekas_ has joined #openstack-keystone07:39
*** e0ne has quit IRC07:41
*** erkules_ has quit IRC07:43
marekdjamielennox: hi, still here?07:44
marekdjamielennox: how about symlinking files?07:44
marekdhttps://review.openstack.org/#/c/177704/07:44
*** markvoelker has quit IRC07:44
*** rushiagr is now known as rushiagr_away07:46
*** rushiagr_away is now known as rushiagr07:49
*** abhijeetm has joined #openstack-keystone07:50
*** abhijeetm has quit IRC07:52
*** jistr has joined #openstack-keystone07:55
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Rename v3/federated.py to v3/federation.py  https://review.openstack.org/17770407:57
*** ajayaa has quit IRC08:00
*** ajayaa has joined #openstack-keystone08:13
*** markvoelker has joined #openstack-keystone08:15
*** markvoelker has quit IRC08:20
*** openstackgerrit has quit IRC08:20
*** openstackgerrit has joined #openstack-keystone08:21
*** ncoghlan has quit IRC08:26
openstackgerritVictor Stinner proposed openstack/keystonemiddleware: Port keystonemiddleware to Python 3  https://review.openstack.org/17770108:30
*** ajayaa has quit IRC08:51
*** ajayaa has joined #openstack-keystone09:02
*** fhubik has joined #openstack-keystone09:04
*** e0ne has joined #openstack-keystone09:05
*** aix has joined #openstack-keystone09:07
*** markvoelker has joined #openstack-keystone09:16
*** browne has quit IRC09:19
*** markvoelker has quit IRC09:21
*** fhubik is now known as fhubik_afk09:22
*** fhubik_afk is now known as fhubik09:22
*** rushiagr is now known as rushiagr_away09:52
*** fhubik is now known as fhubik_afk09:57
*** fifieldt has quit IRC09:58
*** xianghui has quit IRC10:04
*** xianghui has joined #openstack-keystone10:04
*** xianghui has quit IRC10:07
*** dims has joined #openstack-keystone10:12
*** markvoelker has joined #openstack-keystone10:17
*** fhubik_afk is now known as fhubik10:20
*** markvoelker has quit IRC10:21
*** zigo has quit IRC10:29
*** samueldmq has joined #openstack-keystone10:33
samueldmqmorning10:33
*** e0ne is now known as e0ne_10:33
*** zigo_ has joined #openstack-keystone10:33
*** e0ne_ has quit IRC10:35
*** e0ne has joined #openstack-keystone10:39
*** aix has quit IRC10:47
*** henrynash has quit IRC10:50
*** fhubik is now known as fhubik_afk10:52
*** jamielennox is now known as jamielennox|away10:57
*** e0ne is now known as e0ne_10:58
*** aix has joined #openstack-keystone10:58
marekdMorning.11:04
*** mabrams has left #openstack-keystone11:04
*** e0ne_ has quit IRC11:09
morganfainbergMornin.11:12
bretonmorning11:15
*** markvoelker has joined #openstack-keystone11:18
*** markvoelker has quit IRC11:23
marekdmorganfainberg: whoa, morganfainberg so unusual to have you here soooo early!11:23
morganfainbergmarekd: on the east coast until tomorrow.11:23
*** e0ne has joined #openstack-keystone11:26
*** jistr is now known as jistr|class11:34
*** aix has quit IRC11:34
*** dims has quit IRC11:44
samueldmqmorning :)11:45
*** rushiagr_away is now known as rushiagr11:46
*** rushiagr is now known as rushiagr_away11:48
*** aix has joined #openstack-keystone11:50
*** dims has joined #openstack-keystone11:51
*** fhubik_afk is now known as fhubik12:03
*** erkules_ has joined #openstack-keystone12:03
*** bdossant has joined #openstack-keystone12:04
*** rushiagr_away is now known as rushiagr12:06
*** markvoelker has joined #openstack-keystone12:13
*** iurygregory has joined #openstack-keystone12:14
*** ajayaa has quit IRC12:19
*** Ephur has joined #openstack-keystone12:20
*** kiran-r has quit IRC12:29
*** gordc has joined #openstack-keystone12:35
*** mordred has quit IRC12:35
*** mordred has joined #openstack-keystone12:35
*** rushiagr is now known as rushiagr_away12:36
-openstackstatus- NOTICE: Gate is experiencing epic failures due to issues with mirrors, work is underway to mitigate and return to normal levels of sanity12:41
*** ChanServ changes topic to "Gate is experiencing epic failures due to issues with mirrors, work is underway to mitigate and return to normal levels of sanity"12:41
openstackgerritDavid Charles Kennedy proposed openstack/keystonemiddleware: enforce endpoint constraint  https://review.openstack.org/17766112:47
samueldmqdstanek, hi - let me know when you're around12:51
samueldmqdstanek, would like to discuss about the devstack + keystone 500 error12:51
dstaneksamueldmq: i'm here12:51
samueldmqdstanek, hi, do you have any news ?12:51
samueldmqdstanek, I am always getting the 500 and I can see the assignment controllers import error on keystone log12:52
samueldmqdstanek, at /var/log/apache2/keystone.log12:52
samueldmqdstanek, also, I can't import in from python12:52
dstaneksamueldmq: no, i'm not having that problem on fedora12:54
samueldmqdstanek, hmm, so maybe that's a specific ubuntu 14.04 issue ... :/12:54
samueldmqdstanek, and I suppose infra doesn't use this image (as gate jobs still work)12:55
dstanekfedora is busted for me though :-(12:55
dstaneki get this http://paste.openstack.org/show/210138/12:55
samueldmq dstanek it's the same, isnt ?12:56
dstanekwhat's the same?12:57
samueldmq'Unable to establish connection' actually could be a bunch of possible errors (500, 404) ...12:57
samueldmqUnable to establish connection to http://10.0.2.15:35357/v2.0/tokens12:57
dstaneksamueldmq: no, that should mean that nothing is listening on that port12:58
dstanekbefore i was actually seeing keystone up and running, but returning 500s in a few requests12:58
samueldmqdstanek, this is so scary12:59
*** bknudson has joined #openstack-keystone12:59
*** ChanServ sets mode: +v bknudson12:59
samueldmqdstanek, for the error I am getting, I googled and found that Import error, could not import name 'controllers' could be caused by cyclical dependencies13:00
*** jimbaker has quit IRC13:00
samueldmqdstanek, which is unlikely since it working on other places13:01
*** jistr|class is now known as jistr13:01
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Prohibit invalid ids in subtree and parents list  https://review.openstack.org/15872013:04
*** jimbaker has joined #openstack-keystone13:04
*** jimbaker has quit IRC13:04
*** jimbaker has joined #openstack-keystone13:04
*** ajayaa has joined #openstack-keystone13:07
*** raginbajin has quit IRC13:08
*** raginbajin has joined #openstack-keystone13:09
*** edmondsw has joined #openstack-keystone13:09
*** nkinder has quit IRC13:11
dstaneksamueldmq: that could be cyclic dependencies or possibly other things13:21
dstaneki don't think we are doing anything exotic with import anywhere13:21
dstaneksamueldmq: actually my issue may be a memory issue13:24
samueldmqdstanek, why ? because it works randomly ?13:25
dstanekno, because i'm seeing memory issue in the logs - i moved to fedora20 yesterday because i didn't have enough time to debug the ubuntu issue13:26
*** krykowski has joined #openstack-keystone13:26
dstaneki'm giving a talk on Friday and found out over the weekend that they don't have wifi so i've been trying to get screenshots to mimic what i was going to do live13:26
dstanek:-(13:26
samueldmqdstanek, and you need devstack right /13:28
*** e0ne is now known as e0ne_13:28
samueldmqdstanek, maybe I can get you a working vm if this helps :)13:28
dstanek:-) i just started creating a devstack instance in Rackspace's public cloud - i really wanted it locally, but i don't seem to have enough horsepower13:29
dstaneki need to upgrade my hardware13:31
*** richm has joined #openstack-keystone13:33
*** e0ne_ is now known as e0ne13:37
*** Zanatoz has joined #openstack-keystone13:37
ZanatozI enabled keystone v3 and made my admin account an admin for the default domain but it doesn't allow me to create or edit users in horizon.  Anyone run into the same behavior?13:39
*** amakarov_away is now known as amakarov13:40
*** sigmavirus24_awa is now known as sigmavirus2413:40
*** stevemar has joined #openstack-keystone13:44
*** ChanServ sets mode: +v stevemar13:44
openstackgerritVictor Stinner proposed openstack/python-keystoneclient: Remove discover and iso8601 dependencies  https://review.openstack.org/17768713:59
marekd dstanek still on macbook air?14:00
dstanekmarekd: yep14:03
*** nkinder has joined #openstack-keystone14:05
*** rushil has joined #openstack-keystone14:05
*** dims has quit IRC14:15
*** dims has joined #openstack-keystone14:15
*** fmarco76 has joined #openstack-keystone14:16
*** fmarco76 has quit IRC14:16
*** ajayaa has quit IRC14:17
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone-specs: Dual Scoped Token  https://review.openstack.org/17605414:17
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone-specs: API changes for Reseller  https://review.openstack.org/15300714:17
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone-specs: Recursive deletion  https://review.openstack.org/14873014:18
*** zzzeek has joined #openstack-keystone14:19
*** fhubik has quit IRC14:23
dstanekmarekd: i was thinking of getting an x1, but i really want 16gb ram14:23
*** ayoung has joined #openstack-keystone14:25
*** ChanServ sets mode: +v ayoung14:25
*** mattfarina has joined #openstack-keystone14:28
*** mflobo has left #openstack-keystone14:29
*** josecastroleon has quit IRC14:31
*** josecastroleon has joined #openstack-keystone14:31
*** notmyname has quit IRC14:31
*** rushil has quit IRC14:33
*** afazekas_ has quit IRC14:33
*** notmyname has joined #openstack-keystone14:34
*** browne has joined #openstack-keystone14:34
*** mflobo has joined #openstack-keystone14:38
*** pnavarro has joined #openstack-keystone14:39
morganfainbergdstanek: the 8gb of ram is an issue with the x1 and xps13 developer14:40
morganfainbergdstanek: you could go with a 13" mbpr14:40
morganfainbergAnd install Linux on it. :P14:41
*** joesavak has joined #openstack-keystone14:41
bknudsondrop X windows so you have more memory14:41
*** ajayaa has joined #openstack-keystone14:44
*** mattfarina has quit IRC14:44
dstanekmorganfainberg: i don't think i want to go the apple route again - although the hardware lasts longer than anything i've ever had14:45
dstanekbknudson: :-P14:45
marekddstanek: why no apple?14:46
marekddstanek: TBH i am thinking about starting my journey with apple....14:46
dstaneki'm not a fan of OSX14:46
morganfainbergdstanek: I don't get why ultrabooks all have 8gb of ram max. It is lame.14:47
morganfainbergX1, xps13, etc. all only 8gb of ram.14:47
morganfainbergI want 1Tb of ram.14:47
morganfainberg:P14:47
stevemarmarekd, i'm going to be forced to start a journey with apple soon14:47
dstanekstevemar: run!14:47
marekdstevemar: how come?14:47
stevemarwe're getting some at work, i think, that's the rumor14:48
bknudsonstevemar drank the kool-aid.14:48
marekdstevemar: IBM bought Apple? :P14:48
stevemarmarekd, lol14:48
morganfainbergbknudson: koooooooooooool aid.....14:48
*** henrynash has joined #openstack-keystone14:48
*** ChanServ sets mode: +v henrynash14:48
dstanekOSX was usable (not awesome, but usable) until Yosemite broke everything  - and i really miss linux14:49
morganfainbergmarekd: I heard apple bought IBM </unsubstantiated rumor>14:49
morganfainbergdstanek: Yosemite is a trainwreck of an OS14:49
dstanekno hacky package  management using brew, no unavoidable issues will Apple controlled libs (ldap, ssl, etc)14:49
bknudsonI thought we just ran a VM for development anyways.14:50
marekdmorganfainberg: i am not at the either of those sides (apple, ibm), so I will not despair...or maybe after they destroy T or X Lenovo lines.14:50
stevemarmarekd, use a W :P14:51
marekdB(rick, you said? :P14:51
marekdB(rick)14:51
stevemaryup14:51
marekdmy eyes are getting worse and worse, but I am also becomming a fan of smaller laptops.14:52
dstaneki wish lenovo would let me filter laptops by ram and size14:52
*** henrynash has quit IRC14:52
marekdso i have T430 14 inch and 12.5 x230 and I really find that 14 inch laptop HEAVY14:52
dstanekstevemar: is ibm moving to apple?14:52
bknudsonMem:  32509048k total, 32239544k used,   269504k free,   626828k buffers14:52
stevemardstanek, doubt it - but apparently some teams can ask for them14:54
dstanekmarekd: aren't those only 4lbs?14:54
marekddstanek: which ones?14:54
bknudsonyou could always bring your own mac.14:54
marekddstanek: 12.5 or 1414:55
*** ajayaa has quit IRC14:57
marekdheh, so at cern i could either take mac or lenovo/dell, wanted a small screen to make it as portable as possible and honestly i  got scared that small screen without tiling WMs I am used to would be not enough.15:00
dstaneki thought the 14. i've been looking through lots of laptops recently15:01
*** henrynash has joined #openstack-keystone15:01
*** ChanServ sets mode: +v henrynash15:01
marekddstanek: i have 9 cell battery15:02
dstanekmarekd: haha15:02
dstanekthere's your problem right there15:02
marekddstanek: battery?15:02
dstanekyeah. 3lb laptop w/ 8lb battery :-)15:03
marekdi don't have any problem since I have my x23015:03
marekd(and extra 4gb of RAM)15:04
*** e0ne is now known as e0ne_15:04
*** e0ne_ is now known as e0ne15:05
*** rushiagr_away is now known as rushiagr15:09
*** samueldmq_ has joined #openstack-keystone15:14
ayoungmarekd, OK,  I have a public demo of the ECP/SAML/Keystone setup15:16
marekdWhat's the difference between public, admin and internal urls in the endpoint?15:16
marekdayoung: public idp you mean?15:16
*** joesavak has quit IRC15:16
*** ChanServ sets mode: +v marekd15:17
ayoungmarekd, yep15:17
ayoungmarekd, ipa.younglogic.net  and rdo.younglogic.net for Horizon15:18
*** ajayaa has joined #openstack-keystone15:18
rodrigodsayoung, nice!15:18
marekdayoung: i can try to setup my VM with that15:18
rodrigodsayoung, create an account for me! :)15:19
marekdayoung: http://rdo.younglogic.net:5000/v3/OS-FEDERATION/identity_providers/ipsilon/protocols/saml2/auth/mellon/metadata why mellon/metadata at the end?15:20
marekdand yes, can i have an account there?15:20
marekdayoung: FYI, emailed jdennis yesterday and awaiting his response now.15:20
*** joesavak has joined #openstack-keystone15:21
stevemarayoung, i'm in!15:23
ayoungstevemar, have you worked with ECP at all?15:23
stevemaryeah, waaaay back when when we first started with our federation adventure15:23
marekdstevemar: i think stevemar was the one who confirmed it worked with IBM IdP.15:24
stevemaryep15:24
stevemarthat was a pain =\15:24
stevemarayoung, i have an admin role on this cloud :D15:25
stevemarsomething is a bit buggy with horizon i think15:25
stevemargetting a lot of error popups on the top right15:26
ayoungstevemar, yeah,something is not quite right in the RDO set up.15:26
stevemardoes rdo have the latest DOA?15:26
marekdayoung: account pls?15:26
stevemari think lhcheng cleaned up those error15:26
stevemarmarekd, we can share one?15:26
ayoungI have a dev here in house I'm going to be talking to...I'll check back on IRC in a bit...15:26
marekdstevemar: yes, please15:26
*** davidckennedy has joined #openstack-keystone15:26
Zanatozwhen I log into horizon with v3 keystone enabled I get  RBAC: Invalid token and I can't modify users.  anyone see this kind of behavior before?15:27
*** henrynash has quit IRC15:28
*** jsavak has joined #openstack-keystone15:31
*** joesavak has quit IRC15:34
-openstackstatus- NOTICE: gerrit has been restarted to clear an issue with its event stream. any change events between 14:43-15:30 utc should be rechecked or have their approval votes reapplied to trigger jobs15:36
*** bdossant has quit IRC15:38
*** _cjones_ has joined #openstack-keystone15:40
*** _cjones_ has quit IRC15:42
*** joesavak has joined #openstack-keystone15:43
*** jsavak has quit IRC15:43
*** lhcheng has joined #openstack-keystone15:44
*** ChanServ sets mode: +v lhcheng15:44
*** _cjones_ has joined #openstack-keystone15:45
*** lhcheng has quit IRC15:45
*** lhcheng has joined #openstack-keystone15:45
*** ChanServ sets mode: +v lhcheng15:45
marekdbknudson: re: https://review.openstack.org/#/c/177704/ so when we deprecate whole class...where should it print any depr. warnings? When using *any* of the method from the deprecated class ?15:45
bknudsonmarekd: it can happen at import time if the whole module is deprecated.15:49
*** rushiagr is now known as rushiagr_away15:50
morganfainbergRc2 *is* Kilo release. Release will happen on Thursday before normal us time(s)15:52
*** ChanServ changes topic to "Liberty Development Open | Review Liberty Specs | Provide feedback on Liberty Priorities: https://etherpad.openstack.org/p/keystone-liberty-priority-specs"15:52
*** tqtran has joined #openstack-keystone16:01
*** jistr has quit IRC16:02
*** joesavak has quit IRC16:03
*** samueldmq_ has quit IRC16:04
*** joesavak has joined #openstack-keystone16:11
*** pcaruana has quit IRC16:14
*** Bjoern__ has joined #openstack-keystone16:15
*** kiran-r has joined #openstack-keystone16:15
*** Bjoern__ is now known as bjoernT16:16
*** bjoernT is now known as BjoernT16:16
ayoungmorganfainberg, good to know16:17
ayoungmarekd, I'll give you an account16:17
marekdbknudson: ok, maybe there is some code so I could see how it was implemented in somewhere else ?16:18
bknudsonmarekd: you should be able to use the standard warnings module.16:19
*** alexsyip has joined #openstack-keystone16:21
*** krykowski has quit IRC16:25
openstackgerritDavid Charles Kennedy proposed openstack/keystone: Service with no endpoints should not be in catalog  https://review.openstack.org/17638316:27
*** davidckennedy has quit IRC16:27
ayoungstevemar, the mapping I set up is pretty simplistic.  I  did something more complex when using SSSD, but making the mapping sometihg the end user can modify is going to be very important, I think, once Federation takes off16:35
marekdbknudson: I see some examples here: https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/apiclient/__init__.py#L25-L27 but on the other hand there is also this https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/shell.py#L59-L67 Looks like the latter is the correct way of doing that right?16:38
bknudsonmarekd: the former is fine.16:41
bknudsonthe change in shell.py was just so that the warning would always be printed.16:41
bknudsonbut in the case of a library it should be the application that's configuring the warnings library16:42
marekdbknudson: which will probably never happen....16:42
bknudsony, but it's their choice16:42
marekdunderstood.16:43
*** browne has quit IRC16:50
*** gyee has joined #openstack-keystone16:51
*** ChanServ sets mode: +v gyee16:51
*** e0ne has quit IRC16:52
*** josecastroleon has quit IRC17:00
*** henrynash has joined #openstack-keystone17:03
*** ChanServ sets mode: +v henrynash17:03
*** rushil has joined #openstack-keystone17:03
*** joesavak has quit IRC17:05
*** joesavak has joined #openstack-keystone17:05
*** joesavak has quit IRC17:06
*** _cjones_ has quit IRC17:06
morganfainbergjamielennox|away: ping http://logs.openstack.org/86/177186/3/check/check-tempest-dsvm-full/38a8915//logs/screen-n-api.txt.gz?level=WARNING#_2015-04-28_16_07_18_79317:07
morganfainbergjamielennox|away: we are seeing tons and tons and tons and tons of these across a lot of services17:07
morganfainbergjamielennox|away: this doesn't look super useful as a warning17:07
openstackgerritMorgan Fainberg proposed openstack/keystonemiddleware: Remove superfluous / spammy log line  https://review.openstack.org/17829217:08
bknudsonlibraries really shouldn't log anything above debug.17:08
bknudsonif they need to tell the application about an issue then provide a callback or something.17:08
ayoungmorganfainberg, do you know what was meant on the Sumit brainstorm ehter pad line 68 https://etherpad.openstack.org/p/Keystone-liberty-summit-brainstorm17:09
ayoungDeprecation of non-HA stuff17:09
morganfainbergbknudson: correct.17:09
ayoungwhat non HA stuff specifically?17:09
morganfainberguhm17:09
morganfainbergno idea17:09
morganfainbergbknudson: warning - something an operator really should care about17:10
morganfainbergbknudson: esp in keystonemiddleware17:10
*** ir2ivps8_ has quit IRC17:11
ayoungmorganfainberg, cuz we have someone talking on HA Keystone at the summit.  My team's Program Manager.17:11
ayoungand would really like to be in sync with that17:11
ayounghttps://openstacksummitmay2015vancouver.sched.org/event/0ff177c7525d10423ddf638ffa69c1fd#.VT-_i7seEa017:12
morganfainberghttps://review.openstack.org/#/q/Iab569a14a9f3268abef6bc36e46cf15dc16564b9,n,z could use some review love btw17:12
morganfainbergshould be *really* easy17:12
ayoungmorganfainberg, so if there is anything we want to get the message out about HA..that is a good channel17:13
ayoungmorganfainberg, I'll trade you that for an AccessInfo review17:14
morganfainbergayoung: thats not a fair trade btw17:15
ayoungmorganfainberg, life is not fair17:15
samueldmqmorganfainberg, I've added 'FKs constraints between model entities defined at common/models.py and enforced on managers using an annotation'17:15
morganfainbergayoung: those ^^ should go out as .Z releases17:15
openstackgerritDavid Stanek proposed openstack/keystone: Why worry about py33. py34 ftw.  https://review.openstack.org/17829617:15
openstackgerritLin Hua Cheng proposed openstack/keystonemiddleware: Remove superfluous / spammy log line  https://review.openstack.org/17829217:15
morganfainbergayoung: like today if they merge btw.17:15
ayoungmorganfainberg, +2 +1 from me17:15
samueldmqmorganfainberg, is this too detailed for now ? or I can add specific things like this ^17:15
morganfainbergayoung: i'm at a conference so i'll try and look at the accessinfo today17:15
morganfainbergif not today when i;m home on thursday17:15
ayoungmorganfainberg, thanks17:15
samueldmqayoung, cc  ^17:16
ayoungsamueldmq, which review?17:16
samueldmqayoung, I am talking about the etherpad of ideas to L17:17
samueldmqayoung, L 7517:17
ayoungsamueldmq, ++  excpet maybe for the use of annotation ,which I hate but might be the only way17:17
*** markvoelker has quit IRC17:18
openstackgerritayoung proposed openstack/python-keystoneclient: Inherit roles project calls on keystoneclient v3  https://review.openstack.org/16761317:18
samueldmqayoung, ahah let's let the idea there :) and  hten we decide how to implement17:18
samueldmqayoung, and like this we will stop having bugs on things that aren't properly validated17:18
ayounghtruta, please do a review -d 167613 before making changes17:18
ayoungsamueldmq, maybe...I am trying, though, to push splitting off  more microservices from Keystone.  For example, policy might become its own service.17:20
*** _cjones_ has joined #openstack-keystone17:20
stevemarayoung, it pretty much is at this poiint17:21
*** harlowja_away is now known as harlowja_17:21
ayoungstevemar, exactly, and the Kent folks are working on some DB code that uses dnf.  THe library is Py3 only17:22
stevemardnf?17:22
ayoungI think that is the format...let me check17:22
samueldmqhehe17:22
ayoungstevemar, \`Disjunctive Normal Form (DNF)`: http://en.wikipedia.org/wiki/Disjunctive_normal_form17:23
samueldmqayoung, I dont see a big advantage on having separate microservices ... since they will always be deployed together ..17:23
ayoungwhich, of course clashes with the Yum replacement17:23
bknudsonthey can be scaled separately17:23
samueldmqayoung, it's much bettter to have a consistent and well organized architecture, as well mostly have today17:23
ayoungsamueldmq, also, separation of concerns17:24
samueldmqbknudson, yeah, that should be good for identity17:24
ayoungplus, it is easier to enforce API stability at the web level than at the python level, as morganfainberg will tell you17:24
samueldmqbut I dont see the need to separate other than that17:24
ayoungIdentity on one server .   Federation and assignment together.  Policy a third server.17:25
ayoungEC2  and the other extension somewhere over there...17:25
*** samleon has joined #openstack-keystone17:25
samueldmqshouldnt federation be much more identity than assignment ?17:25
samueldmqI mean, it's about identity, isnt it ?17:26
samueldmqayoung, anyway, it's a separate discussion, and just to clarify, I like identity going as a separate microservice17:27
samueldmq:)17:27
*** e0ne has joined #openstack-keystone17:28
samueldmqbknudson, ayoung hmm, microservices doesn't mean separate repos17:32
samueldmqwe just separate the rest applicaitons, I am right ?17:32
bknudsonseparate repos makes more sense to me since then you have a clear separation17:33
samueldmqI did something like this when I started on OpenStack .. I created a guide for scaling out the heat-api17:33
samueldmqhttp://docs.openstack.org/developer/heat/scale_deployment.html17:33
samueldmqbknudson, and then we will need a sort of devstack-keystone ot have keystone server running ?17:34
*** ir2ivps8_ has joined #openstack-keystone17:34
bknudsonit's already easy to run only keystone in devstack17:34
morganfainbergbknudson: we might need a ds-g config for it (in the matrix)17:35
morganfainbergbut otherwise yes it's easy17:35
bknudsonthe only odd thing is that keystone-only devstack requires configuring a message broker.17:35
*** aix has quit IRC17:36
morganfainbergbknudson: does it?17:36
samueldmqsounds good, I am just concerned on how we split things, to not have unnecessary granularity17:36
bknudsonI always set ENABLED_SERVICES=key,mysql,rabbit17:36
bknudsonmaybe that's changed17:36
*** henrynash has quit IRC17:36
*** _cjones_ has quit IRC17:39
marekdbknudson: and what happens if you skip rabbit?17:40
*** _cjones_ has joined #openstack-keystone17:42
*** grizz_ has joined #openstack-keystone17:42
*** mattamizer has joined #openstack-keystone17:43
bknudsonmarekd: it works fine now. Somebody must have fixed it.17:44
morganfainbergmarekd: have some questions re keystone behavior for metadata stuff17:47
morganfainbergmarekd: will need to wait until later this week17:47
morganfainbergbut - some interesting questions about behavior with aggregates for identity17:48
marekdmorganfainberg: sure.17:48
marekdmorganfainberg: next ksc version released will be 1.3.2, right?17:49
*** markvoelker has joined #openstack-keystone17:49
morganfainbergmarekd: for kilo, yes17:49
bknudsonshould be 2.0.0 since we removed middleware17:49
morganfainbergmarekd, for master no.17:49
morganfainbergmarekd: looking at 2.x.x17:49
morganfainbergbknudson: yes17:50
bknudsonwe could get rid of other deprecated cruft too if there is any17:50
morganfainbergbknudson: i'd like to also do the keystoneauth switch-over when we cut 2.x.x if possible17:50
morganfainbergbknudson: trying to push through the keystoneauth repo todya17:50
marekdmorganfainberg: bknudson so what version shall i specify in the auth/identity/v3/federated.py ? 1.3.2 or 2.0.0 ?17:50
*** kiran-r has quit IRC17:51
morganfainbergmarekd: uhmmm...17:51
bknudsonmarekd: whatever's in global-requirements: http://git.openstack.org/cgit/openstack/requirements/tree/global-requirements.txt17:51
morganfainbergmarekd: ^^17:51
bknudsonand if the version in g-r isn't new enough then bump it up.17:51
bknudsonhttp://git.openstack.org/cgit/openstack/requirements/tree/global-requirements.txt#n12417:52
rodrigodsmarekd, stevemar could use some reviews here https://review.openstack.org/#/c/172536/ :) (and in the following patch)17:52
marekdrodrigods: perhaps after the meeting, ok ?17:52
rodrigods++17:52
*** markvoelker has quit IRC17:54
marekdbknudson: is there any reason why g-r has ksc 1.1.0 whereas  pypi has 1.3.2 ? Different release cycles or g-r is simply outdated?17:55
bknudsonmarekd: there's nothing that requires a newer version of keystoneclient yet.17:55
*** itlinux has joined #openstack-keystone17:56
bknudsonI've got a review out to up it to 1.3.0: https://review.openstack.org/#/c/168187/17:56
itlinuxhi Adam, how are you doing?17:56
bknudsonproposed over a month ago.17:56
*** henrynash has joined #openstack-keystone17:57
*** ChanServ sets mode: +v henrynash17:57
*** rushil has quit IRC17:57
*** e0ne has quit IRC17:58
*** ir2ivps8_ has quit IRC17:58
marekdbknudson: ok, i am little confused. We are at the 1.3.1 version of ksc, so it looks illogical to specify that I deprecate something since 1.1.0...17:58
morganfainbergalmost meeting time (hey having the meeting *POST* lunch is nice)17:58
* morganfainberg should move to the east coast or something.17:59
samueldmqmorganfainberg, hehe :)17:59
marekdmorganfainberg: werent you supposed to move somewhere to NYC?17:59
bknudsonmarekd: that would be illogical... it'll be deprecated as of the next release.17:59
samueldmqayoung, just to keep you updated, I did some changes on the overview spec18:00
samueldmqayoung, will wait for post-meeting when we decide the scope of hierarchical roles18:00
ayoungsamueldmq, too much notification.  I assure you I will see it18:00
*** samleon has quit IRC18:00
ayoungBut I appreciate your enthusiasm18:00
marekdbknudson: correct.18:00
marekdbknudson: but still, there will be two release numbers.18:01
samueldmqayoung, just want you to know I am planning to run fast with it, as you're doing18:01
bknudsonmarekd: how are there 2 release numbers?18:01
ayoungYou are running.  I am sitting on my Kiester18:01
samueldmqayoung, nah, we run together18:01
marekdbknudson: 1.3.2 for kilo and 2.0.018:01
marekdfor master18:01
marekdanyways, i mist have messed something up.18:01
bknudsonoh, this change is backported? I don't have a problem with reporting something as deprecated in backported change.18:03
*** jamielennox|away is now known as jamielennox18:04
*** _cjones_ has quit IRC18:05
*** BjoernT has left #openstack-keystone18:05
*** browne has joined #openstack-keystone18:09
*** iamjarvo has joined #openstack-keystone18:19
*** tqtran has quit IRC18:19
dolphmsamueldmq: my normal process for writing release notes is to gather a list of links to every Wishlist bug and blueprint implemented in the cycle, then start replacing those links with corresponding release notes18:23
*** ir2ivps8_ has joined #openstack-keystone18:23
dolphmsamueldmq: we can do that in an etherpad to iterate faster, and then put the result into the wiki for broader collaboration18:23
samueldmqdolphm, ++ https://etherpad.openstack.org/p/keystone-kilo-release-notes18:24
dolphmsamueldmq: cool18:24
*** mattamizer has quit IRC18:28
*** grizz_ has quit IRC18:30
samueldmqdolphm, done, I've got the info available on the links for the versions18:33
marekdgyee: sadly, never heard of conductor - what's the purpose of that. Somekind of interface/stub class for drivers?18:33
samueldmqdolphm, but in the link for  K-1 there is only 2 bps, and you put 3 on the etherpad .. I wonder if there is another place to look into18:33
dolphmsamueldmq: sweet, next step is to write a release note for each, but some links won't deserve mention in the release notes18:34
dolphmsamueldmq: like this one https://bugs.launchpad.net/keystone/+bug/143898318:34
openstackLaunchpad bug 1438983 in Keystone "The directory holding dev docs is "doc" instead of "docs"." [Wishlist,Fix released] - Assigned to DWang (darren-wang)18:34
dolphmsamueldmq: I'd argue that one should really have been a Low impact, not Wishlist18:34
samueldmqdolphm, basically nits or something we don't have much to talk18:34
dolphmsamueldmq: if it doesn't impact end users, it doesn't deserve mention in the release notes18:35
samueldmqdolphm, ++18:35
dolphmsamueldmq: some wishlist bugs legitimately only impact keystone developers, for example18:35
samueldmqdolphm, also, there is a bunch of bugs as Undefined or kilo-318:35
dolphmsamueldmq: i'll look at triaging those then first18:36
samueldmqdolphm, I just included the ones clearly marked as Wishlist18:36
dolphmsamueldmq: if i triage anymore as wishlist, i'll include them18:36
samueldmqdolphm, nice thanks18:36
samueldmqdolphm, also, make sure there isn't any other bug/blueprint that is not in that list and need to be included18:37
samueldmqdolphm, I saw you included 'Provide Endpoint for ECP wrapped assertions' to kilo-1 (which is not on https://launchpad.net/keystone/+milestone/kilo-1)18:37
stevemardidn't ^ land in kilo3 or kilorc1?18:39
samueldmqstevemar, we don't tag specific releases on the release notes, so I think it doesnt matter at the end18:41
dolphmsamueldmq: which bp was that?18:41
dolphmhttps://blueprints.launchpad.net/keystone/+spec/ecp-wrapped-saml-assertions ?18:41
samueldmqdolphm, L 518:42
dolphmsamueldmq: that's on kilo-rc1, not kilo-118:42
samueldmqdolphm, you added that on the etherpad18:42
dolphmsamueldmq: to kilo-1 or kilo-rc1? (i'm trying to figure out how i made a mistake)18:42
dolphm(in case i made more)18:42
samueldmqdolphm, to k-118:42
dolphmhmm, well: fixed18:43
samueldmqdolphm, yeah I can't check the list in kilo-1 against what is in  https://launchpad.net/keystone/+milestone/kilo-118:43
samueldmqdolphm, also the wishlist bugs ... there are two on the page ^18:43
samueldmqdolphm, and you listed three in the pad18:43
dolphmsamueldmq: it looks like i did kilo-rc1 entirely instead of kilo-118:44
*** _cjones_ has joined #openstack-keystone18:45
dolphmmust have been looking at the wrong page18:45
samueldmqdolphm, can I fix it ?18:46
dolphmsamueldmq: fixed! thanks18:46
samueldmqdolphm, you did, np18:46
samueldmqdolphm, it should be a short description of what was implemented right ?18:46
samueldmqdolphm, feel free to fix something I write badly18:47
dolphmsamueldmq: a short description of what changed, how it impacts the deployer / end user, and i personally like to link to relevant documentation if possible18:49
dolphmsamueldmq: it should basically read like a list of facts18:49
*** markvoelker has joined #openstack-keystone18:49
samueldmqdolphm, got it, I will have most of them by tonight (doing other thing in parallel now)18:51
*** ajayaa has quit IRC18:53
*** erkules_ is now known as erkules18:54
*** markvoelker has quit IRC18:54
dolphmsamueldmq: same - i'm trying to wrap up a few other things first18:54
samueldmqdolphm, ++18:54
gyeedolphm, lbragstad, you didn't get I was joking the first time around18:55
lbragstadgyee: got it, I missed the sarcasm there ;)18:55
dolphmi'm not sure i saw the first comment18:55
*** samueldmq_ has joined #openstack-keystone18:56
gyeeI was responding to marekd's "i think we will have to stick with token-per-cloud for now." comment18:56
marekdgyee felt offended :P18:57
gyeenoooh, I was merely having fun18:58
marekddolphm: nobody wants to blindly share any tokens....18:58
marekdif share that there would be a clear boundary on access, so admin@cloudA will not mean admin@cloudB18:59
*** e0ne has joined #openstack-keystone18:59
ayoungOk.. henrynash hierarchical roles19:00
dolphmmarekd: secret gist of fernet keys can provide clear boundary between clouds19:01
ayoungor, as I preferred to call them, implied roles19:01
*** geoffarnold has joined #openstack-keystone19:01
*** Rockyg has joined #openstack-keystone19:01
gyeeayoung, call them nested groups19:01
marekddolphm: then you are safe19:01
dolphmgyee: that's what trusts are for19:01
dolphmmorganfainberg: i think? ^19:01
*** ioram has joined #openstack-keystone19:01
ayounggyee, they  are really sets19:01
gyeedolphm, right, federation is a form of trust19:01
ayoungif the bottom level permission is the API you are calling, then a role is a set of APIs19:02
amakarovgyee, and a trust is a form of assignment ))19:02
gyeeamakarov, full circle :)19:02
morganfainbergdolphm: hmm?19:02
morganfainbergdolphm: hah secret gist of fernet keys19:02
morganfainbergdolphm: wow, such secure ;)19:02
ayounggyee, but I need henrynash as he's the one that -2ed it19:03
ayoungand I think I know why19:03
gyeehenrynash's objection over naming?19:03
ayounghttps://review.openstack.org/#/c/125704/19:04
ayoungDAMNIT HENRY GET IN HERE!19:04
haneefdoes keytone team own pycadf?19:04
ayounghaneef, yep19:04
morganfainberghaneef: yes19:04
dolphmhaneef: ye19:04
samueldmqayoung, hi, I am on the boat of role-groups :)19:04
morganfainberghaneef: though it is a different core group than keystone-core19:04
samueldmqayoung, I can talk about it if you need to19:04
stevemarhaneef, yep19:04
samueldmqbut yeah it would be great to discuss with henrynash as well19:04
haneefhttps://github.com/openstack/pycadf/blob/master/setup.cfg  -- why do we include service specific conf file in pycadf install?19:04
morganfainbergdolphm: btw, Keystone should be the IAM project not AAA [things you learn when getting asked to talk at conferences]19:04
morganfainbergdolphm: but AAA is cooler19:05
henrynashayoung, samueldmq: so I think I could fo for teh role-grousp idea (especialy as that’s what I called them in teh first first spec)19:05
morganfainberggordc: ping ^ haneef's question19:05
samueldmqhenrynash, yes, I would prefer to have this name back, since we could have groups of global roles19:05
morganfainbergstevemar: unless you know19:05
ayounghenrynash, OK,  I want each token ideally to have only one role-group.19:05
gyeehenrynash, nested role groups19:05
ayounglet's drop the name role for a moment19:05
samueldmqhenrynash, which may not specifically be i na domain19:05
samueldmqhenrynash, right?19:05
stevemarmorganfainberg, haneef in a meeting19:06
ayoungthere are APIs.  like     "compute_extension:admin_actions": "rule:admin_api",19:06
ayoungand we have rules that say a user can operate on that API19:06
henrynashsamueldmq: I guess I don’t see why you shouldn’t allow “global” role-grousp as well as “domain specific ones"19:06
stevemarhaneef, you mean the data files? https://github.com/openstack/pycadf/blob/master/setup.cfg#L25-L3119:06
ayoungnova doens't even check which role for the most part19:06
haneefyes19:06
ayoung"admin_or_owner":  "is_admin:True or project_id:%(project_id)s",19:06
ayoungany role and you can do any of the Owner operations19:07
morganfainbergthose probably belong in the respective projects stevemar.19:07
samueldmqhenrynash, I am agreeing with you, we should have global or domain specific role-groups19:07
ayounghenrynash, so I want to head towards a norm where each API rule has two parts:19:07
gyeeayoung, right, not just nova, if you have any access to the project, you are by definition "owner"19:07
haneefstevemar: everycomponents etc has this file,19:08
ayoung1.  scope.  mostly to make sure we match the project_id correctly19:08
gyeeas ownership is established at the project level right now19:08
ayoungas that as you saw in the cloudsample, can get really tricky19:08
ayoung2.  role19:08
henrynashayoung, samueldmq: the difference in my mind between me views and ayoung’s is that I don’t connect this with any change in token necessarily…i.e. you could do all that I ahve said and tokens never know about role-groups19:08
amakarovdstanek, o/19:08
ayounger... damin I used the term role19:08
amakarovdstanek, is there bp or spec about functional testing?19:09
samueldmqhenrynash, ayoung yeah I think you diverge on where we expand roles19:09
ayounghenrynash, you want the private roles, don't you?  And to make that easy, you just add more public roles to the token?19:09
henrynashayoung, samueldmq: a further extension of the role-groups idea is that we allow the policy engine to know about them (and hecen you can put them ina token)19:09
samueldmqayoung, want ot expand them on the service side, while you want in the keystone (as it is today )19:09
ayounglets call them role-sets, just cuz the name group is used elsewhere19:09
gyeehanrynash, but you do need all the roles in the hierarchy19:10
ayoungand set makes sense, as it is "member-of or not-member-of"19:10
amakarovayoung, amplua!19:10
henrynashgyee: there may or may not  be a (role) hierarchy19:10
henrynashgyee: imho…that’s a further extension19:10
gyeeunless we have "effective roles" which is at the botton of the hierarchy19:11
ayoungso you want: a private role would implcitly get a role-set, and then we add that role set to the token, and on the policy side we convert from role-set to individual operations?19:11
gordchaneef: i believe it related to packaging rpms19:11
gyeethose are the ones recognized by the policies19:11
gordchaneef: https://github.com/openstack/pycadf/commit/f2c5f6305a58f3f69144470409a84b5fc93e61ab19:11
gordchaneef: that said, i'm not really familiar with the entire packaging process19:11
henrynashayoung: was I “you” in that sentance?19:11
ayounghenrynash, yes19:11
henrynashayoung: :-)19:11
ayounghenrynash, I know you were driving toward private roles19:11
ayoungand so I am assuming that is your starting point19:12
ayoungtrying to connect from that through to enforcement19:12
samueldmqhenrynash, ayoung if someone wants , one can implement hierarchies with role-sets19:12
ayoungwe currently enforce on role-name.19:12
henrynashayoung: actually, what I want is to separate the concept of role-sets and policy/token changes….to first decide if we want teh roel set fucntionaly at all19:12
ayounghenrynash, remember, we can't  easily change the token data without a major API revision19:13
haneefgordc:  If you do python setup.py install on keytone or any other service, it gets insalled. rpm is not involved here.  That comment is misleading19:13
henrynashayoung: if we diecde we do (and I think we do)….then we can decie how we solve the token boat problem (which is, I think, the only reaons NOT to expand it on token generation)19:13
ayoungI think we are stuck with roles,19:13
ayoungso a role group would have to remain a server side construct19:13
henrynashayoung: oh….I’m arguing NOT to chaneg the token format!19:13
haneefgordc:  Shouldn't this file go to respective service. why does keystone install get trove audit file?19:13
gyeeayoung, we don't need to change the API so as long as we have "effective roles", which are directly corresponding to the APIs19:13
gyeewe can have one to one mapping19:14
gyeeeffective role  = operation19:14
samueldmq# info domain-roles and hierarchical roles died... role-sets rises ftw19:14
ayounggyee, when you enforce, you enforce on the "effective role"?19:14
samueldmqhenrynash, ayoung  cc ^19:14
gyeeayoung, yes19:14
gyeeotherwise, it will be messy19:14
ayounggyee, and effective roles are grouped together into role-sets19:14
gyeeayoung, yes19:14
ayoungrole-sets *are* roles, as we need to transfer them in the tokens?19:15
gordchaneef: the reason it's managed within pycadf is because the CADF event model isn't adopted beyond a few services.19:15
gyeeayoung, correct, similar to how we resolve group membership today19:15
*** ajayaa has joined #openstack-keystone19:15
gyeeby walking to tree19:15
ayounggyee, yeah, that is what I meant by hierarchical roles.  Its what henrynash -2ed19:15
henrynashayoung: well…I’m trying to say that they are not…..we could implement them without a toekn every seinga role-set19:15
ayoungthat is where I think we need to be19:16
samueldmqgyee, ayoung wants to put role-sets in the token, henrynash doesnt19:16
gordchaneef: i wouldn't mind having those files in the corresponding services... but that needs wide community support. which we didn't have at the time. (and i'm not sure we have now)19:16
gyeenoooh, don't put role set into the token19:16
samueldmqone approach is to have everything as it is today (henrynash)19:16
gyeetoken stay the same19:16
gyeetoken contains "effective roles"19:16
samueldmqgyee, so you agree with henrynahs19:16
gyeethat what henrynash said?19:17
ayounghenrynash, what if we make it really easy to define a new role-set,19:17
ayoungugh,  a role is a Permission-set really19:17
gyeefor the same reason we don't put user groups in the token19:17
*** itlinux has quit IRC19:17
samueldmqgyee, yeah, that is19:17
ayoungif one role inherits another role, it is now a union  permissions explicitly assigned to itself and the other role19:18
samueldmqgyee, and the api to define role-sets would be as the groups one is ... adding and removing individual roles or other role-sets to them19:18
gyeeright, we differentiate between roles and role-sets19:18
gyeeonly roles goes into the token19:18
ayounghenrynash, I think what you want is for the token to have an identifier that links to the private role, and then on the policy side the private role gets expanded out to its individual operations19:19
henrynashayoung, samueldmq: so my big thing is that I feel we are mixing the reasosn for doings things…i.e. we can add role-sets and don’t change tokens….we tehn have a problem of token bloat…how do we solve that…there are different solutions…one is pusing the role-set concet to the policy, another is token set caching (as we discussed breifly at the last mid cycle)19:19
samueldmqayoung, I think this approach goes well as a fiest step19:19
samueldmqayoung, after we can migrate the expasion logic to the services, etc if we decide to19:19
henrynashayoung: nope, I don’t think so19:19
ayounghenrynash, so,  no token bloat19:19
samueldmqayoung, but it's independent19:19
ayounghere is what I think19:19
haneefgordc:  Those services that are using pycadf  will be willing to have the config file there.   If we have these files in pycadf, then  do we plan to release a new version for each services mapping change. In a controller node , we have a copy of these files for each service19:19
ayoungwe take ioram 's code as the starting point19:19
ayounggenerate the policy file from the database19:19
ayounguse the idea of one role containing other roles as one of the inputs19:20
ayoungand generate the policy file from that19:20
ayoungat the individual API level, we specify the lower role possible to execute that API19:20
gordchaneef: got it... i see the issue.19:20
ayoungat the top of the policy file, we have rules generated from the hierarchy19:20
gordchaneef: " Those services that are using pycadf  will be willing to have the config file there" -- is that an assumption?19:21
ayoungso if I get a token that says "Member"  I hit a rule that say "Memeber implies read, writer, and a executor"19:21
ayoungbut, if I want, I could create a token that only has "writer" in it19:21
samueldmqayoung, read, writter and executor can be roles, and Member a role-set19:21
ayoungand then I would be limited to the operatiosn either explicitly assinged to writer, or to any roles it contains19:21
ayoungsamueldmq, writer is a role-set, too19:22
ayoungwriter assumes reader19:22
samueldmqayoung, yeah, so role-sets and in the lowest level we have roles19:22
ayoungbut..sure19:22
gordchaneef: currently, i'm not sure who is consuming the audit middleware aside from ibm and a few other companies (not sure if in production or testing)19:22
samueldmqayoung, as leaf19:22
haneefgordc: Yes. if not why do they even they care about mapping. They should own it otherwise who can verify service  mapping19:23
ayoungroles are sets of operations, and can be defined in terms of unions of other roles19:23
samueldmqayoung, yes I agree19:23
ayounghenrynash, does that still raise warning flags?19:23
henrynashayoung: see, imho, the reason why some us find this hard to swallow is taht you haev pulled in half a dozen differnet things (whcih we may or may not think customers want) rolled these intoa big sollution and that’s the answer…..I guess I’m just wary of making these leaps…..and think that as keystone we should be taking this incrementally, seeing what things customers actually use….if tehy don’t use it ditch it…when they use19:23
henrynashsomething alot and it causes a performace problem, we thensolve it cuase we know its a REAL problem19:23
samueldmqayoung, henrynash, gyee I think the all the policcy thing is changing too much now, we should be conservative and to not change the enforcement, what goes in the token etc19:24
henrynashayoung: /rant odd19:24
gyeeyou don't need to generate any policy files, oslo policy allow you to set the rules directly19:24
henrynashh19:24
henrynash(stops ranting)19:24
ayounghenrynash, so...I could actually implement this now, without server side support.  In fact, it is one of the tools I am going to talk about in the summit policy talk;19:24
ayounglets take that rule I showed before...or better yet..19:24
ayoung"compute_extension:admin_actions:createBackup": "rule:admin_or_owner",19:25
gordchaneef: well those individual projects didn't create those mappings. they were created by someone who was auditing those services.19:25
ayoungOK...let's start by saying we want to change "owner" to mean "member"19:25
ayoungso this should expand out to19:25
ayoungproject_id:%(project_id)s   and role:admin or role:Member19:25
gordchaneef: we can give it a try... but i'm pretty sure someone is going to ask "what is this, and what is pycadf"19:25
henrynashayoung: so which cuystomer says we want to do that?19:25
ayoungcuz..."Admin" without scope is bad19:25
ayounghenrynash, um...oldest bug in the bug tracker?19:26
henrynashayoung: what is the real, in teh field, probem that we are solving19:26
morganfainbergayoung: but I wants my admin scope... my precious... admin scope...seses19:26
morganfainbergayoung: :P19:26
samueldmqmorganfainberg, lol19:26
gyeeheh19:26
gyeemy precious19:26
ayounghttps://bugs.launchpad.net/keystone/+bug/96869619:26
openstackLaunchpad bug 968696 in Keystone ""admin"-ness not properly scoped" [High,Confirmed] - Assigned to Adam Young (ayoung)19:26
morganfainbergayoung: look at that bug number19:26
morganfainbergannnnncient [in terms of openstack]19:26
ayoung 2012-03-2919:26
morganfainbergand keystone19:26
ayoungyep...and I didn;t have a way to solve it19:27
samueldmqayoung, you know we can solve that today by adding scope checks to all endpoints in the polciyc right ?19:27
ayounghenrynash, so there is that problem, and also the ability to limit the amount we delegate to another user19:27
ayoungsamueldmq, and break everything19:27
morganfainbergjamielennox: hopefully will have KSA in gerrit today19:27
jamielennoxmorganfainberg: \o/19:27
ayoungsamueldmq, "admin" needs to go in and fix things19:27
henrynashayuong: you mean I can only delegate the roles I ahve?19:27
ayounghenrynash, yes19:28
samueldmqayoung, how can we then fix the behavor without breakin what's wrong19:28
morganfainbergjamielennox: and for initial work, to cleanup/strip down 1-core +2/+A, we do a full review before we cut release.19:28
ayoungsamueldmq, that is what I am trying to lay out, piece by piece19:28
*** markvoelker has joined #openstack-keystone19:28
morganfainbergjamielennox: see if anything is needed before it becomes a "real lib" and released.19:28
haneefgordc:  I agree with you, IMO   we should not allow checkin of "someone's specific audit mapping requirement" into pycadf project.  We should have asked them to talk to the services19:28
ayoungthis is core to it, but not yet sufficient19:28
samueldmqayoung, henrynash we can do that with role-sets by only allowing delegation of subroles, right ?19:28
jamielennoxmorganfainberg: what do you want to do about changes to keystoneclient since you split19:28
morganfainbergjamielennox: port them19:29
jamielennoxmorganfainberg: or changes that are still proposed19:29
morganfainbergjamielennox: or reporpose against KSA19:29
ayoungsamueldmq, we need your hierarchical assignemnts, too19:29
*** _cjones_ has quit IRC19:29
morganfainbergi'll be getting it in g-r as soon as we have a release19:29
*** markvoelker has quit IRC19:29
henrynashayoung: so the reason you want role “hierarchies” is to solve this bug…?19:29
jamielennoxi have a bunch of changes that are still proposed for client - should we just wait and put them in ksa?19:29
ayoungso If I am a domain admin, I can get admin on any lower scope19:29
samueldmqayoung, hierarchies can be implemented with role-sets19:29
morganfainbergjamielennox: if we can move on KSA quickly, yes19:29
*** markvoelker has joined #openstack-keystone19:29
*** markvoelker has quit IRC19:29
*** markvoelker has joined #openstack-keystone19:29
gordchaneef: fair enough. that's probably a plan we envisioned initially. but then i became jaded.lol19:30
samueldmqwe can definetively solve that with role-sets ... you can only delegate a subset of yout roels .19:30
henrynashayoung: whay doesn’t teh v3cloudpolciy sample some the initial bug description?19:30
samueldmqand this makes sense to me19:30
samueldmq19:30
gordchaneef: do you happen to use the audit middleware or do you just want those files out of pycadf?19:30
henrynash(solve the...)19:30
ayounghenrynash, becasue that is for Keystone only19:30
ayounghenrynash, there are many other services that are worse off19:30
ayoungv3  is a good step19:31
ayoungI would say that it is probably the most complex part, too19:31
henrynashayoung: (playing devils advocate): ok, but if it can solve it for keystone, why don’t we just enourage otehr services to so something similar?19:31
ayounghenrynash, ok, so I work in this full time, and I had trouble parsing v319:31
ayoungso while the logic is good, the organization needs help19:32
ayoungalos, it does not allow for delegation of a subset of permissions19:32
geoffarnoldNaive question: one of my prod mgrs is asking about anonymous domains (region admin wouldn't be able to see inside/mess with anything inside). Should I just tell him to go away?19:32
ayoungyou can create a trust with a subset of what you can do, but if you can't break your roles down more granular, all you can delegate is "everything"19:33
ayounggeoffarnold, no19:33
henrynashayoung: for delegation…..why is taht polify file related….isn’t it just at the point of delegation?19:33
ayounggeoffarnold, reseller spec is for solving that...but can we hold off19:33
*** ajayaa has quit IRC19:33
geoffarnoldk19:33
haneefgordc: we plan to use, and we want to have our own files, and definitely don't want to have trove files in keystone installation19:33
ayounghenrynash, point of delegation is policuy enforcement19:33
samueldmq,isnt that role assignments and token generation ?19:33
ayounghenrynash, lets say I split the nova operations up into three sorts:  admin, change state, read state19:34
gyeegeoffarnold, there's no region admin concept19:34
ayoungif I am a Member, I get to read state or change state19:34
gyeegeoffarnold, domain admin can only manage resource with his domain19:34
ayoungif I am an auditor, I should only be able to read state19:34
gordchaneef: if you're willing to support the adoption of CADF, i'm all for it and will help you move it19:34
ayoungso on a given operation, I can either say"19:34
*** mestery has quit IRC19:34
openstackgerritDavid Stanek proposed openstack/keystone: Script to sync oslo  https://review.openstack.org/11430519:34
ayoungrole:member or role:auditor19:35
ayoungor I can say19:35
ayoungrule:auditor19:35
henrynashayoung: so your argument is that if all peopel do is admin and member, then there’s not enough granularity…but I’m not sure what a productin deployemetn woudn;t have lots of roels (e.g. vm_viewer, vm_creator, vm_destroyer) etc….then couldn’t we allow just a portion of those to be delegted?19:35
gyeewhat is auditor? a role set?19:35
ayoungand the auditor    role: memeber or role:auditor19:35
ayounghenrynash, at its most granular yes19:35
haneefgordc:  sure19:35
ayoungbut what we assign to a user is the role-set...the effective role, some node higher up the tree19:36
ayoungmember implies (or contains): vm_viewer, vm_creator, vm_destroyer19:36
henrynashayoung: so is your argument for hierachies/role-sets in policy fundamentally about simplifying the writing of policy rules… and not about solving token bloat?19:36
gyeeayoung, auditor has to be an effective role then19:37
ayounghenrynash, yes, and also simpifying role assignemnt19:37
ayoungand for making delegation more granular without bloat19:37
gyeeotherwse, it will be messy, means we'll have to put role sets into the token, which is precisely what we're trying to avoid19:37
henrynashayoung: eek, another concept being incuded...aaahhh19:37
ayounghenrynash, not another concept19:37
openstackgerritDoug Hellmann proposed openstack/keystonemiddleware: Drop use of 'oslo' namespace package  https://review.openstack.org/17836019:37
ayounganother supporting use case19:37
ayoungthe concept is "assing one role, get multiple effective roles"19:38
ayoungheh19:38
ayoungassign19:38
ayoung"assign one role, get multiple effective roles"19:38
henrynashyep get that concept19:38
samueldmqand effective roles is what goes in the token19:39
samueldmqas we currently do19:39
ayounghenrynash  we actually have thngs like this in our rules where we say admin_or_owner.  I would change the naming pattern so that it was just Owner19:39
samueldmqby expanding grouping, hierarhcies, etc19:39
ayoungowner implies admin19:39
*** mestery has joined #openstack-keystone19:39
gyeeso we're all on the same page then?19:39
ayoungchop the scope matching off your rules, and just list them explicitly in the operations19:40
gyeeseem like we are all in agreement19:40
ayoungso in v3ckloud sample, I would change  (let me see)19:40
samueldmqgyee, I have this feeling all the time19:40
samueldmqgyee, I think the point of divergence is that ayoung wants role-sets to be passed in the token19:40
ayoung(note,  not changing what is actuallty enforced, just the name)19:40
henrynashok, so this has helped me understand the rationale….part of my objection to this is (even thoug you worked har to lay out incremental steps), is that it assumes a certin point of view os the right destination…any I have struggled to convince myslef that are exploring teh alternatives for some of those steps19:40
gyeesamuelmq, kumbaya19:40
samueldmqgyee, and then used in the policy19:40
ayoung"admin_and_matching_target_project_domain_id": "rule:admin_required and domain_id:%(target.project.domain_id)s",19:41
ayoungwhich is used on19:41
ayoung "identity:update_project": "rule:cloud_admin or rule:admin_and_matching_target_project_domain_id",19:41
ayoung    "identity:delete_project": "rule:cloud_admin or rule:admin_and_matching_target_project_domain_id",19:41
ayoungand one more19:41
samueldmqgyee, hehe19:41
ayoungand write those as19:41
henrynashI need to drop offline….the eveing is movig on her in the UK..but I can mull on his overnight now19:41
gyeeyou don't need policy files, just construct the rules and set them in oslo policy19:41
ayoungmatching_target_project_domain_id: domain_id:%(target.project.domain_id)s19:41
gyeeset_rules()19:42
ayoungand then19:42
ayoung "identity:delete_project": "rule:matching_target_project_domain_id and role:admin"19:42
openstackgerritMorgan Fainberg proposed openstack/keystonemiddleware: Remove superfluous / spammy log line  https://review.openstack.org/17829219:42
henrynashyou mean you don’t liek that fact that my meaning names consume 99.9% of all the charcters ina polic file?19:42
ayoungor...today, since the role: rule doesn do hierarchy19:42
samueldmqgyee, the policies will be stored in keystone managed by keystone, then others services fetch their policies via keystone api19:42
ayoungrole_admin: role:admin19:42
ayoung "identity:delete_project": "rule:matching_target_project_domain_id and rule:role_admin"19:43
gyeesamueldmq, my understanding is the enforcement will be done by the new middleware19:43
ayounghenrynash, nah, I'm ok with that19:43
gyeetaking security duty out of the hands of the services19:43
ayounghenrynash, what I want is for it to be easy to come by later and say19:43
ayoung "identity:delete_project": "rule:matching_target_project_domain_id and rule:role_member"19:43
samueldmqgyee, I also like the middleware, but the current spec defines keystoneclient19:43
samueldmqgyee, we need to revisit this as well19:43
gyeenooh, not the client19:43
samueldmqgyee, maybe next eeting19:43
ayoungwhat we expect is for people to tweak the roles assigned to APIs,19:43
gyeesecurity 101, never trust the client19:44
jamielennoxgyee: >.>19:44
bknudsonthat's what the cert is for.19:44
morganfainberggyee: i dunno, the client could pay me lots of money and i can trust it.19:44
gyeedamn straight!19:44
morganfainberggyee: lots and lots of money, right?19:44
ayounghenrynash, I think that your rules  for v3 are correct.  I just want to make it clear for people to modify them from there on out19:44
bknudsonbitcoins19:44
samueldmqhehee19:44
morganfainbergbknudson: YES!19:44
henrynashayoung: ok..will mull on it…tahnks for clarifying…and I don’t disagree that ppolciy file wrting is, today, a bit of a black art if you wnat to avoid the admin-ness scoped issue19:44
morganfainbergbknudson: dogecoin?19:44
gyeenice19:44
bknudsonI'll use mongodb to store by dogecoins19:45
morganfainbergbknudson: i hear we should have a driver that uses the blockchain to store user info19:45
ayounghenrynash, thanks.  I won't do anything until I am sure you and I share the same vision.  THis is too important.19:45
gyeebknudson, we are running mongo19:45
morganfainbergbknudson: gyee: that is how we replicate the data. commit the data to a cryptocurrency blockchain and download it at the remote site19:45
jamielennoxgyee, samueldmq: i haven't been paying attention and only read a little bit of scrollback - but the client will be responsible for fetching the policy file from keystone, then we either enforce directly with oslo.policy or figure out some middleware piece or other to do enforcement19:45
morganfainbergKSCoin?19:46
gyeehahahaha19:46
gyeelmao19:46
jamielennoxthe point is that ksc is only for the CRUD operations for fetching the policy file19:46
bretonI've just remembered19:46
gyeejamielennox, middleware should do that19:46
morganfainberg"your keystone node needs a GPU now, to mine enough coins to store your userdata"19:46
gyeefetch the policy and do the enforcement19:46
samueldmqjamielennox, so middleware uses the client19:46
bretonwe missed Alembic during the meeting in "Non-API Impacting Priorities"19:46
bretonmorganfainberg:19:46
samueldmqjamielennox, to get the policy and then enforce19:46
jamielennoxgyee: middleware might instigate it - but client is where all the code to fetch it live19:47
ayoungjamielennox, yes19:47
morganfainbergbreton: ah right.19:47
gyeeservices just need to register new APIs/capability with keystone, the same way we do endpoint registration19:47
morganfainbergbreton: that one should be straightforward like the stevedore one is19:47
jamielennoxsamueldmq: right19:47
samueldmqjamielennox, so the middleware uses the client to fetch (and client caches)19:47
samueldmqjamielennox, hmm ...19:47
ayoungjamielennox, and we want to make the policy library flexible enough that it can get its policy from multiple locations, as it is used for more than just access control.19:47
jamielennoxprobably middleware caches19:47
gyeejaimelennox, oh that, yeah, you mean the CRUD, then yes19:47
samueldmqjamielennox, ++19:47
ayoungso maybe middleware is cache management19:47
bretonmorganfainberg: yep, it is also almost ready and on review, I'll polish it for summit. There is a little change to the spec too.19:47
samueldmqmakes sense to me19:48
gyeebut enforcement still in middleware19:48
samueldmqayoung, makes sense to me19:48
ayoungmiddleware exposes a python api that looks like the policy api, but does the following:19:48
ayoung1. check  for a policy file19:48
ayoung2.  If policy file exists, checks freshness19:48
ayoung3.  If either of those fail, fetch policy file19:48
jamielennoxi'm still unsure if we can do this from middleware19:48
ayoung4.  call oslo.policy19:48
gyeeyou don't need "file"19:49
gyeeyou can set the rules directly19:49
ayoungjamielennox, ok,  lets assume we can't19:49
samueldmqgyee, ayoung, jamielennox so for me we should clearly separate what is the dynamic part of policies (fetching them via API) from things like hierarchical roles etc (which are givning more power ... )19:49
gyeejust cache the rules and check for freshness19:49
jamielennoxfor the same reason that it's hard to write policy as a decorator - you really need to know the objects before you can enforce it19:49
ayoungwe need to build those 4 steps into the oslo policy library, but provide...a callback?  so it can fetch the policy from Keystone19:49
ayoungjamielennox, right..it has to be a python API19:49
samueldmqgyee, I don't think we will have a file (at least it was my udnerstanding)19:50
ayoungwhich is why I didn;t really want it in middleware19:50
morganfainbergbreton: might be able to land it and the code at the summit19:50
jamielennoxsamueldmq: sure - i think that's a fairly easy split, for dynamic we are just talking about where policy files come from19:50
morganfainbergjamielennox: /me resists terrible joke about where policy files come from.19:50
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Deprecate auth.identity.v3.federated module  https://review.openstack.org/17770419:50
samueldmqjamielennox, exactly, ayoung you agree ^ ?19:51
jamielennoxi still like the idea of a policy enforcement point, an external service that caches policy files that has an api that returns a yes/no response19:51
ayoungwe put cache management in keystonemiddleware so that it can share the cached dir with other things like certs, and can get its Keystone client from the same place, but it has to be an API call19:51
gyeeayoung, you can fetch policy using the existing APIs19:51
ayoungjamielennox, it does have its appeal19:51
morganfainbergayoung: kspolicy://<ks_endpoint>/policy19:52
gyeethey are essentially JSON blob19:52
ayoungjamielennox, but that doesn't solve the problem, as you now need to fetch the object from the database, and then extact the values you are going to use for enforcing policy, before calling to the PEP19:52
morganfainbergayoung: file://<local file>19:52
jamielennoxi was looking at oslo mesaging again yesterday and i don't know any other way to reliably have a thread that can listen to notifications and handle other requests19:52
*** openstackstatus has quit IRC19:52
samueldmqayoung, if it was to be in the keystoneclient, the calls would then be callend enforce(...) and keystone would be known as policy enforcement service19:52
ayounggyee, you need a token to get policy..unless we want to drop that requirement, in which case it could be as simpkle as putting an URL in the nova config file19:53
jamielennoxayoung: sure you still need to fetch and save - but it becomes almost trivial in a standalone app19:53
*** openstackstatus has joined #openstack-keystone19:53
*** ChanServ sets mode: +v openstackstatus19:53
gyeeayoung, right, we can leveraging the existing policy CRUD19:53
samueldmqopenstackstatus, hi19:53
ayoungjamielennox, on the messaging side, I would absolutely want it in process, no RPC19:54
ayoungfetch and cache, operate locally19:54
jamielennoxthe problem i see is are we just redesigning congress? if you assume the request call is going to involve amqp rather than dbus or whatever then we could share that message bus between all services19:54
*** ajayaa has joined #openstack-keystone19:54
ayoungjamielennox, for now, lets focus on the API servers19:54
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Deprecate auth.identity.v3.federated module  https://review.openstack.org/17770419:55
jamielennoxayoung: if we are going to have this external cache i'd prefer to ask it questions rather than fetch the policy blob from it19:55
ayoungwe can discuss with the congress team at the summit..would love to share ideas here, and maybe the servers should be merged,  but only once we have the Keystone side fully speced19:55
ayoungjamielennox, from the nova perspective, it will ask questions19:55
morganfainbergayoung: congress is not looking to really do PEP like we do19:55
ayoungand...yes, we could make that a remote service19:55
morganfainbergayoung: had a chat w/ sean roberts19:56
morganfainbergit's just not what thye are really in19:56
ayoungthe tricky part, as I see it, is fetching the policy file if the API is protected...maybe we predicate this on tokenless operations?19:56
morganfainbergthey are looking at ACLs / compliance (not RBAC) for resources19:56
jamielennoxmorganfainberg: they are much higher level - but i've never seen a good definition of where congress wants to draw the line19:56
jamielennoxneutron has it's own policy engine thingy now as well19:56
*** samueldmq_ has quit IRC19:56
morganfainbergayoung: so we don't have anything to talk about on this front w/ congress19:56
morganfainbergjamielennox: exactly19:56
jamielennoxagain - not quite policy like we're talking about, but something something policy19:56
morganfainbergjamielennox: and neutron's isn't RBAC policy19:57
morganfainbergdifferent concern19:57
ayoungours is specifically Access control.  THe term policy menas differnt thngs in differnt context, but usually in Congress terms it involves placement of resources19:57
morganfainbergayoung: they are way outside the scope of what we're working on here fwiw19:57
morganfainbergbased on my last couple convos19:57
samueldmqmorganfainberg, ++ finding unexpected/inconsistent states in a cloud19:57
gyeeCa ca ca congress?!!!19:57
morganfainbergthey really are compliance for a ruleset19:57
ayoungmorganfainberg, that is why I specifically had "Access COntrol" in my talk's title19:58
morganfainbergnot access controll19:58
ayoungbut I still expect at least once question about Congress19:58
morganfainbergayoung: yes. i was just saying we don't really have much to talk about re: congress at the summit19:58
ayoungthinking that slide 0, will just be19:58
ayoung"THIS IS NOT ABOUT CONGRESS"19:58
gyeeheh19:58
raildo++19:58
jamielennoxayoung: then give a few minutes for people to leave19:58
morganfainbergayoung: hehe19:58
*** geoffarnold has quit IRC19:59
*** gyee has quit IRC20:00
samueldmqayoung, so can I split the 'hierarchical roles and such' form the dynamic policy spec20:00
samueldmq?20:00
ayoungsamueldmq, nope20:00
ayoungits is the heart of it20:00
ayoungdynamic is the overview20:01
samueldmqayoung, they're not about dynamic policy20:01
ayounghier has its own spec20:01
ayoungsamueldmq, it is a prereq20:01
samueldmqayoung, I see dynamic as being the away we fetch the policy etc20:01
ayoungsamueldmq, nope20:01
samueldmqayoung, nothing to do with the power of roles, etc20:01
ayoungnot *just*20:01
ayoungits about making policy dynamic for the openstack deployemtn20:01
ayoungand policy is Access Control20:02
ayoungjust making the files easier to distribute buys us nothing.  We could do that with puppet20:02
ayoungit only means something when the changes on the server have a channel to affect change in enforcement20:02
samueldmqmodify the policy rules via the api ?20:03
ayoungand the biggest change I expect to see is the role used to provide access to an API20:03
samueldmqthat's still not about hierarhcicla roles20:03
samueldmqhmm, I will keep making the changes, but maybe there are thigns that are not clear20:03
*** iamjarvo has quit IRC20:03
samueldmqI share this thinkign on what's dynamic policy with jamielennox and henrynash20:04
ayounghierarchical roles will be used to generate policy files20:04
samueldmqthey both agreed with me20:04
samueldmqI am not saying you're wrong, but we need to say what dynamic policy exactly is then ..20:04
ayoungioram's code will read the roles table to generate a portion of the policy file20:04
ayoungI laid it out in the overview20:04
ayoungthat is why that is an overview spec.20:05
ayoungties ll the related specs together20:05
* ayoung needs to write his presentation20:05
ayoungok..meeting time20:05
*** ayoung is now known as ayoung-mtg20:05
*** _cjones_ has joined #openstack-keystone20:05
samueldmqk but dynamic policy looks to be just the fetching etc, I still think we are mixing things20:06
samueldmqI think we should make the concepts standing by themselves, but ok maybe just the name dynamic policy20:07
samueldmqcould be superpolicy improvement, in the overview :p20:07
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Deprecate auth.identity.v3.federated module  https://review.openstack.org/17770420:07
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Add docstrings for ``protocol`` parameter  https://review.openstack.org/17730320:08
*** iamjarvo has joined #openstack-keystone20:12
*** _cjones_ has quit IRC20:14
*** joesavak has joined #openstack-keystone20:17
*** e0ne has quit IRC20:17
*** samleon has joined #openstack-keystone20:18
*** amakarov is now known as amakarov_away20:18
openstackgerritMarek Denis proposed openstack/python-keystoneclient: Add docstrings for ``protocol`` parameter  https://review.openstack.org/17730320:19
*** markvoelker has quit IRC20:20
*** markvoelker has joined #openstack-keystone20:21
stevemarmorganfainberg, what's this keystoneauth you are asking for?20:21
morganfainbergstevemar: session, catalog parsing, access info, discovery.20:24
jamielennoxstevemar: it's the base auth stuff that all clients need - so session, adapter, auth plugins, discovery20:24
stevemarjamielennox, morganfainberg neat20:25
stevemarso the other clients can just used that, instead of importing all of ksc20:25
*** _cjones_ has joined #openstack-keystone20:25
*** markvoelker has quit IRC20:25
morganfainbergYep.20:25
*** ajayaa has quit IRC20:26
stevemarwould most people also import both then?20:26
stevemarpresumably someone would want access to the apis too?20:26
jamielennoxstevemar: no, what remains in ksc will be mostly the CRUD20:26
jamielennoxit makes ksc like most other clients, just a way to access the crud rest apis20:27
jamielennoxksa will be all the other clients require - obviously horizon, osc etc will still need ksc20:27
stevemarjamielennox, i guess most authenticated users won't care for keystone CRUD?20:27
stevemaryeah20:27
stevemari think that was warping my thinking20:27
stevemarsince osc will still need both20:28
*** itlinux has joined #openstack-keystone20:28
stevemarbut i guess nova/glance wouldn't need ksc at that point20:28
*** samueldmq has quit IRC20:29
bknudsonthe *clients won't need ksc.20:30
stevemaryeah20:32
*** samueldmq_ has joined #openstack-keystone20:34
*** e0ne has joined #openstack-keystone20:36
*** joesavak has quit IRC20:37
*** pnavarro has quit IRC20:38
*** e0ne has quit IRC20:39
*** samueldmq_ has quit IRC20:47
*** zigo_ is now known as zigo20:50
*** markvoelker has joined #openstack-keystone20:51
*** harlowja_ has quit IRC20:55
*** raildo has quit IRC20:55
*** markvoelker has quit IRC20:56
*** iamjarvo has quit IRC20:57
openstackgerritMerged openstack/keystonemiddleware: Port keystonemiddleware to Python 3  https://review.openstack.org/17770121:00
*** jaosorior has quit IRC21:02
*** gyee has joined #openstack-keystone21:02
*** ChanServ sets mode: +v gyee21:02
*** lhcheng_ has joined #openstack-keystone21:06
*** lhcheng has quit IRC21:07
*** gyee has quit IRC21:11
*** gyee has joined #openstack-keystone21:14
*** ChanServ sets mode: +v gyee21:14
*** _cjones_ has quit IRC21:15
*** _cjones_ has joined #openstack-keystone21:19
*** ioram has quit IRC21:24
*** henrynash has quit IRC21:25
*** iamjarvo has joined #openstack-keystone21:26
*** iamjarvo has quit IRC21:26
*** _cjones_ has quit IRC21:26
*** henrynash has joined #openstack-keystone21:26
*** ChanServ sets mode: +v henrynash21:26
*** iamjarvo has joined #openstack-keystone21:27
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/17841421:37
openstackgerritOpenStack Proposal Bot proposed openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/17841521:37
openstackgerritOpenStack Proposal Bot proposed openstack/oslo.policy: Updated from global requirements  https://review.openstack.org/17842421:42
openstackgerritOpenStack Proposal Bot proposed openstack/pycadf: Updated from global requirements  https://review.openstack.org/17842521:42
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/17842621:42
*** henrynash has quit IRC21:46
stevemardhellmann, could you kick off this guy? https://review.openstack.org/#/c/168187/21:46
*** markvoelker has joined #openstack-keystone21:52
*** markvoelker has quit IRC21:56
openstackgerritBrant Knudson proposed openstack/keystone: Use stevedore for backend drivers  https://review.openstack.org/16654322:04
openstackgerritBrant Knudson proposed openstack/keystone: Use short names for drivers  https://review.openstack.org/16662222:04
openstackgerritBrant Knudson proposed openstack/keystone: Tests enforce use of stevedore loading  https://review.openstack.org/17185422:04
*** harlowja has joined #openstack-keystone22:04
openstackgerritBrant Knudson proposed openstack/keystone: Update sample config file  https://review.openstack.org/17186022:15
openstackgerritBrant Knudson proposed openstack/keystone: Remove unnecessary oauth_api check  https://review.openstack.org/17760322:16
openstackgerritBrant Knudson proposed openstack/keystone: De-duplicate auth methods  https://review.openstack.org/17760422:16
openstackgerritBrant Knudson proposed openstack/keystone: Use [] where a value is required  https://review.openstack.org/17190722:16
openstackgerritBrant Knudson proposed openstack/keystone: Remove support for loading auth plugin by class  https://review.openstack.org/17190622:16
*** bknudson has quit IRC22:19
*** iamjarvo has quit IRC22:21
*** _cjones_ has joined #openstack-keystone22:22
*** gordc has quit IRC22:23
*** Rockyg has quit IRC22:27
*** nkinder has quit IRC22:29
*** iamjarvo has joined #openstack-keystone22:32
*** stevemar has quit IRC22:35
*** ericksonfgds has joined #openstack-keystone22:46
*** sigmavirus24 is now known as sigmavirus24_awa22:46
*** markvoelker has joined #openstack-keystone22:52
*** markvoelker has quit IRC22:57
*** Ephur has quit IRC22:59
*** browne has quit IRC23:00
*** browne has joined #openstack-keystone23:01
*** ericksonfgds has quit IRC23:15
*** ayoung-mtg has quit IRC23:21
*** bknudson has joined #openstack-keystone23:27
*** ChanServ sets mode: +v bknudson23:27
*** dims_ has joined #openstack-keystone23:29
*** josecastroleon has joined #openstack-keystone23:29
*** dims has quit IRC23:31
*** josecastroleon has quit IRC23:34
*** lsmola_ has joined #openstack-keystone23:38
*** lsmola__ has quit IRC23:40
*** lsmola_ has quit IRC23:45
*** _cjones_ has quit IRC23:52
*** iamjarvo has quit IRC23:56
*** markvoelker has joined #openstack-keystone23:58
*** lsmola_ has joined #openstack-keystone23:58
*** _cjones_ has joined #openstack-keystone23:59
*** _cjones_ has quit IRC23:59
*** drjones has joined #openstack-keystone23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!