Tuesday, 2015-05-05

*** emagana_ has quit IRC00:06
*** stevemar has joined #openstack-keystone00:06
*** ChanServ sets mode: +v stevemar00:06
*** Raildo_ has joined #openstack-keystone00:06
*** emagana has joined #openstack-keystone00:06
*** emagana has quit IRC00:10
*** Raildo has quit IRC00:11
*** _cjones_ has joined #openstack-keystone00:13
*** Raildo_ has quit IRC00:13
*** edmondsw has quit IRC00:20
*** lhcheng has joined #openstack-keystone00:25
*** ChanServ sets mode: +v lhcheng00:25
*** stevemar has quit IRC00:32
*** ankita_wagh has quit IRC00:36
*** _cjones_ has quit IRC00:43
*** zzzeek has quit IRC00:56
*** ankita_wagh has joined #openstack-keystone00:58
*** henrynash has quit IRC00:59
*** henrynash has joined #openstack-keystone00:59
*** ChanServ sets mode: +v henrynash00:59
openstackgerritAnkita Wagh proposed openstack/keystonemiddleware: Handling endpoints with missing URL types  https://review.openstack.org/17962401:02
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Ensure that failing responses are logged  https://review.openstack.org/17998401:02
*** alexsyip has quit IRC01:08
samueldmqjamielennox, hi you around ?01:11
jamielennoxsamueldmq: yep01:11
samueldmqjamielennox, https://review.openstack.org/#/q/status:open+topic:identity-v3-only-jobs,n,z01:11
samueldmqjamielennox, after this get merged, morganfainberg will have the changes in devstack to make it use v3 to create its resources, etc01:12
samueldmqjamielennox, and then tempest will starting showing up the errors01:12
samueldmqjamielennox, we then add this job to projects as needed and submit the fixes01:13
jamielennoxsamueldmq: cool i saw that link you posted earlier - one has apparently already merged01:14
samueldmqjamielennox, no, in fact I removed the devstack-gate flag and then I set the flag IDENTITY_V3_ONLY directly in devstack01:15
jamielennoxoh - ok01:15
samueldmqjamielennox, without needing to change d-g, so I abandoned that one01:15
jamielennoxsamueldmq: cool - i will keep an eye on it01:16
samueldmqjamielennox, nice01:17
samueldmqjamielennox, among your patches, you have something with higher priority ?01:17
samueldmqI am entering in review mode now01:17
*** henrynash_ has joined #openstack-keystone01:17
*** ChanServ sets mode: +v henrynash_01:17
jamielennoxumm, i had a chat with the glance people this morning so i'm hoping that will start moving again01:17
jamielennoxand i need to circle back to the heat guys, you can look into any of those01:18
jamielennoxbeyond that we are not in a super urgent phase between release and summit01:18
samueldmqjamielennox, ++01:20
*** henrynash has quit IRC01:20
*** henrynash_ is now known as henrynash01:20
openstackgerritMerged openstack/keystone: Pass-in domain when testing saml signing  https://review.openstack.org/17984601:24
*** _cjones_ has joined #openstack-keystone01:39
*** darrenc is now known as darrenc_afk01:40
*** _cjones_ has quit IRC01:44
*** Ephur has joined #openstack-keystone01:47
*** ncoghlan has joined #openstack-keystone01:52
*** darrenc_afk is now known as darrenc01:52
openstackgerritDave Chen proposed openstack/keystone: Refactor: Join multiple criteria together  https://review.openstack.org/13313501:58
*** ankita_wagh has quit IRC01:59
*** davechen has joined #openstack-keystone01:59
*** ankita_wagh has joined #openstack-keystone02:00
*** browne has quit IRC02:00
*** ankita_wagh has quit IRC02:05
*** davechen1 has joined #openstack-keystone02:25
*** davechen has quit IRC02:25
openstackgerritDave Chen proposed openstack/keystone: Minor change in the docstring  https://review.openstack.org/17232902:27
*** samueldmq has quit IRC02:27
*** sigmavirus24 is now known as sigmavirus24_awa02:33
*** browne has joined #openstack-keystone02:36
*** ankita_wagh has joined #openstack-keystone02:43
*** dobson has quit IRC02:48
*** richm has quit IRC02:55
*** dobson has joined #openstack-keystone03:01
*** lhcheng has quit IRC03:08
*** lhcheng has joined #openstack-keystone03:09
*** ChanServ sets mode: +v lhcheng03:09
*** spandhe has quit IRC03:10
*** dobson has quit IRC03:18
*** dobson has joined #openstack-keystone03:22
*** dims_ has quit IRC03:23
*** davechen1 has quit IRC03:27
*** _cjones_ has joined #openstack-keystone03:28
*** davechen has joined #openstack-keystone03:29
*** links has joined #openstack-keystone03:31
*** _cjones_ has quit IRC03:32
*** stevemar has joined #openstack-keystone03:43
*** ChanServ sets mode: +v stevemar03:43
*** mabrams has joined #openstack-keystone03:53
*** ayoung-dadmode has quit IRC04:05
*** henrynash has quit IRC04:14
*** henrynash has joined #openstack-keystone04:14
*** ChanServ sets mode: +v henrynash04:14
*** gokrokve has joined #openstack-keystone04:16
*** gokrokve has quit IRC04:20
*** dims has joined #openstack-keystone04:23
*** _cjones_ has joined #openstack-keystone04:28
*** dims has quit IRC04:28
*** ankita_wagh has quit IRC04:32
*** ankita_wagh has joined #openstack-keystone04:32
*** _cjones_ has quit IRC04:33
*** gokrokve has joined #openstack-keystone04:45
*** henrynash has quit IRC05:16
*** emagana has joined #openstack-keystone05:16
*** henrynash has joined #openstack-keystone05:16
*** ChanServ sets mode: +v henrynash05:16
*** haneef_ has quit IRC05:17
openstackgerritMerged openstack/keystone: Fixes test nits from a previous review  https://review.openstack.org/17979605:26
*** mabrams has left #openstack-keystone05:46
*** ajayaa has joined #openstack-keystone05:46
*** spandhe has joined #openstack-keystone05:54
*** spandhe_ has joined #openstack-keystone05:57
*** gokrokve_ has joined #openstack-keystone05:58
*** spandhe has quit IRC05:58
*** spandhe_ is now known as spandhe05:58
*** gokrokve has quit IRC06:01
*** gokrokve_ has quit IRC06:02
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/17933106:03
*** _cjones_ has joined #openstack-keystone06:17
*** _cjones_ has quit IRC06:22
*** openstackgerrit has quit IRC06:23
*** openstackgerrit has joined #openstack-keystone06:24
*** svasheka has quit IRC06:25
*** emagana has quit IRC06:32
*** lhcheng has quit IRC06:32
*** emagana has joined #openstack-keystone06:33
*** svasheka has joined #openstack-keystone06:37
*** emagana has quit IRC06:38
*** lhcheng has joined #openstack-keystone06:50
*** ChanServ sets mode: +v lhcheng06:50
*** e0ne has joined #openstack-keystone06:51
*** e0ne has quit IRC07:06
*** rlt has joined #openstack-keystone07:19
*** stevemar has quit IRC07:22
*** chlong has quit IRC07:44
*** davechen has left #openstack-keystone07:53
*** lhcheng has quit IRC08:03
*** henrynash has quit IRC08:04
*** henrynash has joined #openstack-keystone08:04
*** ChanServ sets mode: +v henrynash08:04
*** _cjones_ has joined #openstack-keystone08:06
*** _cjones_ has quit IRC08:12
*** ankita_wagh has quit IRC08:14
*** fhubik has joined #openstack-keystone08:14
*** fhubik is now known as fhubik_afk08:24
*** e0ne has joined #openstack-keystone08:28
*** e0ne is now known as e0ne_08:28
*** fhubik_afk is now known as fhubik08:28
*** e0ne_ is now known as e0ne08:44
*** e0ne is now known as e0ne_08:45
*** e0ne_ is now known as e0ne08:46
*** pnavarro has joined #openstack-keystone08:53
*** jistr has joined #openstack-keystone08:56
*** aix has quit IRC08:59
*** fhubik is now known as fhubik_afk09:02
openstackgerritVictor Sergeyev proposed openstack/keystone: Run SQL migration tests on PostgreSQL and MySQL  https://review.openstack.org/17111509:10
*** dobson has quit IRC09:11
*** fhubik_afk is now known as fhubik09:18
*** ncoghlan has quit IRC09:22
*** samueldmq has joined #openstack-keystone09:25
*** aix has joined #openstack-keystone09:26
*** henrynash has quit IRC09:47
*** markvoelker has quit IRC09:48
*** dobson has joined #openstack-keystone09:51
*** fhubik is now known as fhubik_afk09:52
*** _cjones_ has joined #openstack-keystone09:56
*** samueldmq has quit IRC09:58
*** f13o has joined #openstack-keystone09:58
*** _cjones_ has quit IRC10:01
*** bdossant has joined #openstack-keystone10:01
*** dobson has quit IRC10:03
*** aix has quit IRC10:12
*** fhubik_afk is now known as fhubik10:12
*** dobson has joined #openstack-keystone10:13
*** henrynash has joined #openstack-keystone10:14
*** ChanServ sets mode: +v henrynash10:14
*** f13o has quit IRC10:15
*** dims has joined #openstack-keystone10:20
*** dims_ has joined #openstack-keystone10:22
openstackgerritDavid Charles Kennedy proposed openstack/keystone-specs: Updated endpoint enforcement spec  https://review.openstack.org/17479910:23
*** samueldmq has joined #openstack-keystone10:23
samueldmqmorning10:24
*** henrynash has quit IRC10:24
*** kiran-r has joined #openstack-keystone10:24
*** henrynash has joined #openstack-keystone10:25
*** ChanServ sets mode: +v henrynash10:25
*** aix has joined #openstack-keystone10:25
*** dims has quit IRC10:26
samueldmqhenrynash, hello10:27
henrynashsamueldmq: hi10:27
samueldmqhenrynash, morning :) I'd like to talk a little bit about dynamic policies with you10:28
henrynashsamueldmq: ok….I’m actualy just finishing off a long email on that very subject!10:28
samueldmqhenrynash, cool, let me know when you available thanks10:28
henrynashsamueldmq: ok…should be done in a bit10:29
samueldmqhenrynash, k np10:29
*** bigjools has quit IRC10:34
*** bigjools has joined #openstack-keystone10:34
*** bigjools has joined #openstack-keystone10:34
*** e0ne is now known as e0ne_10:35
*** e0ne_ is now known as e0ne10:36
*** e0ne is now known as e0ne_10:56
*** fhubik has quit IRC11:01
*** fhubik has joined #openstack-keystone11:02
*** henrynash_ has joined #openstack-keystone11:02
*** ChanServ sets mode: +v henrynash_11:02
*** lhcheng has joined #openstack-keystone11:04
*** ChanServ sets mode: +v lhcheng11:04
*** dobson has quit IRC11:04
*** henrynash has quit IRC11:04
*** henrynash_ is now known as henrynash11:04
henrynashsamueldmq: hi11:07
samueldmqhenrynash, reading your email, talk to you in a minute :)11:07
henrynashok :-)11:07
*** lhcheng has quit IRC11:08
*** dobson has joined #openstack-keystone11:19
*** henrynash has quit IRC11:27
*** dobson has quit IRC11:36
*** dobson has joined #openstack-keystone11:37
*** ajayaa has quit IRC11:40
*** ctina_ has joined #openstack-keystone11:44
*** _cjones_ has joined #openstack-keystone11:45
*** _cjones_ has quit IRC11:50
*** markvoelker has joined #openstack-keystone11:51
*** e0ne_ is now known as e0ne11:51
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone-specs: Enforce policy from keystonemiddleware  https://review.openstack.org/13348011:52
*** henrynash has joined #openstack-keystone11:58
*** ChanServ sets mode: +v henrynash11:58
samueldmqhenrynash, hi11:59
henrynashhi11:59
samueldmqhenrynash, so basically I agree with you on all those11:59
henrynash:-)11:59
samueldmqhenrynash, we have talked about capibilities, etc early in K12:00
henrynashmost of it was not controversial…but (almost for my own sake) needed to kind of put it all down in one go12:00
samueldmqhenrynash, ++12:00
samueldmqhenrynash, I think we should provide a CRUD for capabilities12:00
samueldmqhenrynash, which would contains all the capabilities loaded from the unified policy12:01
samueldmqinitially12:01
*** ajayaa has joined #openstack-keystone12:01
henrynashsamueldmq: nad capablities would be indexed by what….service type/id and capability name or something like that?12:01
samueldmqhenrynash, yeah12:02
henrynash++12:02
samueldmqhenrynash, and you should be able to list_capabilities based on the namespace (service name, etc) or12:02
samueldmqhenrynash, based on the token12:02
samueldmqhenrynash, based on the token will be amazing for horizon, for g12:02
samueldmqeg12:02
henrynashsamueldmq: ooh…yes, that would be nice12:03
samueldmqhenrynash, nice12:03
samueldmqhenrynash, in addition, regarding the approach, I like the way you propose12:03
samueldmqhenrynash, step-by-step, incrementally12:03
samueldmqhenrynash, dynamic policy as it is today looks like a bunch of things not necessarily well connected (at least not well described)12:04
henrynashsamueldmq: …and that’s kind of what I mean by lets concentrate on geting the API right…even if the implementaion underneath takes time to morph into the right places (or indeed may not be fully functional…e.g. we might not let you create capabilities via an API yet)12:04
samueldmqhenrynash, yes, just load it from the existing policies for now12:04
henrynashagreed12:04
samueldmqhenrynash, and we implement further as we go/need12:05
*** fhubik has quit IRC12:05
samueldmqhenrynash, I tried to clarify the dynmaic policy overview spec12:05
samueldmqhenrynash, I described the change in terms of the problems we are trying to solve12:05
henrynashsaw you updated that…I’llreview later today12:05
*** fhubik has joined #openstack-keystone12:06
samueldmqhenrynash, we then would have roles containing capabilities, and contraints (scope for now)12:06
samueldmqhenrynash, this makes the rules (loaded from the existing rules in the policy)12:06
samueldmqhenrynash, note : roles CONTAIN capabilities, this is true RBAC12:07
*** raildo has joined #openstack-keystone12:07
henrynashI agree…roles caontain capabiliies…and that was my comment in my email…that’s really what we have….it’s just implemented in an odd way!12:07
henrynashand not one that you can obvious list the capabilities a given role gives you!12:08
samueldmqwe implement the opposite I think, capabilities -> roles :/12:08
samueldmqhenrynash, ++12:08
samueldmqhenrynash, we can do that if we go thorugh all the policy and analyze capability per capability, because we do capability ->role12:09
samueldmqinstead of role -> capability12:09
henrynashyes, our implementation is kind of back to front…..although the result is the same eventually…..you end of turning a role into a set of capabilities that is checked to see if you can execute aan API….12:09
samueldmqhenrynash, ++12:09
samueldmqhenrynash, btw thanks for helping on this front12:10
samueldmqhenrynash, we will end up with a great API, I am sure :)12:10
henrynashnp…I’ve been struggling with it all myself!12:10
samueldmqhenrynash, let's struggle to get there12:10
henrynash:-)12:10
samueldmqyeah : )12:11
samueldmqhenrynash, should we discuss something about this in the meeting today ?12:11
samueldmqhenrynash, so people keep it in mind for further discussion at the summit12:11
*** ajayaa has quit IRC12:13
henrynashsamueldmq: I think this is really a summit discussion…not that that works in an IRC meeting so well…there are sjust so many threads….I sent the email since I wanted to kind of put some stakes inthe ground as sadly I won’t be in Vancouver12:13
samueldmqhenrynash, oh really ? I am sad you won't be there :/12:15
henrynashsamueldmq: yeah, I’m moving house the week of the summit…and just no way I could get a on a plane at that time!12:16
samueldmqhenrynash, you was on my checklist of people to talk in the summit, and discuss lots of things :/12:16
henrynashsamueldmq: just lousy timing12:16
samueldmqhenrynash, k good luck12:16
samueldmqhenrynash, hopefully we will meet at midcycle12:17
henrynashthx12:17
samueldmqhenrynash, I am sure yet I will be attending it, I don't know if I will get sponsored12:17
henrynashsamueldmq: I bl**dy hope so!12:17
samueldmqhenrynash, :-)12:18
samueldmqhenrynash, my goals in L are policies + identity v3 everywhere12:18
samueldmqhenrynash, I am focusing on them wiht other people to get them by L12:19
henrynashv3 everywhere is a must12:19
samueldmqhenrynash, ++ I already created a experimental job for devstack12:20
samueldmqhenrynash, which is under review https://review.openstack.org/#/q/status:open+topic:identity-v3-only-jobs,n,z12:20
samueldmqhenrynash, I am working with morganfainberg and jamielennox on that front12:21
henrynashyeah, nice!!!12:21
samueldmqhenrynash, regarding role-sets ... what if we re-use the existing role api ?12:24
samueldmqhenrynash, just extending it to support grouping12:24
henrynashsamueldmq: yes, that’s a debate I was having with gyee12:24
samueldmqhenrynash, it would be easier to deployers to manage all together12:24
samueldmq++12:24
marekdsamueldmq: henrynash: sory to interrupt - are you discussing a concept of a hash identifying a container of roles (easier to keep in fernet tokens for example) ?12:25
henrynashsamueldmq: we jdut ahve to think through how this works with domain specific role sets….since if the name goies in the token, how do we suppoer namedspaces role sets12:25
*** lmtaylor has joined #openstack-keystone12:25
*** fhubik is now known as fhubik_afk12:25
samueldmqhenrynash, right ,I will mull it a bit12:26
henrynashok12:26
samueldmqmarekd, no, we are discussing how to define container of roles, etc ... hashing or anything else related on how to represent in the token is to be discussed12:27
*** fhubik_afk is now known as fhubik12:27
samueldmqmarekd, expanding in token generation (keystone) vs expanding at token evalutaion (services)12:27
samueldmqmarekd, also, we were discussing the changes in the policy implementation we have today12:28
marekdsamueldmq: ok, end user gain would be a hash-like value instead of list of roles the uses has.12:28
marekdam i right?12:28
samueldmqmarekd, yeah, kindof .. you can assign the user a role-set12:29
samueldmqmarekd, which is a group of roles, or other role-sets12:29
marekddo you have something on paper (like spec, review) or it's just here on irc so far? that would be interesting.12:29
samueldmqmarekd, and yes, the cloud admin will be able to define role-sets that are meaningful to their cloud12:29
samueldmqmarekd, and assign them to their users12:30
marekdsamueldmq: ah ok, this explains one of my question.12:30
samueldmqmarekd, : )12:30
samueldmqmarekd, see henrynash's email on the ml, he has some links there12:30
marekdsamueldmq: re: dynamic policy - i am curious whether the http response body of GET /policy would change or it'd be a blob like today?12:31
marekdsamueldmq: ok, i see it. quite fresh e-mail, i was on lunch at that time.12:32
marekd:-)12:32
samueldmqmarekd, yeah12:32
samueldmqmarekd, the existing api won't change I guess, we must maintain the compatibility12:32
marekdsamueldmq: you are proposing much enough to simpy use other endpoints.12:32
samueldmqmarekd, what I was discussing with henrynash was to have a CRUD for capabilities, and roles have a set of capabilities12:32
marekdsamueldmq: no no, i kind of changed the topic.12:33
samueldmqmarekd, under certain constraints (scope constraints)12:33
samueldmqmarekd, hehe k12:33
marekdswitched to your spec on dynamic policy.12:33
samueldmqmarekd, yes, on the spec we still didnt define how the API will be more powerful12:34
marekdkind of interesing topic, and since i am not policy master i am trying to also learn something here. Looks like there are some dangling bits today in Keystone (like already implemented /policy API)12:34
*** gordc has joined #openstack-keystone12:34
samueldmqmarekd, we will need a spec for this , and what I was talking just above will probably be there12:34
marekdwhich was confusing for me at the beginning.12:34
samueldmq(capability management, etc)12:34
marekdthat would be nice, esp. for tokens size problem.12:34
samueldmqmarekd, that spec comprises a *lot* of things12:34
samueldmqmarekd, sorry I need to go afk for a bit12:34
marekdi alredy saw lots of references12:35
marekdsamueldmq: sure.12:35
marekdcu12:35
dstaneki'm very interested in the policy discussion as well - i haven't ready henrynash's email yet12:35
marekddstanek: spec on dynamic policy  may interst you then.12:35
samueldmqdstanek, sure, we can talk about it later once I am back (I am not here)12:35
samueldmq:-)12:35
*** gyee has joined #openstack-keystone12:39
*** ChanServ sets mode: +v gyee12:39
dstanekmarekd: yeah, it's on my list of pre-summit reading12:39
*** dobson has quit IRC12:39
marekddstanek: ++12:40
dstaneki don't know anything about it, but my impression based on the name is that it's not a good thing due to auditing12:40
marekdnothing about policy ?12:40
*** dims_ has quit IRC12:41
marekddstanek: my undestating of that is  Keystone would become kind of global policy master, instead of multiple policy rules defined independently and locally at every service.12:41
*** dims has joined #openstack-keystone12:41
dstanekso what is dynamic?12:41
marekddunno12:42
marekdmaybe full api access that makes it more 'dynamic'12:42
dstanekas long as the actual rules aren't changing then i'm not as worried12:43
marekdi still have few questions to the authors, but i think samueldmq said the ksm would fetch and cache  rules on some interval basis.12:44
marekdbut i don't know more details (not specified)12:44
*** dobson has joined #openstack-keystone12:46
*** links has quit IRC12:52
*** vhoward has quit IRC13:00
*** vhoward has joined #openstack-keystone13:01
*** openstack-kid has joined #openstack-keystone13:02
*** openstack-kid has left #openstack-keystone13:03
*** ctina_ has quit IRC13:03
*** rlt has quit IRC13:04
*** openstack-kid has joined #openstack-keystone13:05
samueldmqdstanek, marekd hey what's up13:05
samueldmqI am back :)13:05
samueldmqdstanek, so dynamic is the way we manage the policy (via api)13:06
samueldmqdstanek, and the changes automatically impact the enforcement in individual services13:07
gordcdhellmann: just an fyi, i'm planning on releasing a stable/juno pycadf 0.6.113:07
samueldmqdstanek, you may want to change either the organization of roles (role-sets, etc) and the policy rules13:07
gordcit is to address: http://lists.openstack.org/pipermail/openstack-dev/2015-April/061920.html13:07
samueldmqdstanek, both will affect enforcement13:07
*** ajayaa has joined #openstack-keystone13:08
*** richm has joined #openstack-keystone13:10
marekddstanek: samueldmq so that's what i thought - dynamic because it is accessible via resful api13:11
dstaneksamueldmq: do you have a link to the spec?13:11
openstack-kidis keystone auth plugins are always need to be a single file?13:11
samueldmqdstanek, sure, let me find it13:12
samueldmqdstanek, https://review.openstack.org/#/c/147651/13:12
marekddstanek: https://review.openstack.org/#/c/147651/4/specs/backlog/dynamic-policy.rst13:12
marekdsamueldmq: why most of this stuff is still in backlog?13:12
dstaneksamueldmq: marekd: thanks13:12
samueldmqmarekd, because they're not approved ?13:12
dstanekmarekd: it's in the backlog until we approved it and schedule it for a release13:12
samueldmqdstanek, ++13:12
marekd....why not propose in the libery dir like last release?13:13
*** Ctina has joined #openstack-keystone13:13
marekdi thought backlog was just for something postponed for next release13:13
samueldmqmarekd, backlog is for things we still haven't targeted yet13:14
samueldmqmarekd, if we target them to L we can move them, even if not approved yet (*I think*)13:14
marekdisn't dynamic-policy a goal for l ?13:14
samueldmqmarekd, yeah it is, but we have to approve the specs to make sure what we will get in L13:15
samueldmqmarekd, and them move the specs13:15
dstanekyeah, we are going for a sort of agile process here. just about everything hits the backlog until it's approved and targeted.13:15
*** afaranha has quit IRC13:16
marekdwhen was decided? i am pretty  sure last cycle everybody was proposing against 'kilo' directory (and unltil merged it didn't appear either way)13:16
marekdi think i missed something (maybe when i was away past few weeks)13:16
* marekd is ashamed13:16
samueldmqmarekd, don't be :p13:17
samueldmqmarekd, we decided to keep everything in the backlog (the directory already existed but we wasn't using it)13:17
samueldmqmarekd, so we keep things in the backlog till we approve and target them13:17
marekdok ok13:17
openstack-kidquit13:17
*** openstack-kid has left #openstack-keystone13:17
marekd^^ oups13:18
samueldmqheheh13:18
samueldmqthink he's kidding :p13:18
*** amakarov_away is now known as amakarov13:20
*** lmtaylor has quit IRC13:20
marekdsamueldmq: so you are going to be in Vancouver, right?13:20
*** gyee has quit IRC13:22
dstanekmarekd: i actually don't remember when we decided that13:22
*** annasort has quit IRC13:23
*** annasort has joined #openstack-keystone13:23
*** bknudson has joined #openstack-keystone13:26
*** ChanServ sets mode: +v bknudson13:26
*** gyee has joined #openstack-keystone13:27
*** ChanServ sets mode: +v gyee13:27
samueldmqmarekd, yes I will :)13:29
marekdsamueldmq: who else from your uni is coming ?13:30
marekdrodrigo13:30
marekdfor sure13:30
samueldmqmarekd, tons of people13:30
marekdlol13:30
*** afaranha has joined #openstack-keystone13:30
*** annasort has quit IRC13:30
*** afaranha has left #openstack-keystone13:31
marekdgood13:31
samueldmqmarekd, me, raildo, rodrigods, htruta, abrito, afaranha, gabriel-bezerra and others13:31
samueldmqmarekd, the last ones from our ironic team13:31
marekdget it13:31
samueldmqmarekd, hehe I need to prepare myself to the discussions, start the pre-reading on other things than policy and v3 everywhere13:32
*** ajayaa has quit IRC13:32
raildo\o/ let's go invade Vancouver #BrazilTeam13:32
samueldmqraildo, o/13:32
samueldmqbtw today is raildo's bday :)13:32
* marekd happy bday, raildo!13:33
raildosamueldmq, marekd thanks!13:33
*** _cjones_ has joined #openstack-keystone13:34
samueldmqhenrynash, so roles should be namespace, for the existing ones, we put a global namespace (maybe none value) to indicate it's visible everywhere13:35
samueldmqhenrynash, domain specific roles have their namespaces set to domain's name/id13:35
samueldmqhenrynash, that's easy to implement/migrate13:35
*** jaosorior has joined #openstack-keystone13:35
samueldmqgyee, talking about domain specific roles^13:36
samueldmqgyee, and how we should implement them (usign the existing role api (extending it), so it would be easier to deployers/cloud admins)13:36
*** _cjones_ has quit IRC13:39
gyeesamueldmq, still trying to digest henrynash's email13:40
samueldmqgyee, k I am available to discuss anything about dynamic policies, etc13:41
samueldmqgyee, let me know if you have concerns13:41
gyeesamueldmq, I think we maybe attempting to solve too many problems in one shot13:43
gyeewe already have the policy CRUD APIs in v3, making them *usable* take some thinking13:44
openstackgerritMerged openstack/python-keystoneclient-kerberos: Updated from global requirements  https://review.openstack.org/17986713:44
gyeealso, we if are going to support role groups/hierarchy, I can 't see how we can avoid increasing the token size13:47
*** zzzeek has joined #openstack-keystone13:48
raildogyee, today we already have the list of roles, I don't think this will increase (so much) the token size.13:49
gyeeraildo, so with role groups/hierarchies, we are either going to put the "effective roles" or the hierarchies in the token13:50
gyeeeither way, token size will grow13:51
*** lmtaylor1 has joined #openstack-keystone13:51
raildogyee, in the fernet token we don't have the roles inside the token, right?13:52
raildo(just curious)13:52
gyeeno13:52
gyeewith fernet, roles lookup on token validation13:52
raildofernet may be the default kind of token in liberty?13:53
gyeeI hope so13:53
bknudsondo we have devstack set up so that it can configure for fernet?13:53
raildogyee, ok.. thanks :)13:53
*** annasort has joined #openstack-keystone13:53
gyeebknudson, I am not aware13:54
samueldmqgyee, yep, that spec cover a lot of changes13:54
samueldmqgyee, there are individual specs for individual changes13:54
samueldmqgyee, I am still improving/clarifying the overview spec13:54
samueldmqgyee, which is https://review.openstack.org/#/c/147651/13:54
gyeesamueldmq, I think we need to do this in phases13:55
gyee1. policy management13:55
samueldmqgyee, ++13:55
gyee2. policy enforcement13:55
gyee3. role groups/hierarchy13:56
samueldmqgyee, I tried to show these phases by splitting the whole solution into problems13:56
marekdgyee: explain 1,2, please. policy management would be accessing policy rules from central endpoint via some APIs?13:56
samueldmqgyee, problems we are going to solve with dynmaic policies13:56
samueldmqgyee, in that spec13:56
gyeefor policy management, how do we make the existing policy CRUD usable13:56
*** e0ne is now known as e0ne_13:56
gyeei.e. how do I enable nova manage their policies in Keystone with having them "accidentially" mess up swift's policy13:57
*** dobson has quit IRC13:57
gyeethat needs granular access control, which we don't have today13:57
gyeewe don't have the concept of policy ownership in Keystone today13:58
samueldmqgyee, I and henry were thinking about introducing a capabilities CRUD on keystone13:58
gyeewe generally lacking service user "self-service" features13:58
samueldmqgyee, so that roles would contain a set of capabilities and constraints (scope constraints)13:58
samueldmqgyee, it should be loaded from the existing policies initially13:58
*** e0ne_ is now known as e0ne13:59
raildoI think that we need a design session for this... so samueldmq can explain for everyone in just one time, and we can define better this feature.13:59
*** e0ne is now known as e0ne_13:59
*** e0ne_ is now known as e0ne14:00
*** e0ne is now known as e0ne_14:00
*** e0ne_ is now known as e0ne14:00
samueldmqraildo, sure, we will be discussing all this at the summit, I think ayoung has a session for dynamic policy14:01
gyeeso what is a "role"? don't think we even have a common understanding on that one, let a lone role groups14:01
samueldmqgyee, role is a set of capabilities14:01
*** ajayaa has joined #openstack-keystone14:01
gyeewhat does that mean at the atomic level? :)14:01
samueldmqgyee, capabilities14:01
gyeewhat is a capability?14:02
gyeeAPI?14:02
samueldmqgyee, yes14:02
samueldmqgyee, loaded from the current policies14:02
samueldmqgyee, capabilities are namespaced to services14:02
gyeewhich is to perform a *set of action* and a *set of resource*14:02
samueldmqgyee, yes14:02
*** ayoung has joined #openstack-keystone14:03
*** ChanServ sets mode: +v ayoung14:03
*** sigmavirus24_awa is now known as sigmavirus2414:03
gyeeaction = CURD, resource = arguments14:03
gyeethat much we know14:03
*** joesavak has joined #openstack-keystone14:04
samueldmqgyee, by resource you mean the scope the action is constrained to right ?14:04
gyeeresource, in oslo policy lango, would be targets14:04
gyeewhich are essentially args to the API14:04
*** dobson has joined #openstack-keystone14:04
*** blewis has joined #openstack-keystone14:05
samueldmqgyee, I will write up an etherpad to clarify things, without the need of a long motivation problem description as we need in a spec14:07
samueldmqgyee, need to go afk for a bit, sorry14:07
gyeesamueldmq, no problem, I still haven't think it through yet, this is not an easy problem by any means14:09
*** gokrokve has joined #openstack-keystone14:10
*** bdossant_ has joined #openstack-keystone14:14
*** bdossant has quit IRC14:15
*** fhubik is now known as fhubik_afk14:16
*** bdossant_ has quit IRC14:19
*** ajayaa has quit IRC14:19
*** lifeless has quit IRC14:20
*** lifeless has joined #openstack-keystone14:27
*** fhubik_afk is now known as fhubik14:35
openstackgerritLauren Taylor proposed openstack/keystonemiddleware: Add keystone v3 API to fetch revocation list  https://review.openstack.org/18017214:35
*** kiran-r has quit IRC14:36
*** mattfarina has joined #openstack-keystone14:36
morganfainberggyee: I like my curd interfaces.14:37
morganfainberggyee: :p. Ok I know... Silly typo. That implies milk instead of api :P14:38
*** emagana has joined #openstack-keystone14:40
*** iurygregory has quit IRC14:42
gyeeheh14:42
*** gokrokve_ has joined #openstack-keystone14:43
*** blewis has quit IRC14:46
*** gokrokve has quit IRC14:46
*** pnavarro has quit IRC14:49
*** blewis has joined #openstack-keystone14:49
*** mattfarina has quit IRC14:55
*** mattfarina has joined #openstack-keystone14:55
*** fhubik has quit IRC14:56
*** vhoward has left #openstack-keystone15:03
*** _cjones_ has joined #openstack-keystone15:05
*** _cjones_ has quit IRC15:09
*** gyee has quit IRC15:13
*** gyee has joined #openstack-keystone15:14
*** ChanServ sets mode: +v gyee15:14
*** davidckennedy has joined #openstack-keystone15:15
lbragstadspec proposal freeze for liberty is l-1 right?15:22
*** esp_ has joined #openstack-keystone15:23
lbragstadand feature freeze for liberty is l-2?15:23
*** esp_ has quit IRC15:24
*** lhcheng has joined #openstack-keystone15:26
*** ChanServ sets mode: +v lhcheng15:26
gyeelbragstad, that's what I heard from the street :)15:27
lbragstadgyee: cool, thanks!15:27
openstackgerritAlexander Makarov proposed openstack/keystone: Add redelegation columns to Trust SQL model  https://review.openstack.org/17209015:27
*** dims_ has joined #openstack-keystone15:32
*** dims has quit IRC15:34
*** Ctina is now known as ctina15:43
*** spandhe has quit IRC15:51
*** lhcheng has quit IRC15:52
openstackgerritLauren Taylor proposed openstack/keystonemiddleware: Add keystone v3 API to fetch revocation list  https://review.openstack.org/18017215:59
*** chlong has joined #openstack-keystone16:00
*** _cjones_ has joined #openstack-keystone16:04
*** josecastroleon has quit IRC16:06
*** ankita_wagh has joined #openstack-keystone16:07
*** josecastroleon has joined #openstack-keystone16:07
*** henrynash has quit IRC16:07
openstackgerritCyril Roelandt proposed openstack/keystonemiddleware: Prevent a UnicodeDecodeError in the s3token middleware  https://review.openstack.org/17977716:08
*** henrynash has joined #openstack-keystone16:08
*** ChanServ sets mode: +v henrynash16:08
*** josecastroleon has quit IRC16:09
dstanekmorganfainberg: not much on the meeting agenda for today16:10
*** josecastroleon has joined #openstack-keystone16:10
*** josecastroleon has quit IRC16:12
*** josecastroleon has joined #openstack-keystone16:13
morganfainbergdstanek: yeah. I expect it to be light with summit soon16:14
*** bknudson has quit IRC16:14
*** josecastroleon has quit IRC16:15
openstackgerritCyril Roelandt proposed openstack/keystonemiddleware: Prevent a UnicodeDecodeError in the s3token middleware  https://review.openstack.org/17977716:16
*** josecastroleon has joined #openstack-keystone16:16
*** henrynash has quit IRC16:16
*** Bjoern__ has joined #openstack-keystone16:17
*** chlong has quit IRC16:18
*** josecastroleon has quit IRC16:18
*** Bjoern__ is now known as BjoernT16:18
*** josecastroleon has joined #openstack-keystone16:20
*** _cjones_ has quit IRC16:20
*** josecastroleon has quit IRC16:21
*** josecastroleon has joined #openstack-keystone16:23
*** josecastroleon has quit IRC16:24
*** _cjones_ has joined #openstack-keystone16:25
*** josecastroleon has joined #openstack-keystone16:26
*** jistr has quit IRC16:26
*** josecastroleon has quit IRC16:27
*** davidckennedy has quit IRC16:28
*** josecastroleon has joined #openstack-keystone16:29
*** lhcheng has joined #openstack-keystone16:29
*** ChanServ sets mode: +v lhcheng16:29
*** alexsyip has joined #openstack-keystone16:31
*** josecastroleon has quit IRC16:31
*** ctina has quit IRC16:32
*** josecastroleon has joined #openstack-keystone16:32
*** ctina has joined #openstack-keystone16:32
*** josecastroleon has quit IRC16:34
*** josecastroleon has joined #openstack-keystone16:35
*** josecastroleon has quit IRC16:37
*** ankita_wagh has quit IRC16:37
*** josecastroleon has joined #openstack-keystone16:38
*** gokrokve_ has quit IRC16:39
*** josecastroleon has quit IRC16:40
*** joesavak has quit IRC16:40
*** josecastroleon has joined #openstack-keystone16:41
openstackgerritLauren Taylor proposed openstack/keystonemiddleware: Add keystone v3 API to fetch revocation list  https://review.openstack.org/18017216:42
*** josecastroleon has quit IRC16:43
*** josecastroleon has joined #openstack-keystone16:45
*** josecastroleon has quit IRC16:46
*** ajayaa has joined #openstack-keystone16:48
*** josecastroleon has joined #openstack-keystone16:48
*** josecastroleon has quit IRC16:49
*** josecastroleon has joined #openstack-keystone16:51
*** josecastroleon has quit IRC16:52
*** josecastroleon has joined #openstack-keystone16:54
*** mattfarina has quit IRC16:57
*** browne has quit IRC16:57
*** mattfarina has joined #openstack-keystone16:57
*** joesavak has joined #openstack-keystone17:03
-openstackstatus- NOTICE: zuul has been restarted to troubleshoot an issue, gerrit events between 15:00-17:00 utc were lost and changes updated or approved during that time will need to be rechecked or have their approval votes readded to trigger testing17:04
*** e0ne has quit IRC17:05
*** gokrokve has joined #openstack-keystone17:07
*** gokrokve has quit IRC17:07
*** harlowja has quit IRC17:08
*** ankita_wagh has joined #openstack-keystone17:08
*** harlowja has joined #openstack-keystone17:09
*** gokrokve has joined #openstack-keystone17:12
*** gokrokve has quit IRC17:12
*** gyee has quit IRC17:14
*** topol has joined #openstack-keystone17:16
*** ChanServ sets mode: +v topol17:16
*** gyee has joined #openstack-keystone17:21
*** ChanServ sets mode: +v gyee17:21
*** josecastroleon has quit IRC17:23
*** josecastroleon has joined #openstack-keystone17:25
*** josecastroleon has quit IRC17:26
*** josecastroleon has joined #openstack-keystone17:28
*** josecastroleon has quit IRC17:29
*** josecastroleon has joined #openstack-keystone17:31
*** josecastroleon has quit IRC17:32
*** dims_ has quit IRC17:33
openstackgerritMin Song proposed openstack/keystone: Use single connection in get_all function for getting "enabled" values for all ldap users.  https://review.openstack.org/18024717:33
*** browne has joined #openstack-keystone17:33
*** josecastroleon has joined #openstack-keystone17:34
*** dims has joined #openstack-keystone17:34
*** josecastroleon has quit IRC17:36
*** josecastroleon has joined #openstack-keystone17:37
*** josecastroleon has quit IRC17:39
*** henrynash has joined #openstack-keystone17:39
*** ChanServ sets mode: +v henrynash17:39
*** josecastroleon has joined #openstack-keystone17:40
*** Zanatoz has quit IRC17:41
*** josecastroleon has quit IRC17:42
*** jsavak has joined #openstack-keystone17:43
*** josecastroleon has joined #openstack-keystone17:43
*** edmondsw has joined #openstack-keystone17:44
*** josecastroleon has quit IRC17:45
openstackgerrithenry-nash proposed openstack/keystone: Use correct LOG translation indicator for errors  https://review.openstack.org/16714117:45
*** joesavak has quit IRC17:46
*** josecastroleon has joined #openstack-keystone17:46
openstackgerrithenry-nash proposed openstack/keystone: Use correct LOG translation indicator for errors  https://review.openstack.org/16714117:48
*** josecastroleon has quit IRC17:48
*** rdo has quit IRC17:49
openstackgerrithenry-nash proposed openstack/keystone: Use correct LOG translation indicator for errors  https://review.openstack.org/16714117:49
*** e0ne has joined #openstack-keystone17:50
*** josecastroleon has joined #openstack-keystone17:50
*** e0ne is now known as e0ne_17:50
*** e0ne_ is now known as e0ne17:51
*** packet has joined #openstack-keystone17:51
*** josecastroleon has quit IRC17:51
*** josecastroleon has joined #openstack-keystone17:53
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Change project name constraint  https://review.openstack.org/15837217:54
openstackgerritMin Song proposed openstack/keystone: Use single connection in get_all function for getting "enabled" values for all ldap users.  https://review.openstack.org/18024717:54
*** josecastroleon has quit IRC17:54
*** ajayaa has quit IRC17:55
*** josecastroleon has joined #openstack-keystone17:56
*** josecastroleon has quit IRC17:57
david8husamueldmq, gyee, The current v3 policies lack of who can change what policy.  It is kind of like free for all if you are a admin.  It leaves room for improvement :)17:58
gyeedavid8hu, yes sir indeed17:59
*** josecastroleon has joined #openstack-keystone17:59
*** joesavak has joined #openstack-keystone18:00
*** bknudson has joined #openstack-keystone18:00
*** ChanServ sets mode: +v bknudson18:00
*** jsavak has quit IRC18:02
*** josecastroleon has quit IRC18:03
*** samleon has quit IRC18:04
*** josecastroleon has joined #openstack-keystone18:04
*** josecastroleon has quit IRC18:06
*** josecastroleon has joined #openstack-keystone18:07
openstackgerritSam Leong proposed openstack/keystone: Tokenless authz with X.509 SSL client certificate  https://review.openstack.org/15687018:08
*** gokrokve has joined #openstack-keystone18:09
*** josecastroleon has quit IRC18:09
*** josecastroleon has joined #openstack-keystone18:10
*** josecastroleon has quit IRC18:12
*** gokrokve has quit IRC18:12
*** josecastroleon has joined #openstack-keystone18:13
*** packet has quit IRC18:14
*** josecastroleon has quit IRC18:15
openstackgerritMin Song proposed openstack/keystone: Use single connection in get_all function for getting "enabled" values for all ldap users.  https://review.openstack.org/18024718:17
*** josecastroleon has joined #openstack-keystone18:17
openstackgerritMin Song proposed openstack/keystone: Use single connection in get_all function for getting "enabled" values for all ldap users.  https://review.openstack.org/18024718:17
*** josecastroleon has quit IRC18:18
openstackgerritSam Leong proposed openstack/keystone: Tokenless authz with X.509 SSL client certificate  https://review.openstack.org/15687018:19
*** josecastroleon has joined #openstack-keystone18:20
*** josecastroleon has quit IRC18:22
*** josecastroleon has joined #openstack-keystone18:23
*** kiran-r has joined #openstack-keystone18:24
*** gokrokve has joined #openstack-keystone18:24
*** josecastroleon has quit IRC18:25
*** josecastroleon has joined #openstack-keystone18:26
*** josecastroleon has quit IRC18:28
*** jsavak has joined #openstack-keystone18:29
*** gokrokve has quit IRC18:29
*** josecastroleon has joined #openstack-keystone18:29
*** josecastroleon has quit IRC18:31
*** joesavak has quit IRC18:32
*** josecastroleon has joined #openstack-keystone18:32
*** rdo has joined #openstack-keystone18:33
*** gokrokve has joined #openstack-keystone18:34
*** josecastroleon has quit IRC18:34
*** josecastroleon has joined #openstack-keystone18:35
*** josecastroleon has quit IRC18:37
*** josecastroleon has joined #openstack-keystone18:38
*** packet has joined #openstack-keystone18:39
*** j_king has quit IRC18:40
*** j_king has joined #openstack-keystone18:40
*** josecastroleon has quit IRC18:41
bknudsondstanek: https://bugs.launchpad.net/pbr/+bug/1260495 !18:41
openstackLaunchpad bug 1260495 in python-keystoneclient "Setting autodoc_tree_index_modules makes documentation builds fail" [Low,Confirmed] - Assigned to David Stanek (dstanek)18:41
*** josecastroleon has joined #openstack-keystone18:42
*** josecastroleon has quit IRC18:44
dstanekbknudson: yeah, i just saw that email come across18:44
*** josecastroleon has joined #openstack-keystone18:45
*** josecastroleon has quit IRC18:47
*** josecastroleon has joined #openstack-keystone18:48
*** josecastroleon has quit IRC18:50
*** josecastroleon has joined #openstack-keystone18:51
*** BjoernT has quit IRC18:53
*** josecastroleon has quit IRC18:53
*** josecastroleon has joined #openstack-keystone18:54
*** josecastroleon has quit IRC18:56
*** josecastroleon has joined #openstack-keystone18:57
*** josecastroleon has quit IRC18:59
*** bknudson has quit IRC19:00
*** henrynash has quit IRC19:00
*** kiran-r has quit IRC19:00
*** josecastroleon has joined #openstack-keystone19:00
*** gokrokve has quit IRC19:01
*** gokrokve has joined #openstack-keystone19:01
*** josecastroleon has quit IRC19:03
gyeeayoung, morganfainberg, endpoint constraint and dynamic policy are two different thing19:03
gyeedon't confuse the two19:03
ayounggyee, enpoind contraint is one form of policy19:04
ayoungthere are details there you have missed19:04
*** josecastroleon has joined #openstack-keystone19:04
gyeebut they don't manage the same way19:04
ayoungfor example, we want to let some operations go by without a token at all19:04
ayoungalso, endpoibnt, service, region...we filter on them today19:04
ayoungthere might be other things19:04
gyeeayoung, no, this is strictly endpoint checking19:04
gyeeayoung, this is a concentrated task, not trying to boil the ocean19:05
ayounggyee, we are close on this.19:05
ayoungIt might be endpoint in once case, and service in another19:05
ayoungit might be region as well19:05
ayoungwe don't want separate mechanisms for each19:06
*** josecastroleon has quit IRC19:06
gyeeyes, its a filter, specified in the form of a rule19:06
ayoungwe want a service catalog filter applied on all API calls19:06
gyeeayoung, we can expend it to include other policies later19:06
gyeebut lets do this in stages19:06
ayoungmake it so it accepts the policy format and we get that now19:06
ayoungit does not need to be in the core policy file, although it probably should be19:06
gyeeayoung, you mean make it configurable where to pull the rules?19:06
ayoungwe could have it as a standard rule19:07
ayoungsomething like global:catalog19:07
ayoungor you know, something that doesn;t suck19:07
gyeeoh19:07
*** josecastroleon has joined #openstack-keystone19:07
gyeeyou mean tagging the config?19:07
gyeeit's a configurable rule right now19:08
*** jistr has joined #openstack-keystone19:08
gyeeit doesn't suck19:08
ayounggyee, I mean make it something that works in the same namespace as compute:  identity:  and so on19:09
*** josecastroleon has quit IRC19:09
ayoungso it can be in the  global policy file or we can do the policy directory thing19:09
gyeeayoung, no need for namespace as the operation is internal19:09
ayounggyee, NO19:10
ayoungyou are missing the point19:10
ayoung this is part of what we want operators to manage19:10
ayoungwe provide a reasonable default19:10
*** josecastroleon has joined #openstack-keystone19:10
ayoungit is not internal19:10
ayoungjust make the default do the sane thing19:10
lhchengdstanek: wanted to circle back on this, are you okay with the current validation on the trusted_dashboard or make it a little more restrictive. https://bugs.launchpad.net/keystone/+bug/144095819:11
openstackLaunchpad bug 1440958 in Keystone "loosen validation on matching trusted dashboard" [Medium,Fix committed] - Assigned to Lin Hua Cheng (lin-hua-cheng)19:11
gyeelike19:11
ayoungBTW,  endpoint binding is going to be one of my examples in the Dynamic policy talk19:11
gyeenova:endpoint_constraint: endpoint_id:1234519:11
ayoungexactly19:11
gyeek, that's an easy change19:11
*** josecastroleon has quit IRC19:12
gyeeayoung, will roll a patch with your suggestion, thanks19:12
ayounggyee  and we use the existing policy mechanism to enforce.  There is support for a directory, so it will be one file with one rule in it19:12
*** spandhe has joined #openstack-keystone19:12
ayounggyee, you rock thanks so much19:12
ayoungand with that...gotta fly19:12
dstaneklhcheng: it's definitely not secure as designed19:13
*** gyee has quit IRC19:13
mordredquestion about domains19:13
*** josecastroleon has joined #openstack-keystone19:13
mordredif I don't know what's up - but the cloud has told me that my user_domain_name is "foo"  - should I assume in the absence of other information that the project is in that domain too?19:13
dstaneklhcheng: i think the check itself is useless if we just accept a querystring param of host header and check it against a keystone controlled string since those are too easy to spoof19:14
*** ayoung has quit IRC19:14
*** josecastroleon has quit IRC19:15
*** EmilienM is now known as EmilienM|afk19:15
*** gyee has joined #openstack-keystone19:15
*** ChanServ sets mode: +v gyee19:15
*** raminoid has joined #openstack-keystone19:16
*** josecastroleon has joined #openstack-keystone19:16
gyeeayoung, one problem19:17
dstanekmordred: unfortunately i don't know the answer to that question19:17
*** ankita_wagh has quit IRC19:17
gyeethe name of the operations has to be known19:17
mordreddstanek: awesome19:17
gyeethat means we'll have to add a third config option19:17
dstaneksomeone else in here should though....hopefully you don't have to wait too long19:18
*** jdennis has quit IRC19:18
david-lylemordred what type of token did you get?19:18
*** josecastroleon has quit IRC19:18
lhchengdstanek: would making the suggested change in the ticket (comment #9) make it better?19:19
*** josecastroleon has joined #openstack-keystone19:19
dstaneklhcheng: the problem isn't just what to match, but what you are matching against - we're taking user defined input to match against right?19:21
*** josecastroleon has quit IRC19:21
gyeedstanek, what's up with the Cavs?!19:22
dstaneklhcheng: it's possible that there is not risk to this attack (i don't know the entire flow), but generally speaking we can't trust user controlled inputs19:22
mordreddavid-lyle: no idea - I'm trying to both help a problem someone else and also learn things19:22
dstanekgyee: La Failure sucks, always has and alway will19:22
*** josecastroleon has joined #openstack-keystone19:23
mordreddavid-lyle: what should I know about this:19:23
gyeeno Love19:23
mordredecho "Please enter the OpenStack domain name of your project: "19:23
lhchengdstanek: yes, the host in the query param is user defined.  Which means any dashboard (like horizon) can define what the redirect_url would be.19:23
mordredread OS_PROJECT_DOMAIN_NAME_INPUT19:23
mordredexport OS_PROJECT_DOMAIN_NAME=$OS_PROJECT_DOMAIN_NAME_INPUT19:23
mordreddavid-lyle: from horizon19:23
mordreddavid-lyle: why would a project_domain_name not be in that file19:23
mordred?19:23
dstaneklhcheng: that's the problem to me... while i couldn't find the issue in horizon another dashboard may be vulnerable to unvalidated redirects19:24
dstaneklhcheng: and then if there were would that be an issue?19:24
*** josecastroleon has quit IRC19:24
david-lylemordred: should just be the name of the containing domain19:25
*** josecastroleon has joined #openstack-keystone19:26
mordreddavid-lyle: how does someone know that?19:26
david-lylenot sure why it wouldn't be in the openrc file19:26
david-lyleis that the file you're talking about?19:26
mordredyup19:26
mordredthat was a paste from one19:26
mordredbut I'm trying to use it to try to understand domains more :)19:27
*** josecastroleon has quit IRC19:27
*** amakarov is now known as amakarov_away19:27
lhchengdstanek: so the value in the trusted_dashboard config is validated against the redirect url provided by the dashboard initiating the request19:27
lhchengdstanek: would that be a sufficient validation?19:28
dstaneklhcheng: an exact match or a startswith?19:28
*** josecastroleon has joined #openstack-keystone19:28
david-lylemordred: the user's domain name should match, the project domain name in most cases19:29
david-lyletrying to remember if cross-domain role assignment is supported in keystone19:29
gyeedavid-lyle, yes19:29
lhchengdstanek: we used exact match before, then replaced it matching just <scheme>://<netloc> to make it easier for deployer to setup19:29
david-lylegyee: boom19:30
lhchengdstanek: we could replace it with startswith19:30
david-lylemordred, ok so most cases19:30
david-lyle99.5%19:30
lhchengdstanek: so it would be up to deployer how restrictive they want it to be19:30
dstaneklhcheng: so exact match should be safe, but a startswith would open the security hole19:30
gyee99.14159%19:30
david-lylethe other fraction gets messy19:30
*** josecastroleon has quit IRC19:31
*** Bjoern__ has joined #openstack-keystone19:32
lhchengdstanek: so let's just revert the change? I have no problem reverting the change.19:32
*** josecastroleon has joined #openstack-keystone19:32
mordreddavid-lyle: ok. I'll start with that19:32
*** josecastroleon has quit IRC19:34
dstaneklhcheng: probably. i cant' think of an attack for exact matching. maybe stevemar or marekd could shed some light on what info the dashboard gets that could be stolen.19:34
lhchengdstanek: would appreciate if you can add your feedback to https://bugs.launchpad.net/keystone/+bug/144095819:35
openstackLaunchpad bug 1440958 in Keystone "loosen validation on matching trusted dashboard" [Medium,Fix committed] - Assigned to Lin Hua Cheng (lin-hua-cheng)19:35
*** josecastroleon has joined #openstack-keystone19:35
lhchengdstanek: I can follow-up with marekd and stevemar when they get online later.19:35
dstaneklhcheng: just added a comment; take a look and let me know if my worry isn't clear19:37
*** josecastroleon has quit IRC19:37
*** josecastroleon has joined #openstack-keystone19:38
*** josecastroleon has quit IRC19:40
*** josecastroleon has joined #openstack-keystone19:41
*** emagana has quit IRC19:42
*** emagana has joined #openstack-keystone19:42
*** josecastroleon has quit IRC19:43
*** josecastroleon has joined #openstack-keystone19:45
*** josecastroleon has quit IRC19:46
*** ankita_wagh has joined #openstack-keystone19:47
*** mestery has quit IRC19:48
*** josecastroleon has joined #openstack-keystone19:48
*** vhoward has joined #openstack-keystone19:48
samueldmqmordred, what's up ? you're trying to use the CLI ?19:48
*** jistr has quit IRC19:49
*** josecastroleon has quit IRC19:49
*** josecastroleon has joined #openstack-keystone19:54
samueldmqmordred, in a multi-domain env, when you want to get a token to a project, if you don't specify the project_id directly (want to specify the project name instead)19:54
samueldmqmordred, you then need to specify the domain owns that project19:55
samueldmqmordred, since project names are unique inside domains, not globally19:56
samueldmqmordred, https://github.com/openstack/keystone/blob/master/keystone/resource/backends/sql.py#L25919:56
*** josecastroleon has quit IRC19:56
*** josecastroleon has joined #openstack-keystone19:58
*** Rockyg has joined #openstack-keystone19:59
*** josecastroleon has quit IRC19:59
mordredsamueldmq: yah - but what I don't know is - how do I learn the domain that owns the project19:59
*** josecastroleon has joined #openstack-keystone20:01
samueldmqmordred, domains are usually created to separate different customers, in which you would be able to delegate users, groups and proejct management20:02
samueldmqmordred, if you have a domain for your org, it shouldn't be hard to know what that domain is20:02
*** josecastroleon has quit IRC20:02
samueldmqmordred, and in most cases it will be the same domain as you're in (as said above by david)20:03
samueldmqmordred, you are supposed to at least know where the project you are trying to use comes from20:03
*** josecastroleon has joined #openstack-keystone20:04
*** josecastroleon has quit IRC20:05
*** josecastroleon has joined #openstack-keystone20:07
morganfainbergWhich change is the issue ^^20:08
openstackgerritAnkita Wagh proposed openstack/keystonemiddleware: Handling endpoints with missing URL types  https://review.openstack.org/17962420:08
*** josecastroleon has quit IRC20:08
*** josecastroleon has joined #openstack-keystone20:10
samueldmqmorganfainberg, there is no project outside a domain, so I can't use a domain-less project :p20:11
samueldmqmorganfainberg, unless we get back to tenants20:11
*** josecastroleon has quit IRC20:11
*** rushiagr_away is now known as rushiagr20:12
morganfainbergsamueldmq: uhh. Correct.20:12
morganfainbergDomain less project shouldn't exist.20:12
morganfainbergI mean... That would be a broken project afaik.20:12
samueldmqmorganfainberg, ++ that's why we need to specify the project + containing domain (its namespace)20:12
*** josecastroleon has joined #openstack-keystone20:13
morganfainbergYep20:13
richmmordred: openstack project list --long # will show the domain id of the project20:13
richmer, openstack --os-identity-api-version 3 project list --long20:13
samueldmqrichm, you should already have token to make this call20:13
richmright20:14
samueldmqrichm, how did you get it ? what if you have no rights to list all projects ?20:14
*** ctina_ has joined #openstack-keystone20:14
*** josecastroleon has quit IRC20:14
richmsamueldmq: I don't know - if you don't rights to list projects, then some admin with those rights should tell you, or grant you access to find out for yourself20:15
samueldmqrichm, why do you know the project you want to use without know the domain which contains it ?20:15
samueldmqrichm, it's the project namespace20:16
*** josecastroleon has joined #openstack-keystone20:16
richmbecause you are used to the old v2 style of user+project?20:16
richmand you're not used to having to deal with domains yet?20:16
samueldmqrichm, so it's the domain default if you haven't a multi-domain cloud20:16
richmright20:16
richmgrep default_domain_id /etc/keystone/keystone.conf20:17
richmor just 'default' if that's not set20:17
samueldmqrichm, I guess you can specify the domain name20:17
richmyes20:17
richmI think openstack allows you to specify the domain name or id for users, projects, etc.20:17
*** josecastroleon has quit IRC20:17
richm--os-user-domain-id or --os-user-domain-name, etc.20:18
*** ctina has quit IRC20:18
*** josecastroleon has joined #openstack-keystone20:19
*** ctina_ has quit IRC20:19
mordredwell, I don't run a cloud20:19
mordredso I can't ever grep in keystone20:19
mordredso I can't ever grep in keystone.conf20:19
richmmordred: if your keystone is v3 enabled, who is the admin?  Can they either tell you which domain to use, or grant you access to list projects?20:20
mordredrichm: well, right now I don't have a keystonev3 cloud - but I'm trying to make sure that the ansible modules do the right hting20:21
*** josecastroleon has quit IRC20:21
mordredbut part of this is that a user figuring out their auth information for a cloud is always a terrible experience20:21
mordredso I'm trying to learn as much as I can to point people who know nothing about openstack to being able to put the right values into thier config files20:21
richmmordred: then we are probably solving the same problems - I'm working on implementing v3 support in puppet20:22
mordredrichm: woot!20:22
*** josecastroleon has joined #openstack-keystone20:22
mordredrichm: my work is all in the shade library (openstack-infra/shade) which is also being consumed in ansible, fwiw20:22
richmI don't know if it is kosher for an ansible person to ask questions in puppet-openstack, but you might get answers20:23
*** spandhe has quit IRC20:23
mordredwell, I'm a puppet person too20:23
mordredwe do use ansible to run puppet over in openstack-infra after all20:23
*** josecastroleon has quit IRC20:24
richmok20:24
richmmordred: You may have seen the recent os-dev email thread about Keystone v3 and puppet20:25
*** josecastroleon has joined #openstack-keystone20:25
*** josecastroleon has quit IRC20:27
*** gyee has quit IRC20:28
*** josecastroleon has joined #openstack-keystone20:28
*** josecastroleon has quit IRC20:30
*** josecastroleon has joined #openstack-keystone20:31
*** lhcheng has quit IRC20:33
*** josecastroleon has quit IRC20:34
*** lhcheng_ has joined #openstack-keystone20:34
*** josecastroleon has joined #openstack-keystone20:35
*** josecastroleon has quit IRC20:36
*** e0ne has quit IRC20:38
*** josecastroleon has joined #openstack-keystone20:38
*** aix has quit IRC20:38
*** Trozz has quit IRC20:39
*** Trozz has joined #openstack-keystone20:39
*** josecastroleon has quit IRC20:39
*** rushiagr is now known as rushiagr_away20:40
*** d34dh0r53 has quit IRC20:41
*** josecastroleon has joined #openstack-keystone20:41
*** josecastroleon has quit IRC20:42
*** josecastroleon has joined #openstack-keystone20:44
*** d34dh0r53 has joined #openstack-keystone20:45
*** josecastroleon has quit IRC20:46
*** r-daneel has joined #openstack-keystone20:47
*** josecastroleon has joined #openstack-keystone20:47
*** josecastroleon has quit IRC20:49
*** raildo is now known as raildo_away20:50
*** josecastroleon has joined #openstack-keystone20:50
*** josecastroleon has quit IRC20:52
*** josecastroleon has joined #openstack-keystone20:53
*** gyee has joined #openstack-keystone20:54
*** ChanServ sets mode: +v gyee20:54
*** annasort has quit IRC20:54
openstackgerritguang-yee proposed openstack/keystone-specs: Updated endpoint enforcement spec  https://review.openstack.org/17479920:55
*** josecastroleon has quit IRC20:55
*** josecastroleon has joined #openstack-keystone20:57
*** josecastroleon has quit IRC20:59
*** spandhe has joined #openstack-keystone20:59
*** josecastroleon has joined #openstack-keystone21:00
*** ankita_w_ has joined #openstack-keystone21:00
*** ankita_wagh has quit IRC21:02
*** josecastroleon has quit IRC21:03
*** josecastroleon has joined #openstack-keystone21:04
*** josecastroleon has quit IRC21:06
*** jsavak has quit IRC21:06
*** josecastroleon has joined #openstack-keystone21:07
*** josecastroleon has quit IRC21:09
openstackgerritMin Song proposed openstack/keystone: Use single connection in get_all function  https://review.openstack.org/18024721:09
*** josecastroleon has joined #openstack-keystone21:10
*** josecastroleon has quit IRC21:12
*** josecastroleon has joined #openstack-keystone21:13
*** josecastroleon has quit IRC21:15
*** josecastroleon has joined #openstack-keystone21:16
*** josecastroleon has quit IRC21:18
*** josecastroleon has joined #openstack-keystone21:19
*** josecastroleon has quit IRC21:21
*** josecastroleon has joined #openstack-keystone21:22
*** josecastroleon has quit IRC21:24
*** Bjoern__ has left #openstack-keystone21:25
*** josecastroleon has joined #openstack-keystone21:25
*** josecastroleon has quit IRC21:27
*** gyee has quit IRC21:27
*** boris-42 has quit IRC21:28
*** josecastroleon has joined #openstack-keystone21:28
*** lmtaylor1 has left #openstack-keystone21:30
*** josecastroleon has quit IRC21:30
*** josecastroleon has joined #openstack-keystone21:31
*** dguerri is now known as _dguerri21:33
*** josecastroleon has quit IRC21:33
*** _dguerri is now known as dguerri21:33
*** josecastroleon has joined #openstack-keystone21:34
*** topol has quit IRC21:36
*** josecastroleon has quit IRC21:37
*** josecastroleon has joined #openstack-keystone21:38
*** dguerri is now known as _dguerri21:38
*** _dguerri is now known as dguerri21:38
*** lhcheng_ is now known as lhcheng21:39
*** ChanServ sets mode: +v lhcheng21:39
*** josecastroleon has quit IRC21:40
*** josecastroleon has joined #openstack-keystone21:41
*** josecastroleon has quit IRC21:43
marekddstanek: lhcheng: Hi what's up?21:43
*** josecastroleon has joined #openstack-keystone21:44
*** josecastroleon has quit IRC21:46
*** stevemar has joined #openstack-keystone21:47
*** ChanServ sets mode: +v stevemar21:47
*** josecastroleon has joined #openstack-keystone21:47
*** edmondsw has quit IRC21:49
richmstevemar: is there a way to tell the openstack command to use auth settings from the [keystone_authtoken] section of a config file?  There is a common idiom in puppet openstack modules where you put the auth parameters in your component config file in the [keystone_authtoken] section - then to use openstack, you read them out and format them in the form of arguments like --os-user-name, etc.21:49
*** josecastroleon has quit IRC21:49
richmstevemar: I would rather just say openstack --os-auth-file /etc/glance/glance-api.conf image list21:50
*** blewis has quit IRC21:50
stevemarrichm, not yet, that wasn't really a use case, since that's for keystonemiddleware21:50
stevemarrichm, did you look @ the new cloud-config stuff?21:50
*** josecastroleon has joined #openstack-keystone21:51
richmstevemar: cloud-config?21:51
marekddstanek: lhcheng honesly, i think not checking the exact url is already wrong.21:51
stevemarrichm, yeah, trying to find you some docs21:52
*** josecastroleon has quit IRC21:52
*** annasort has joined #openstack-keystone21:53
marekddstanek: lhcheng i might have my dashboard stored at the public provider, say https://public.provider.com/marek and somebody may make my users to enter https://public.provider.com/.marek and afar netlock would match, as it would be public.provider.com21:53
lhchengmarekd: you're working late now too?  :p21:53
stevemarrichm, http://docs.openstack.org/developer/python-openstackclient/configuration.html#configuration-files21:53
*** josecastroleon has joined #openstack-keystone21:54
marekdlhcheng: i just opened the terminal and saw that somebody called my irc handle...21:54
marekd:-)21:54
marekdneed to get up in 6h so i will not stay long.21:54
marekdlhcheng: anyway, what's the issue btw now?21:54
marekdlhcheng: btw, i never got the answer why the validation got loosen?21:54
marekdlhcheng: who asked/complained about that?21:55
lhchengmarekd: it is about the validation of the trusted dashboard21:55
marekdlhcheng: yep, which now checks scheme and netloc21:55
stevemarmarekd, cause at one point we failed validation due to a missing slash21:55
*** ptoohill is now known as pothole21:55
lhchengmarekd: we loosened it to just match <scheme>://<netloc>21:55
*** josecastroleon has quit IRC21:55
marekdlhcheng: yep, saw the patchset.21:56
lhchengmarekd: dstanek raised a concern that it is a security hole, a malicious user could put an unvalidated redirects21:56
*** josecastroleon has joined #openstack-keystone21:57
marekdlhcheng: like?21:57
marekdsay https://public.provider.com/marek and  https://public.provider.com/.marek  ?21:57
lhchengmarekd: redirect_url=http://dashboard/redirect?url=http://hacked_site21:57
marekd(mind dot at the latter .marek)21:57
marekdlhcheng: oh, that's nice, actually i have the same concern.21:58
lhchengafter dashboard login the user, it will redirect to hacked site21:58
marekdjust came up with different example21:58
*** josecastroleon has quit IRC21:58
marekdlhcheng: if you really need to loosen the validation i'd go with startswith() like you proposed.21:58
lhchengmarekd: dstanek provided that example, much easier to visualize the attack21:58
marekdif the problem is the configuration and slashes I think we should improve logs/erros to quickly catch such errors.21:59
marekdnot loosen validation.21:59
lhchengmarekd: even with that, there is potential for the same attack above.21:59
*** josecastroleon has joined #openstack-keystone22:00
*** esp_ has joined #openstack-keystone22:00
lhchengmarekd: with something like redirect_url=http://dashboard/identity/?next=http://hacked_site22:00
marekdlhcheng: ah, with startswith() you mean?22:00
lhchengmarekd: yes!22:01
lhchengI guess, we'll just revert it back. And have a patch to improve logging22:01
richmstevemar: https://bugs.launchpad.net/python-openstackclient/+bug/145204522:01
openstackLaunchpad bug 1452045 in python-openstackclient "read auth parameters from a config file" [Undecided,New]22:01
marekdlhcheng: so i'd revert to the initial concept and mak it very strict22:01
lhchengmarekd: it is already strict :P we just have to make it more easier to troubleshoot I guess22:02
marekdand again - if the problem is that configuration is error prone because every slash matters - let's improve logs/error msg22:02
lhchengstevemar: ^22:02
lhchengmarekd: agree22:02
*** josecastroleon has quit IRC22:02
*** ankita_w_ has quit IRC22:03
*** josecastroleon has joined #openstack-keystone22:04
*** ankita_wagh has joined #openstack-keystone22:04
*** josecastroleon has quit IRC22:05
marekdlhcheng: i don't see the strict check.22:06
marekdlhcheng: i see https://github.com/openstack/keystone/blob/master/keystone/contrib/federation/controllers.py#L269-L28322:06
*** josecastroleon has joined #openstack-keystone22:07
stevemarrichm, hmm, i'm not sure how much traction that bug will get -- especially since we just added cloud config support and it's so similar22:08
lhchengmarekd: used to be exact match here: https://github.com/openstack/keystone/blob/9b11d13856034e3a2cf6ab1f6ca80a6965818d17/keystone/contrib/federation/controllers.py#L28622:08
*** josecastroleon has quit IRC22:08
lhchengmarekd: the redirect_url must exactly match an entry in trusted_dashboards22:09
marekdlhcheng: used to be, but it's not anymore in master.22:10
*** josecastroleon has joined #openstack-keystone22:10
richmstevemar: understood - it would just save a considerable amount of puppet code + resources22:10
lhchengmarekd: yeah, so that's the concern of dstanek. I'll revert it back :)22:10
marekd:-)22:11
stevemarrichm, and we're already having a tough time handling the priorities if: occ properties + env vars + in-line options are all passed in22:11
stevemara fourth... oy vei22:11
marekdlhcheng: what redirect_url did you have to specify?22:11
*** josecastroleon has quit IRC22:11
marekdwas is simply https://my-horizon.company.com or with some razy suffixes?22:12
*** packet has quit IRC22:12
marekds/razy/crazy/22:12
richmstevemar: understood - it's really just a convenience to save the puppet code from having to read the ini and convert to --os- arguments or yaml or env - just a few more lines of ruby . . .22:12
lhchengmarekd: including the suffixes22:13
*** josecastroleon has joined #openstack-keystone22:13
lhchengmarekd: something like: http://localhost:8020/auth/websso/22:14
lhchengmarekd: the redirect_url  for horizon dashboard is something like that.22:14
*** josecastroleon has quit IRC22:15
marekdin the  public providers versions ports would be probably skipped, and i personally consider suffixes like /auth/websso/ nice :-)22:15
marekdi was worrying that would be http://localhost:8020/auth/websso/?param=sdjfnksfuysbjhbsfsdf&auth=lksjndfksefkhsbdfhsdf&cookie=jsndfklhsfouayrjhfbgdfgdfg22:15
*** josecastroleon has joined #openstack-keystone22:16
lhchengmarekd: cool, nice that we're on the same side on that :D22:16
marekd:-)22:17
marekdyep22:17
lhchengbut that settings could be possible too, if the deployer wants it :P22:17
marekdso he will have a guy who will take care of carefull url copy/pasting22:18
marekd:-)22:19
lhchengyeah, copy/paste expert22:19
lhcheng:)22:19
*** josecastroleon has quit IRC22:19
marekdanyway, i think the concept with the websso design was that we only allow trusted and defined apriori dashboards to use it, and unless we decide to loosen this constraint we shouldnt loosen mechanisms to enfore that. this is my opinion.22:20
marekddstanek: ^^22:20
marekdand let me end with that :-)22:20
marekdgood night everybody22:20
lhchengmarekd: thanks for checking in22:21
lhchengmarekd: have a good night22:21
*** josecastroleon has joined #openstack-keystone22:21
marekdno worries! you too!22:21
*** jdennis has joined #openstack-keystone22:21
lhchengdstanek: thanks for raising the issue too!22:21
*** gordc has quit IRC22:22
*** josecastroleon has quit IRC22:22
*** josecastroleon has joined #openstack-keystone22:24
*** stevemar has quit IRC22:24
*** josecastroleon has quit IRC22:25
*** josecastroleon has joined #openstack-keystone22:27
*** Ephur has quit IRC22:28
*** josecastroleon has quit IRC22:28
*** rwsu_ has quit IRC22:30
*** josecastroleon has joined #openstack-keystone22:30
*** Rockyg has quit IRC22:30
*** rwsu_ has joined #openstack-keystone22:30
*** josecastroleon has quit IRC22:31
*** josecastroleon has joined #openstack-keystone22:33
openstackgerritLin Hua Cheng proposed openstack/keystone: Revert "Loosen validation on matching trusted dashboard"  https://review.openstack.org/18034322:33
*** josecastroleon has quit IRC22:34
*** josecastroleon has joined #openstack-keystone22:36
*** josecastroleon has quit IRC22:38
*** josecastroleon has joined #openstack-keystone22:39
*** josecastroleon has quit IRC22:41
*** josecastroleon has joined #openstack-keystone22:42
*** josecastroleon has quit IRC22:44
*** josecastroleon has joined #openstack-keystone22:45
*** josecastroleon has quit IRC22:47
*** josecastroleon has joined #openstack-keystone22:48
*** alex_xu has quit IRC22:49
*** josecastroleon has quit IRC22:50
*** alex_xu has joined #openstack-keystone22:51
*** EmilienM|afk is now known as EmilienM22:52
*** josecastroleon has joined #openstack-keystone22:52
*** josecastroleon has quit IRC22:53
dstanekmarekd: lhcheng: i just skimmed, but i agree about making sure there are no holes22:54
dstaneklhcheng: yw22:54
*** josecastroleon has joined #openstack-keystone22:55
*** josecastroleon has quit IRC22:56
*** emagana has quit IRC22:57
*** josecastroleon has joined #openstack-keystone22:58
*** emagana has joined #openstack-keystone22:58
*** josecastroleon has quit IRC22:59
*** esp_ has quit IRC23:01
*** josecastroleon has joined #openstack-keystone23:01
*** emagana has quit IRC23:02
*** josecastroleon has quit IRC23:03
*** josecastroleon has joined #openstack-keystone23:04
*** topol has joined #openstack-keystone23:05
*** ChanServ sets mode: +v topol23:05
*** josecastroleon has quit IRC23:06
*** josecastroleon has joined #openstack-keystone23:07
*** josecastroleon has quit IRC23:09
*** emagana has joined #openstack-keystone23:09
*** alex_xu has quit IRC23:10
*** josecastroleon has joined #openstack-keystone23:10
*** alex_xu has joined #openstack-keystone23:11
*** josecastroleon has quit IRC23:12
*** josecastroleon has joined #openstack-keystone23:13
*** emagana has quit IRC23:14
*** josecastroleon has quit IRC23:15
*** josecastroleon has joined #openstack-keystone23:17
*** josecastroleon has quit IRC23:18
*** josecastroleon has joined #openstack-keystone23:20
*** josecastroleon has quit IRC23:21
*** josecastroleon has joined #openstack-keystone23:23
*** josecastroleon has quit IRC23:25
*** josecastroleon has joined #openstack-keystone23:26
*** josecastroleon has quit IRC23:28
*** josecastroleon has joined #openstack-keystone23:29
*** josecastroleon has quit IRC23:31
*** jaosorior has quit IRC23:32
*** josecastroleon has joined #openstack-keystone23:32
*** josecastroleon has quit IRC23:34
*** josecastroleon has joined #openstack-keystone23:35
*** josecastroleon has quit IRC23:37
*** josecastroleon has joined #openstack-keystone23:38
*** josecastroleon has quit IRC23:41
*** josecastroleon has joined #openstack-keystone23:42
*** josecastroleon has quit IRC23:44
*** josecastroleon has joined #openstack-keystone23:45
*** josecastroleon has quit IRC23:47
*** josecastroleon has joined #openstack-keystone23:48
*** josecastroleon has quit IRC23:50
*** josecastroleon has joined #openstack-keystone23:51
*** josecastroleon has quit IRC23:53
*** josecastroleon has joined #openstack-keystone23:54
*** josecastroleon has quit IRC23:56
*** josecastroleon has joined #openstack-keystone23:57
*** josecastroleon has quit IRC23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!