Thursday, 2015-05-07

*** ankita_w_ has quit IRC00:07
morganfainberglhcheng: keystone will need to have compat code if the interface changes. The idea is we will be able to load a different version, but if the version is different, you need to support the old versions00:14
morganfainberglhcheng: this is so we can change the interface.00:16
lhchengmorganfainberg: would that mean the manager class would have handle making the appropriate call to the interface depending on the driver interface version it see?00:18
lhchengmorganfainberg: or implement some adapter pattern that connects manager and driver00:18
morganfainbergOr a layer between the manager and driver.00:18
lhchengmorganfainberg: yeah, something like that00:19
morganfainbergThat is part of what I want to design at the summit.00:19
morganfainbergAnd ayoung isn't here have a couple of replies for him. Bah.00:20
lhchengmorganfainberg: okay, let's wait for the summit then00:25
lhchengare you working on StrictABC?00:25
lhchengor is that something to be implemented? :)00:25
morganfainberglhcheng: I have the first pass posted but I need to split it to it's own lib.00:26
morganfainbergUnder Oslo00:27
lhchengmorganfainberg: cool, found your patch under keystone00:30
lhchengwill take a pass on it.00:31
*** rm_work is now known as rm_work|away00:35
*** ankita_wagh has joined #openstack-keystone00:43
*** _cjones_ has quit IRC00:47
*** sigmavirus24 is now known as sigmavirus24_awa00:56
samueldmqmorganfainberg, should we write a cross-project spec for having services fully working with v3 ?01:06
samueldmqmorganfainberg, so people from other projects can understand better why we are creatig v3 only gate jobs, and all the bugs we open would refer to that bp/spec01:07
samueldmqjamielennox, cc ^01:09
jamielennoxsamueldmq: it can't hur t01:09
jamielennoxbut i haven't really had an issue convincing services to accept v3, most people know it's been around for a while01:09
samueldmqjamielennox, not to convince them or let them know it's necessary, but only to sync up goals01:10
samueldmqjamielennox, and have a common bp/spec for where we can point to01:10
samueldmqjamielennox, as we find bugs/fix them01:10
samueldmqjamielennox, btw see https://bugs.launchpad.net/tempest/+bug/145198701:11
openstackLaunchpad bug 1451987 in tempest "Tempest against openstack deployed with keystone v3 only, fails to initialize" [Undecided,Confirmed]01:11
jamielennoxyea, i was thinking when i was doing the heat stuff i should just make one v3 auth bug and file all the project names against it as i find them01:12
jamielennoxit makes sense as a bug, i don't know if it makes sense as an openstack spec because v3 has been approved a long time ago01:12
samueldmqjamielennox, not really a spec, just a bp then01:12
samueldmqjamielennox, something nice to have, but is not a bug (the behavior is not wrong, we just dont support yet)01:13
samueldmqmakes sense?01:13
jamielennoxsure, it's good to have something to tie all the reviews together01:13
samueldmqjamielennox, cool, so where so the bp live ?01:14
samueldmqshould*01:15
jamielennoxumm, it would have to be somewhere global, i don't know where the openstack-specs blueprints actually go01:16
*** ayoung has joined #openstack-keystone01:27
*** ChanServ sets mode: +v ayoung01:27
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Refactor request methods onto request object  https://review.openstack.org/18039401:44
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Create a simple base class from AuthProtocol  https://review.openstack.org/18081601:44
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Make token bind work with a request  https://review.openstack.org/18081701:44
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Extract basic validation processing to base class  https://review.openstack.org/18081801:44
*** _cjones_ has joined #openstack-keystone01:48
ayoungrichm, so packstack does not have a hell of a lot of Keystone options01:52
ayoungI ran packstack --gen-answer-file=rdo.answers.txt01:52
ayoungand looking at what it sets, there does not seem to be a way to change the ports for Keystone AUTH_URL.  DOes the Puppet module lock us in like that, too?  Is there any way to set https as the protocol?01:53
*** zzzeek has quit IRC01:53
richmayoung: what version?01:57
ayoungrichm, I'm running right out of yum defaults at the moment01:57
ayoungtest day instructions01:57
ayounglet me see....01:57
ayoungrichm, openstack-packstack-2014.2-0.23.dev1468.gd049ea9.el7.noarch01:58
richmok - so that's juno-ish01:58
jamielennoxayoung: i appreciate the auth_token reviews - however you started at the end of the queue :)01:59
ayoungjamielennox, I realized, and then I switched to the old view01:59
ayoungthe new view does a lot of things right, but dropping the dependencies was not one of them02:00
ayoungjamielennox, I think I got them all.  Nice and small patches like that are easy to review02:01
ayoungjamielennox, what needs to stay fixed on the auth info stuff?  What can we not break?02:01
jamielennoxayoung: wow - i hadn't seen that02:01
jamielennoxayoung: htanks02:01
richmayoung: you are correct - packstack has no option to configure keystone to listen to different ports02:02
ayoungrichm, and to set https?02:02
richmayoung: because why would anyone ever want to do that? :-(02:02
ayoungHeh02:02
richmayoung: nope02:02
*** stevemar has joined #openstack-keystone02:04
*** ChanServ sets mode: +v stevemar02:04
ayoungjamielennox, does auth info have to remain a dictionary?  We don't support other people adding values to it, right?02:05
jamielennoxayoung: it needs to remain a dict in keystoneclient, i moved it off that in keystoneauth02:06
ayoungjamielennox, does it need to be a dict, or just act like one?02:06
ayoungHeh....read that out loud.  Funny02:06
jamielennoxayoung: i don't think it needs to be a dict02:07
*** browne1 has quit IRC02:07
ayoungis keystoneauth live?02:08
richmayoung: those options are there in puppet-keystone but packstack does not use them02:08
ayoungrichm, port and https both?02:08
jamielennoxayoung: no, not yet02:08
richmayoung: yes02:09
ayoungrichm, cool.  I wonder if I can hack pack stack atack mack  what was I saying....02:09
richmayoung: puppet-keystone class keystone has a list of 50 or 60 configuration parameters, among which are the public_port, admin_port, and enable_ssl02:09
openstackgerritliusheng proposed openstack/keystone: Replace github reference by git.openstack.org and change a doc link  https://review.openstack.org/18039002:11
ayoungjamielennox, are you actively working on keystoneauth right now?02:12
jamielennoxayoung: not right this second02:12
ayoungjamielennox, but that is your work  in http://git.openstack.org/cgit/openstack/keystoneauth/tree/keystoneauth/auth/identity  or is it morganfainberg 's?02:12
jamielennoxoh - that's in openstack/ so it's all moved into gerrit etc02:13
jamielennoxwe've proposed and merged a bunch of fixes02:13
jamielennoxmostly me propose, morganfainberg stamps it02:13
ayoungjamielennox, so my AccessInfo code goes in there>?02:14
jamielennoxi think the intention was to have some pre releases around summit time, then a real version not long after02:14
jamielennoxi need to make sure i can actually get ksc to work on top of ksa02:14
ayoungjamielennox, so, I think moving https://review.openstack.org/#/c/138519/  is right, but it still doesn't resolve our differences.  How far apart are we?02:15
jamielennoxi still don't think i want the model,02:16
jamielennoxwith https://review.openstack.org/#/c/180818/ i'd say we're a couple of reviews away from having auth_token consumed by client02:16
jamielennoxconsumer by server i mean02:17
richmayoung: https://github.com/stackforge/puppet-keystone/blob/master/manifests/init.pp02:17
richmayoung: packstack - https://github.com/stackforge/packstack/blob/master/packstack/puppet/templates/keystone.pp#L2002:17
jamielennoxon of my end goals with this auth_token clean up is to figure out what i can use between keystone server and auth_token02:18
jamielennoxthat last review is moving towards a base class that AuthProtocol subclasses02:18
ayoungjamielennox, ok...let's get that far.  I think model is the right way to go, but  I'll let you run before we get there.02:18
ayoungrichm, Ok  so If I want to affect a change in https://github.com/stackforge/packstack/blob/master/packstack/puppet/templates/keystone.pp#L20  let me see02:19
jamielennoxi think i can get it down to like one or two abstract functions for fetch_token() which keystone will have to implement different to auth_token middleware - because it uses the db and not a fetch or a cache02:19
ayoungrichm, https://github.com/stackforge/packstack/blob/master/packstack/puppet/templates/keystone.pp#L7  I guess I need a param for that line02:20
ayoungjamielennox, well, not completely02:20
ayoungwith tokenless we'll have to build one on the fly02:20
jamielennoxayoung: are you building a token on the fly or are you just not building one?02:21
ayoungjamielennox,  we still need to run policy, so we need all the same values.  I don;t need to call it a token, but I need all the AuthInfo02:21
jamielennoxyea, ok -02:22
jamielennoxat it's most basic there you could simply put a "FAKEVAL" in X-Auth-Token if it's not found and if you get a fetch for that id you build a token as you go02:23
jamielennoxthere are ways we can get around that02:23
jamielennoxit just depends if we care about that token passing through normal validation after that02:23
jamielennoxanyway, everything those reviews are proposing for now is private until I can have a chance to look at actually using it from the server02:24
richmayoung: $keystone_url is only used to set up the public_url and internal_url endpoints02:26
richmayoung: it does nothing for configuring keystone to listen to that protocol/port02:26
ayoungrichm, so,  if I were to leave it on 5000 and 35357, but wanted to set things for https, I need to set the SSLRequireSSL  param in the virtual host section.  Is that possible?02:27
*** _cjones_ has quit IRC02:27
ayoungthat is an HTTPD thing, right?02:28
richmayoung: see https://github.com/stackforge/packstack/blob/master/packstack/puppet/templates/keystone.pp#L3502:28
richmyes, it's an httpd thing02:28
*** lhcheng has quit IRC02:29
ayoungrichm, line 1 forces that to false.  Can that be set externally?02:29
richmayoung: maybe you just need to have $keystone_use_ssl = true02:29
richmayoung: no02:29
*** lhcheng has joined #openstack-keystone02:30
*** ChanServ sets mode: +v lhcheng02:30
*** lhcheng has quit IRC02:30
richmayoung: https://github.com/stackforge/puppet-keystone/blob/master/manifests/wsgi/apache.pp#L10702:30
richmlots of ssl related params there02:30
ayoungrichm, do I need to do    $keystone_use_ssl = hiera('CONFIG_KEYSTONE_USE_SSL'),02:30
richmnone of which can be set via packstack02:30
ayoungrichm, I think that might be a lost cause.  I think to do port 5000, you need a virtual host, but to do 443 you can't use a virtual host02:31
richmok - fyi there is no such packstack parameter CONFIG_KEYSTONE_USE_SSL02:32
richmunless you were proposing to add it02:32
ayoungrichm, yep, I just invented that02:32
ayoungI probably need to run packstack on one VM and have it connect to another to actually run for development...and then script blowing away and restarting that other one02:33
ayoungif I do KEYSTONE_USE_SSL  we also need to update the auth_url all of the other services get02:34
ayoungthat is actually the painful part.  it ends up in the service catalog in the database02:34
*** davechen has joined #openstack-keystone02:35
morganfainbergayoung: yes prerelease of ksa around summit.02:35
* morganfainberg is just walking in after travel.02:35
ayoungmorganfainberg, can you convince jamielennox that model is a good thing? I think besides that we can make things work02:35
ayoungmorganfainberg, I'm going to let him go as far as he can with the exisint auth info, in the direction of getting the server to consume auth_token02:36
richmayoung: yeah, it's pretty painful - there are a lot of places where 'http' and '5000' and '35357' and in some cases 'v2.0' are hard coded in packstack and openstack puppet modules02:36
morganfainbergayoung: I think this is going to be a summit topic at this point.02:36
ayoungmorganfainberg, figured02:36
jamielennox:)02:37
richmayoung: I'm trying to tackle the 'v2.0' part now02:37
morganfainbergrichm: my guess is that is partially inherited when someone looked at devstack to make them.02:37
morganfainbergJust a hunch.02:37
richmmorganfainberg: no doubt a lot of cargo cult stuff02:37
ayoungrichm, am I right about the virtual host thing?02:37
morganfainbergsamueldmq: ping. Home now.02:37
richmayoung: I'm not sure02:37
richmayoung: never tried it02:37
ayoungrichm, nah, I mean from what you know about apache02:38
richmayoung: it probably won't work since there is another puppet virtual host resource setting up 443 e.g. horizon02:38
ayoungcould we drop the virtual host for keystone and still have it on 5000 and 3535702:38
ayoungrichm, so, yeah, it can't be in a virtual host, and it shouldn't be either02:38
ayoungI want keystone under /keystone02:38
ayounghttps://hostname/keystone/admin and https://hostname/keystone/main02:39
ayoungrichm, ok...dumb idea time02:41
ayoungwhat if we put Listen 5000 and Listen 35357 outside of the virtual host entries?02:42
ayoungthen..make no distinction between admin and main02:42
richmayoung: they already are02:42
* ayoung goes to find a server to look02:42
richmayoung: looks like puppet apache::mod::ssl doesn't support SSLRequireSSL02:42
samueldmqmorganfainberg, hi, I was planning to creating a cross-project bp, so we could link all bugs we find/changes we need to it02:42
richmayoung: /etc/httpd/conf/ports.conf02:42
samueldmqmorganfainberg, I am talking about the v3 support02:42
morganfainbergSure. Should be easy.02:43
ayoungrichm, and no 443 in mine...ok02:43
ayoungrichm, so <VirtualHost *:35357> must just match when a request comes in on that port02:44
ayoungmorganfainberg, what is the plan for 5000 vs 35357 for v3?  Just use 35357?02:44
samueldmqmorganfainberg, however I don't think we have a project for cross-project bps, since blueprints are held in lp02:45
ayoungI thought we were trying to kill the two port thing02:45
samueldmqmorganfainberg, I know we have cross-projects specs, but not sure this is the case02:45
ayoungrichm, the v3 pipeline is identitcal for both ... I think02:45
*** richm has quit IRC02:45
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/etc/keystone-paste.ini#n8202:46
morganfainbergayoung: I think 5000 is the choice because 35357 and ephemeral port bs02:46
morganfainbergayoung: but short term: v3 works on both.02:46
ayoungmorganfainberg, but we are going down to one, right?02:46
ayoungand v3 is identical?02:46
morganfainbergayoung: yes v3 should be identical.02:47
ayoungso..if we go for keystone without v2.0,  we only need one port02:47
morganfainbergAnd I want to drop one of the ports for sure.02:47
ayoungmorganfainberg, what if we ran  only admin and v3.0  would everything work?02:47
morganfainbergOnce v2 dies02:47
ayoungadmin v2.0 and v302:47
morganfainbergDunno. Haven't tried that.02:47
morganfainbergMaybe.02:47
ayoungmorganfainberg, what if I submit a patch for that and we see if it makes it through check on Zuul....02:48
morganfainbergayoung: if we merge admin and main together it'd probably do what you want.02:48
ayoungdrop the 'main '  pipeline and  have the admin cover both....02:48
morganfainbergjamielennox: I think pecan is the right direction btw.02:48
morganfainbergayoung: yes.02:48
ayoungmorganfainberg, let me try that....02:49
morganfainbergayoung: that would be the step I'd take.02:49
morganfainbergjamielennox: vs falcon. Based on a lot of internal emails and the thread you started.02:49
*** r-daneel has quit IRC02:49
*** zzzeek has joined #openstack-keystone02:50
morganfainbergjamielennox: and if pecan is lacking / silly we should work on fixing it. (Afaict the benchmarks are not really representative of a real system, so I'd go pecan since it is fairly well known)02:50
morganfainbergIn falcon that is ^ hence pecan02:51
morganfainbergayoung: I think we have a deprecation message for non-http keystone already.02:51
*** dims_ has quit IRC02:51
morganfainbergayoung: from the earlier statement you made.02:51
ayoungmorganfainberg, I'm trying to get packstack and puppet in line with https everywhere right now02:52
*** dims has joined #openstack-keystone02:52
morganfainbergNod02:52
jamielennoxmorganfainberg: yea, that's fine. It's pretty much the answer i was expecting, dstanek was keen on the falcon POC and i think pecan is not great for APIs so i thought i'd see if it was even worth doing other pocs02:53
morganfainbergRight.02:54
jamielennoxnothing can't be done with pecan02:54
jamielennoxthough people might have to toughen up and look at the review02:54
*** ankita_wagh has quit IRC02:56
samueldmqmorganfainberg, so ... since we don't have cross-project bp ... should we create a cross-project spec ? just a bug ?02:59
jamielennoxthis might actually be a job for storyboard - or that might be a rabbit hole03:01
samueldmqjamielennox, hmm ..  A task tracking system for inter-related projects03:03
samueldmqit's said :)03:03
jamielennoxi don't know however if those projects all need to be registered on storyboard03:03
jamielennoxor what the state of gerrit integration there is etc03:03
*** markvoelker has quit IRC03:04
samueldmqyeah, me too, I've never heard someone does use it =x03:04
*** zzzeek has quit IRC03:05
*** dims has quit IRC03:11
openstackgerritDavid Stanek proposed openstack/python-keystoneclient: Removes temporary fix for doc generation  https://review.openstack.org/12166703:13
morganfainbergsamueldmq: bring it up in the x-project meeting.03:22
samueldmqmorganfainberg, ack, will add a topic to it (https://wiki.openstack.org/wiki/Meetings/CrossProjectMeeting)03:23
morganfainbergsamueldmq: make sure to read how topics are added to that meeting b03:24
morganfainbergYou might need to talk to ttx03:24
samueldmqmorganfainberg, great will do, thanks03:25
samueldmqmorganfainberg, would be good to have that spec/bp whatever by the summit03:25
samueldmqimo03:25
openstackgerritPriti Desai proposed openstack/keystone: Unable to list role assignments in Project  https://review.openstack.org/18084603:29
*** browne has joined #openstack-keystone03:36
*** links has joined #openstack-keystone03:45
openstackgerritayoung proposed openstack/keystone: Make everything use admin for V2.0  https://review.openstack.org/18084803:48
ayoungmorganfainberg, so ^^ fails a bunch of tests, but the results are kindof strange03:48
ayoungthe only change I made was using the same pipeline for both admin and main.  It was the smallest change I could make to test this03:49
*** _cjones_ has joined #openstack-keystone03:53
*** _cjones_ has quit IRC03:57
*** emagana has quit IRC04:03
*** markvoelker has joined #openstack-keystone04:04
*** samueldmq has quit IRC04:07
openstackgerritPriti Desai proposed openstack/keystone: Unable to list role assignments in Project  https://review.openstack.org/18084604:07
*** markvoelker has quit IRC04:09
*** spandhe has quit IRC04:14
*** ankita_wagh has joined #openstack-keystone04:21
*** emagana has joined #openstack-keystone04:41
*** emagana has quit IRC04:46
*** kiran-r has joined #openstack-keystone04:51
*** stevemar has quit IRC05:03
*** markvoelker has joined #openstack-keystone05:05
*** lhcheng has joined #openstack-keystone05:06
*** ChanServ sets mode: +v lhcheng05:06
*** henrynash has joined #openstack-keystone05:08
*** ChanServ sets mode: +v henrynash05:08
*** markvoelker has quit IRC05:10
*** emagana has joined #openstack-keystone05:35
*** ankita_wagh has quit IRC05:37
*** emagana has quit IRC05:40
*** _cjones_ has joined #openstack-keystone05:42
*** _cjones_ has quit IRC05:46
*** markvoelker has joined #openstack-keystone05:51
*** markvoelker has quit IRC05:56
*** davechen has quit IRC06:00
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/17933106:04
*** henrynash has quit IRC06:10
*** mflobo has quit IRC06:13
*** spandhe has joined #openstack-keystone06:22
*** spandhe_ has joined #openstack-keystone06:23
*** spandhe has quit IRC06:27
*** spandhe_ is now known as spandhe06:27
*** mflobo has joined #openstack-keystone06:27
*** emagana has joined #openstack-keystone06:37
*** ankita_wagh has joined #openstack-keystone06:38
*** emagana has quit IRC06:42
bigjoolsmarekd: testshib worked for me, thanks for the great tip. I now have a problem with keystone that I don't have when using Kerberos - it hangs for 2 minutes at the ACS callback and then goes to the Log In page again with an error about authenticating. I'm using the same mapping that worked for Kerberos so not sure what's up.06:43
*** markvoelker has joined #openstack-keystone06:52
*** markvoelker has quit IRC06:56
*** rm_work|away is now known as rm_work07:07
*** ankita_wagh has quit IRC07:24
*** pnavarro has joined #openstack-keystone07:24
*** _cjones_ has joined #openstack-keystone07:30
*** krykowski has joined #openstack-keystone07:31
*** emagana has joined #openstack-keystone07:32
*** _cjones_ has quit IRC07:35
*** emagana has quit IRC07:36
*** pnavarro has quit IRC07:40
*** lhcheng has quit IRC07:43
*** samueldmq has joined #openstack-keystone07:51
*** samueldmq has quit IRC07:54
*** jistr has joined #openstack-keystone07:54
*** rlt_ has joined #openstack-keystone08:10
*** fhubik has joined #openstack-keystone08:18
*** davechen has joined #openstack-keystone08:20
*** e0ne has joined #openstack-keystone08:23
*** emagana has joined #openstack-keystone08:26
*** henrynash has joined #openstack-keystone08:27
*** ChanServ sets mode: +v henrynash08:27
*** henrynash has quit IRC08:30
*** emagana has quit IRC08:31
*** henrynash has joined #openstack-keystone08:41
*** ChanServ sets mode: +v henrynash08:41
*** fhubik_afk has joined #openstack-keystone08:49
*** fhubik_afk is now known as fhubik_meeting08:49
*** fhubik has quit IRC08:49
*** markvoelker has joined #openstack-keystone08:53
*** markvoelker has quit IRC08:58
*** e0ne is now known as e0ne_09:03
openstackgerritDavid Charles Kennedy proposed openstack/keystone-specs: Updated endpoint enforcement spec  https://review.openstack.org/17479909:08
openstackgerritDavid Charles Kennedy proposed openstack/keystone-specs: Updated endpoint enforcement spec  https://review.openstack.org/17479909:12
*** pnavarro has joined #openstack-keystone09:13
*** aix has joined #openstack-keystone09:14
*** _cjones_ has joined #openstack-keystone09:19
*** emagana has joined #openstack-keystone09:20
*** _cjones_ has quit IRC09:24
*** emagana has quit IRC09:25
*** e0ne_ is now known as e0ne09:33
*** dims has joined #openstack-keystone09:36
*** spandhe has quit IRC09:37
*** fhubik_meeting is now known as fhubik09:38
*** fhubik has quit IRC09:38
*** fhubik has joined #openstack-keystone09:39
*** dims has quit IRC09:41
*** fhubik is now known as fhubik_afk09:53
*** markvoelker has joined #openstack-keystone09:54
*** fhubik_afk is now known as fhubik09:54
*** mabrams has joined #openstack-keystone09:55
*** bdossant has joined #openstack-keystone09:58
*** markvoelker has quit IRC09:58
*** dims_ has joined #openstack-keystone09:59
*** emagana has joined #openstack-keystone10:14
*** emagana has quit IRC10:18
*** henrynash_ has joined #openstack-keystone10:19
*** ChanServ sets mode: +v henrynash_10:19
*** henrynash has quit IRC10:21
*** henrynash_ is now known as henrynash10:21
*** fhubik is now known as fhubik_afk10:35
*** fhubik_afk is now known as fhubik10:54
*** markvoelker has joined #openstack-keystone10:55
*** markvoelker has quit IRC11:00
*** _cjones_ has joined #openstack-keystone11:08
*** emagana has joined #openstack-keystone11:08
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Sync from oslo incubator  https://review.openstack.org/18094511:10
*** emagana has quit IRC11:13
*** _cjones_ has quit IRC11:13
*** henrynash has quit IRC11:23
*** e0ne is now known as e0ne_11:27
openstackgerritJamie Lennox proposed openstack/python-keystoneclient: Add docstrings for ``protocol`` parameter  https://review.openstack.org/17730311:29
*** mabrams has left #openstack-keystone11:30
*** links has quit IRC11:31
*** links has joined #openstack-keystone11:32
*** fhubik is now known as fhubik_afk11:50
*** e0ne_ is now known as e0ne11:51
*** jaosorior has joined #openstack-keystone11:52
*** openstackgerrit has quit IRC11:52
*** openstackgerrit has joined #openstack-keystone11:53
openstackgerritMerged openstack/python-keystoneclient: Adapter version is a tuple  https://review.openstack.org/17886611:54
*** markvoelker has joined #openstack-keystone11:56
openstackgerritJamie Lennox proposed openstack/keystoneauth: Remove unused plugins from entrypoints  https://review.openstack.org/18096011:59
*** kiran-r has quit IRC12:00
*** markvoelker has quit IRC12:00
*** hogepodge has quit IRC12:02
*** emagana has joined #openstack-keystone12:02
*** hogepodge has joined #openstack-keystone12:05
*** raildo has joined #openstack-keystone12:05
*** emagana has quit IRC12:07
*** raildo has quit IRC12:10
*** raildo has joined #openstack-keystone12:10
*** henrynash has joined #openstack-keystone12:10
*** ChanServ sets mode: +v henrynash12:10
*** henrynash has quit IRC12:10
*** waterkinfe has joined #openstack-keystone12:13
*** markvoelker has joined #openstack-keystone12:15
*** waterkinfe has quit IRC12:15
*** dikonoor has joined #openstack-keystone12:18
*** fhubik_afk is now known as fhubik12:18
*** winggundamth has joined #openstack-keystone12:28
winggundamthhi. I got error on swift that used keystonemiddleware as authentication that's said about keystoneclient here http://paste.openstack.org/show/216014/12:30
winggundamthjust wonder is it related to keystoneclient bug about problem on self-signed https?12:31
winggundamthsee the line that is raise exceptions.SSLError(msg)#012SSLError: SSL exception connecting to https://admin-identity.example.com: [Errno 1] _ssl.c:510: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed12:36
*** doug-fish has joined #openstack-keystone12:43
doug-fishhi keystone friends. I'm trying to update some of my sample code for working with k2k auth and I am having trouble.12:45
doug-fishcode is here: https://review.openstack.org/#/c/160851/12:45
doug-fishexecutive summary: when I try to use the k2k auth plugin I keep getting "replay detected of message ID" errors in shib12:45
doug-fishrodrigods: have you seen this when using the k2 auth plugin?12:45
rodrigodsdoug-fish, I should mark that patch as WIP, since the design is far from being chosen12:49
rodrigods:(12:49
rodrigodshaven't properly tested it12:49
doug-fishsure - understood12:50
doug-fishI can see there is discussion in the code review12:50
doug-fishwhen you say "properly" does that mean "at all"?  I'd like to just get a simple case to work12:50
doug-fishwhich used to in earlier versions of the code. I can't figure out what might be wrong.12:50
*** dims_ has quit IRC12:51
rodrigodsdoug-fish, that code is a modification of something I had here... that code exactly I didn't test12:51
rodrigodsyet12:51
*** dims has joined #openstack-keystone12:51
doug-fishok sure - it's a priority for me at this moment so I guess I'll dig in and see if I can sort out what's happening.12:52
doug-fishIf I find what looks like a fix I may invoke my "co-author" rights.  :-)12:52
rodrigodsdoug-fish, ok, good... I'm also doing k2k tests here12:53
doug-fishrodrigods: and of course, if you get a chance to test and sort out how it's working for you I'd love to hear your result12:53
doug-fishgreat12:53
*** emagana has joined #openstack-keystone12:57
*** _cjones_ has joined #openstack-keystone12:57
*** emagana has quit IRC13:01
*** _cjones_ has quit IRC13:02
*** ctina__ has joined #openstack-keystone13:02
doug-fishrodrigods: I have an idea what's wrong - I've commented in https://review.openstack.org/#/c/172155/ do you mind sanity checking?13:02
rodrigodsdoug-fish, 1 sec13:04
*** vhoward has joined #openstack-keystone13:04
*** Ephur has joined #openstack-keystone13:05
rodrigodsdoug-fish, is the SP reusing the sessions?13:05
rodrigodsif it is the case, it is not sending a 30213:05
rodrigodsthat block is necessary in order to retrieve the token13:05
doug-fishrodrigods: I can say that it is returning a 302 on the first call - I set a breakpoint in that block to confirm. I'll keep looking if you think that's not on the right track.13:07
rodrigodsdoug-fish, after the 302, we need to access the sp auth_url13:08
* doug-fish thinking13:08
rodrigodssomething like /v3/OS-FEDERATION/identity_providers/{idp}/protocols/saml2/auth13:09
*** fhubik has quit IRC13:11
doug-fishyes, I see what you are saying13:11
doug-fishrodrigods: you're right.  I'll keeping digging.13:12
*** kiran-r has joined #openstack-keystone13:12
mfloboquestion about endpoint filtering in keystone13:12
mfloboIs anyone interested in endpoint group filtering implementation?13:13
*** nkinder has quit IRC13:14
*** fhubik has joined #openstack-keystone13:14
*** david-lyle has quit IRC13:19
bretonfolks, can I use v3.Token of ksc to authenticate using admin_token?13:21
doug-fishrodrigods: okay, here's theory 2 on the "replay detected of message ID" issue I'm seeing with k2k: each call to _get_unscoped_token is causing a new POST with the same ECP. Maybe the token should be stored and just returned?13:21
rodrigodsdoug-fish, makes sense, that was what I meant by "the SP is reusing the session"13:22
rodrigodsdoug-fish, does it work for the first request ever?13:22
doug-fishah ok - I don't speak python-keystoneclient very well yet :-)13:23
doug-fishrodrigods: yeah - it looks like the first POST/GET works13:23
doug-fishbut then then there is another call to get a token which gets the 500 error13:23
rodrigodsdoug-fish, cool, so you found the issue!13:24
doug-fishhooray!13:24
doug-fishis there a known pattern to fix this? not sure if get_auth_ref should be updated to store the AccessInfoV3 object maybe?13:24
*** openstackstatus has quit IRC13:25
rodrigodsdoug-fish, you can alter _get_unscoped_token to store the response and add a comment why you are doing this13:25
*** openstackstatus has joined #openstack-keystone13:26
*** ChanServ sets mode: +v openstackstatus13:26
doug-fishrodrigods: cool - will do!13:26
doug-fishthanks!13:26
*** gordc has joined #openstack-keystone13:27
*** bdossant has quit IRC13:27
*** gokrokve has joined #openstack-keystone13:33
*** richm has joined #openstack-keystone13:34
*** e0ne is now known as e0ne_13:34
*** e0ne_ is now known as e0ne13:37
*** sigmavirus24_awa is now known as sigmavirus2413:38
*** joesavak has joined #openstack-keystone13:39
*** chlong has joined #openstack-keystone13:39
*** zzzeek has joined #openstack-keystone13:46
openstackgerritMarek Denis proposed openstack/keystone: Correctly handle direct mapping with keywords  https://review.openstack.org/17598013:47
*** gokrokve has quit IRC13:49
*** r-daneel has joined #openstack-keystone13:49
*** lmtaylor has joined #openstack-keystone13:51
*** kiran-r has quit IRC13:51
*** jamielennox is now known as jamielennox|away13:51
*** topol has joined #openstack-keystone13:53
*** ChanServ sets mode: +v topol13:53
*** gokrokve has joined #openstack-keystone13:53
*** links has quit IRC13:54
*** gokrokve has quit IRC13:54
*** gokrokve has joined #openstack-keystone13:55
*** SpamapS has quit IRC13:58
*** fhubik has quit IRC13:59
*** nkinder has joined #openstack-keystone14:08
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Honor domain operations in project table  https://review.openstack.org/14376314:19
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone  https://review.openstack.org/16387814:27
*** mattfarina has joined #openstack-keystone14:39
*** emagana has joined #openstack-keystone14:41
morganfainbergdstanek: that work session is cross track now with qa.14:42
*** packet has joined #openstack-keystone14:43
morganfainbergdoug-fish: the replay warning/error happens if you try and reuse the saml assertion in appropriately. When we were doing testing we ran into that with using a test assertion w/o restarting shib.14:43
morganfainbergdoug-fish: it is a security thing.14:43
openstackgerritIoram Schechtman Sette proposed openstack/keystone: Instructions to install IETF ABFAB federation protocol on Keystone  https://review.openstack.org/16387814:45
*** _cjones_ has joined #openstack-keystone14:45
*** david-lyle has joined #openstack-keystone14:49
*** _cjones_ has quit IRC14:50
*** fhubik has joined #openstack-keystone14:52
* breton doesn't understand ksc sessions14:53
*** jsavak has joined #openstack-keystone14:53
*** fhubik has quit IRC14:53
*** fhubik has joined #openstack-keystone14:54
*** joesavak has quit IRC14:55
*** joesavak has joined #openstack-keystone14:56
*** jsavak has quit IRC14:58
bretonhttp://paste.openstack.org/show/216224/ why do I get the exception?15:02
*** fhubik_afk has joined #openstack-keystone15:03
*** fhubik has quit IRC15:04
*** topol has quit IRC15:06
*** rlt_ has quit IRC15:11
*** Bjoern__ has joined #openstack-keystone15:30
*** browne has quit IRC15:31
*** samueldmq has joined #openstack-keystone15:35
samueldmqayoung, hi - I was discussing with ericksonsantos a simple but powerful bd model to store the policies15:37
samueldmqayoung, it would make simple to both i) generate the policy ii) retrieve APIs a token is able to perform15:37
*** krykowski has quit IRC15:38
ayoungsamueldmq, work is already underway15:40
*** rm_work is now known as rm_work|away15:40
ayoungI can't type!15:40
ayoungah15:40
ayoungsamueldmq, Iorem has done a lot of work along these lines15:40
ayoungsamueldmq,  this policy file works with nova, glance, and cinder   https://github.com/admiyo/openstack-core-policy/blob/master/common-policy.json15:43
samueldmqayoung, ok I will sync with him15:50
*** breton has quit IRC15:50
samueldmqayoung, nice you put them together, and it just works15:50
samueldmqayoung, so the service just ignore the api's it doesn't know about, right?15:50
*** mattfarina has quit IRC15:51
*** esp has left #openstack-keystone15:52
openstackgerritDoug Fish proposed openstack/python-keystoneclient: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/17215515:59
*** davechen has left #openstack-keystone16:00
*** _cjones_ has joined #openstack-keystone16:01
*** pnavarro has quit IRC16:02
ayoungsamueldmq, yes.  So long as the API names do not conflict...there is no conflict16:04
*** ankita_wagh has joined #openstack-keystone16:04
ayoungsamueldmq, I'm going to try adding in neutron's next, but I need a different setup.  I think this is a candidate for oslo-incubator16:05
*** jsavak has joined #openstack-keystone16:05
samueldmqayoung, hmm so the unifies policy will go to oslo-incubator before graduated to its own repo16:06
samueldmqis that right ?16:06
ayoungsamueldmq, yes16:06
ayoungit gives us a way to make sure we have things right for each service.  Trying to do work in parallel16:07
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Restrict inherited role assignments to subdomains  https://review.openstack.org/16418016:07
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Remove domain table references  https://review.openstack.org/16593616:07
samueldmqayoung, cool .. I was wondering how we will migrate existing policies (in running deployments) to16:08
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Bye Bye Domain Table  https://review.openstack.org/16185416:08
*** joesavak has quit IRC16:08
samueldmqayoung, if we just  put them all together it's an easy task, but if we do other things (trying to make roles compatible across services, etc) it will be harder16:08
*** e0ne is now known as e0ne_16:08
ayounglbragstad, can you pull the trigger on https://review.openstack.org/#/c/157427/56  please?  I don;t want it beating my record for most revisions for a patch review.16:09
*** vhoward has left #openstack-keystone16:09
*** vhoward has joined #openstack-keystone16:10
ayoungsamueldmq, look through the git log in that repo, and you can see how I did it step by step16:10
lbragstadsure, I can take a look16:10
ayounglbragstad, thanks.  It is at the head of a long line of patches.16:12
*** browne has joined #openstack-keystone16:13
*** rm_work|away is now known as rm_work16:13
*** _cjones_ has quit IRC16:14
*** winggundamth has quit IRC16:15
*** breton has joined #openstack-keystone16:16
*** e0ne_ is now known as e0ne16:17
rodrigodsayoung, reseller marathon review?16:21
ayoungrodrigods, I've looked at these all multiple times...we have too much inventory on the shelves16:21
raildorodrigods, haha I like it!16:22
*** gokrokve_ has joined #openstack-keystone16:22
*** joesavak has joined #openstack-keystone16:23
*** _cjones_ has joined #openstack-keystone16:23
*** gokrokve_ has quit IRC16:23
*** gokrokve_ has joined #openstack-keystone16:24
*** dikonoor has quit IRC16:24
samueldmqayoung, if we have confliting rules coming from different policy files16:25
ayoungsamueldmq, we declofict16:25
samueldmqayoung, and they are completely different, how we unify this ?16:25
*** gokrokve has quit IRC16:25
ayoungI decide16:25
ayoungrandomly.  and finally16:26
ayoungwhimsically, too16:26
*** jsavak has quit IRC16:26
ayoungsamueldmq, so, the api names have been deconflicted thus far16:26
ayoungthe common rules need to be unified anyway16:26
samueldmq"xpto":"role:is_admin or role_whatever"16:26
samueldmq"xpto":""16:26
ayounglike the default rule, for example16:26
samueldmq^16:26
ayoungxpto?16:27
samueldmqayoung, an arbitrary rule16:27
ayoungsamueldmq, ... lets not get into that now.   You know the general path...right now I'm just doing the easy groundwork16:27
ayoungI havne't seen any major painpoints yet.  Need to figure out how to his neutron16:28
ayounghit16:28
samueldmqayoung, ok, I am just raising a flag that I am not convinced that unifying the policy is a task that we can easily automate16:29
samueldmq; )16:29
*** alexsyip has joined #openstack-keystone16:31
*** rm_work is now known as rm_work|away16:32
openstackgerritDavid Stanek proposed openstack/python-keystoneclient: Don't autodoc the test suite  https://review.openstack.org/18106416:33
*** emagana has quit IRC16:35
*** Bjoern__ is now known as BjoernT16:36
*** rushiagr_away is now known as rushiagr16:40
*** emagana has joined #openstack-keystone16:42
*** ankita_wagh has quit IRC16:43
*** lhcheng has joined #openstack-keystone16:43
*** ChanServ sets mode: +v lhcheng16:43
*** _cjones_ has quit IRC16:56
*** ankita_wagh has joined #openstack-keystone17:00
*** samleon has joined #openstack-keystone17:00
*** emagana has quit IRC17:00
*** _cjones_ has joined #openstack-keystone17:00
*** emagana has joined #openstack-keystone17:01
*** joesavak has quit IRC17:03
*** joesavak has joined #openstack-keystone17:07
bretonhttps://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/httpclient.py#L595 why don't we check auth_ref for domain scope?17:09
*** e0ne has quit IRC17:11
samueldmqdstanek, fyi : there will be a #qa fishbowl session to revisit tempest scope17:15
samueldmqdstanek, regarding funtional and integration tests, see https://etherpad.openstack.org/p/liberty-qa-summit-topics17:15
dstaneksamueldmq: yes, i plan on hanging out in some QA sessions17:16
samueldmqdstanek, ++ me too17:17
*** jistr has quit IRC17:17
lhchengI noticed  tox is configured to ignore: H405  multi line docstring summary not separated with an empty line17:17
lhchengis there a reason for that?17:18
samueldmqdstanek, btw #qa meeting is happening right now in the main meeting channel :)17:18
dstaneksamueldmq: yep, i'n there lurking17:18
samueldmq:)17:18
*** mattfarina has joined #openstack-keystone17:20
*** topol has joined #openstack-keystone17:35
*** ChanServ sets mode: +v topol17:35
*** ctina__ has quit IRC17:37
*** ctina___ has joined #openstack-keystone17:37
*** emagana has quit IRC17:40
*** emagana has joined #openstack-keystone17:43
*** anteaya has quit IRC17:45
*** emagana has quit IRC17:48
*** jistr has joined #openstack-keystone17:49
*** gokrokve has joined #openstack-keystone17:53
*** arunkant_ has joined #openstack-keystone17:56
*** gokrokve_ has quit IRC17:57
richmdtroyer: ping - can the openstackclient --insecure or --verify flag be passed as an environment variable e.g. OS_INSECURE=true ?17:57
*** gokrokve has quit IRC17:59
*** rushiagr is now known as rushiagr_away18:00
*** gokrokve has joined #openstack-keystone18:03
*** mattfarina has quit IRC18:04
*** emagana has joined #openstack-keystone18:05
*** ericksonsantos has quit IRC18:05
*** tellesnobrega has quit IRC18:05
*** raildo has quit IRC18:06
*** samueldmq has quit IRC18:06
*** htruta has quit IRC18:06
*** e0ne has joined #openstack-keystone18:07
*** _cjones_ has quit IRC18:07
*** _cjones_ has joined #openstack-keystone18:09
*** gokrokve has quit IRC18:13
*** gokrokve has joined #openstack-keystone18:14
*** ankita_w_ has joined #openstack-keystone18:18
*** gokrokve has quit IRC18:19
*** anteaya has joined #openstack-keystone18:19
*** ctina___ has quit IRC18:20
*** ankita_wagh has quit IRC18:21
*** tellesnobrega has joined #openstack-keystone18:21
*** htruta has joined #openstack-keystone18:24
*** david-lyle_ has joined #openstack-keystone18:25
*** david-lyle has quit IRC18:25
*** david_lyle__ has joined #openstack-keystone18:25
*** raildo has joined #openstack-keystone18:26
*** david-lyle has joined #openstack-keystone18:28
*** samleon has quit IRC18:28
emaganakeystone core I fellow from Neutron core asking for some feedback on this one:  https://review.openstack.org/18024718:28
*** david-lyle_ has quit IRC18:29
emagana... arrgghhhh that went bad.. I mean to Keystone cores, a request from a fellow neutron core.. bla bla bla....18:29
emagana:-)18:29
*** samleon has joined #openstack-keystone18:29
*** ericksonfgds has joined #openstack-keystone18:31
*** david_lyle__ has quit IRC18:31
dtroyerrichm: no, those are probably the only ones that can't be passed in env vars18:33
mtreinishmorganfainberg: just fyi for http://libertydesignsummit.sched.org/event/8f871516b7d1cf8bf342ada310d91180#.VUuvmPZH0-U there's overlap with a qa work session18:33
mtreinishI noticed you cross-tagged qa for it18:33
dtroyerthey are recognized in clouds.yaml though18:33
*** david-lyle has quit IRC18:34
*** jsavak has joined #openstack-keystone18:35
*** joesavak has quit IRC18:39
*** joesavak has joined #openstack-keystone18:39
morganfainbergmtreinish: yep18:39
morganfainbergmtreinish: i know18:39
morganfainbergmtreinish: we'd have overlap in most cases.18:39
morganfainbergmtreinish: I figure we might wander over and occupy some of your session :P18:40
morganfainberg>.>18:40
*** jsavak has quit IRC18:41
*** tellesnobrega has quit IRC18:41
*** jsavak has joined #openstack-keystone18:41
*** raildo has quit IRC18:41
*** ericksonfgds has quit IRC18:42
*** htruta has quit IRC18:42
*** joesavak has quit IRC18:45
richmdtroyer: ok - thanks18:47
*** david-lyle has joined #openstack-keystone18:47
*** jistr has quit IRC18:51
dstanekemagana: looks like that would be a good idea. i'll do a deeper review in a few18:51
emaganadstanek: Thanks! I do appreciate it18:51
*** rm_work|away is now known as rm_work18:52
*** emagana has quit IRC18:53
*** david-lyle_ has joined #openstack-keystone18:53
*** emagana has joined #openstack-keystone18:55
*** emagana has quit IRC18:55
*** packet has quit IRC18:56
*** david-lyle has quit IRC18:56
*** david-lyle_ is now known as david-lyle18:57
*** packet has joined #openstack-keystone18:57
*** emagana has joined #openstack-keystone18:59
*** samueldmq has joined #openstack-keystone18:59
mtreinishmorganfainberg: heh, ok18:59
*** joesavak has joined #openstack-keystone19:02
*** jsavak has quit IRC19:03
*** stevemar has joined #openstack-keystone19:03
*** ChanServ sets mode: +v stevemar19:03
*** ankita_w_ has quit IRC19:05
*** ankita_wagh has joined #openstack-keystone19:08
*** tellesnobrega has joined #openstack-keystone19:20
*** _cjones_ has quit IRC19:21
*** raildo has joined #openstack-keystone19:27
*** Vitalii has joined #openstack-keystone19:33
*** blewis` has quit IRC19:40
*** david-lyle has quit IRC19:43
VitaliiHi. I was wondering is there a way to specify different expiration time for tokens generated by keystone?19:43
ayoungVitalii, different how:?19:46
stevemarVitalii, the config file should have a token expiration time option19:46
*** blewis has joined #openstack-keystone19:47
*** blewis` has joined #openstack-keystone19:49
VitaliiI mean different on domain/project level19:50
*** gokrokve has joined #openstack-keystone19:51
*** blewis has quit IRC19:51
Vitaliilet's say I would like to get tokens generated for project A to be valid for one hour, but ones for project B to be valid for one day19:51
VitaliiThere is a possibility to specify domain-specific configuration. Could I put [token] specific configuration there?19:55
*** gokrokve has quit IRC19:55
*** csd has quit IRC19:56
*** csd has joined #openstack-keystone19:57
stevemarVitalii, nope, that won't work19:58
stevemarthe functionality does not exist19:59
Vitaliistevemar, thanks19:59
ayoungVitalii, that is a cool suggestion, why do you want it?20:00
*** _cjones_ has joined #openstack-keystone20:03
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: List projects filtering by is_domain flag  https://review.openstack.org/15839820:05
*** ankita_w_ has joined #openstack-keystone20:06
*** ankita_wagh has quit IRC20:07
*** bknudson has joined #openstack-keystone20:09
*** ChanServ sets mode: +v bknudson20:09
Vitaliiayoung, we are developing a tool that would download/upload some data from openstack. We wanted some mechanism to retry a failed operation in case of failure without a necessity re-authenticate/authorize the user.20:12
ayoungVitalii, would trusts work for you instead?20:12
Vitaliiayoung, I think it would work. Thanks for the hint!20:14
ayoungVitalii, trusts were developed for just these kinds of use cases20:15
ayoungstevemar, since you went and wrote Oauth, I think you should be responsible for merging trusts and oauth20:15
morganfainbergdstanek, dolphm, stevemar, topol, ayoung, nkinder, bknudson, lhcheng, marekd, jamielennox|away, https://review.openstack.org/#/c/181137/ <-- defcore designated sections information for Keystone20:15
ayoungdecore hardcore!20:15
stevemarayoung, nooooo20:15
ayoungstevemar, yesssssss20:16
ayoungstevemar, first we make consumers a domain....20:16
morganfainbergayoung: then re rename domains to tenants and call projects domains then we renamed everything to realms, and convert our APIs to use ftp instead of HTTP20:17
ayoungmorganfainberg, I just meant storage20:18
ayoungconsumers are ephemeral users20:18
ayoungso put them in their own domain, and drop the oauth specific tables20:18
morganfainbergayoung: and I'm just spouting nonsense :)20:18
ayoungmorganfainberg, and I am not...the hands on the other foot!20:18
morganfainbergayoung: where did you find a glove for that foot-hand?20:19
morganfainbergbknudson: fixed the v2/v3 typo20:19
ayoungmorganfainberg, we can enforce policy on the domain field of the project, even if we get a V2 token, right?20:19
*** pothole is now known as ptoohill20:19
samueldmqmorganfainberg, what is that defcore change ? I mean, what is that used for ?20:20
morganfainbergsamueldmq: what APIs are required when deploying OpenStack to get certified20:20
*** _cjones_ has quit IRC20:21
samueldmqmorganfainberg, certified for what ? who certifies ? any docs on this ? (sorry if I am asking basic things ) ;)20:21
ayoungmorganfainberg, defcore change fails pep8.  Lines too long.  Can't read, even in unified..  gah20:22
ayoungwhy does it only use half the page in diff....20:22
morganfainbergsamueldmq: foundation is certifying20:22
morganfainbergsamueldmq: it's an interoperable certification20:22
samueldmqmorganfainberg, hmm, nice20:24
ayoungevey single policy rule in keystone has is_admin:1  in it ... maybe we should just put that override outside the policy enforcement20:24
ayoungsamueldmq, check me on this...20:25
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/common/controller.py#n169   and20:25
*** _cjones_ has joined #openstack-keystone20:25
*** _cjones_ has quit IRC20:25
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/common/controller.py#n10320:25
*** drjones has joined #openstack-keystone20:25
ayoungwe don't need is_admin in the policy check for keystone, becuase if is_admin, skip policy check...right?20:26
*** gokrokve has joined #openstack-keystone20:26
dolphmfor arbitrary values of "is_admin"20:27
*** gokrokve has quit IRC20:28
*** gokrokve has joined #openstack-keystone20:28
dolphmoh, that's not from policy20:28
dolphmthat's the admin token middleware20:28
stevemardolphm, i also had to look that up20:29
samueldmqayoung, if is_admin means no retriction ... yes we can skip, although it should always be configured via policy20:30
ayoungsamueldmq, nah, it means SERVICE_TOKEN20:30
samueldmqayoung, but in that case, I think is_admin always mean no restriction20:30
*** emagana has quit IRC20:31
samueldmqayoung, ah k makes sense, so services can do whatever the need, makes sense then20:31
ayoungis_admin:1 is set somehwere in the wsgi code above here...I can find in a sec20:31
*** emagana has joined #openstack-keystone20:32
*** toddnni has quit IRC20:33
samueldmqmorganfainberg, I submitted a couple of nit comments on your defcore patch20:34
samueldmqmorganfainberg, they're in patchset 2, since you just submitted a new patchset :/20:35
*** zzzeek has quit IRC20:35
morganfainbergthe backends cover all backends20:35
morganfainbergand we have memcache20:35
*** ericksonfgds has joined #openstack-keystone20:35
morganfainbergfor token20:35
*** zzzeek has joined #openstack-keystone20:35
*** BjoernT has quit IRC20:37
*** stevemar has quit IRC20:42
*** toddnni has joined #openstack-keystone20:43
*** pnavarro has joined #openstack-keystone20:44
*** e0ne has quit IRC20:51
*** Vitalii has left #openstack-keystone20:52
*** browne has quit IRC20:58
*** ankita_wagh has joined #openstack-keystone21:02
*** ankita_w_ has quit IRC21:06
marekdmorganfainberg:  thanks (re:defcore review)21:06
*** topol has quit IRC21:08
*** EmilienM is now known as EmilienM|afk21:16
openstackgerritMerged openstack/keystoneauth: Remove unused plugins from entrypoints  https://review.openstack.org/18096021:18
*** pnavarro has quit IRC21:18
*** lmtaylor has left #openstack-keystone21:18
*** packet has quit IRC21:23
openstackgerritMerged openstack/pycadf: drop audit middleware  https://review.openstack.org/17696921:26
*** ankita_w_ has joined #openstack-keystone21:36
*** ankita_wagh has quit IRC21:39
bigjoolsfolks, I have things set up for federation with SAML and when the IdP redirects back to keystone, it hangs for 2 minutes before saying it couldn't auth. Can anyone give pointers please?21:51
ayoungbigjools, look at the access log on the keystoen server, make sure the redirect gets there21:54
ayoungbigjools, then turn on debug in the keystone log21:54
ayoungbigjools, question is where is it hanging.  Using something like SAML Tracer for the browser is useful, too21:55
ayoungbigjools, you can also look in the token backend database to see if the token got allocated.21:55
bigjoolsayoung: the callback all looks good from SAML, I see keystone debug processing the user21:56
bigjoolslet me check the token21:56
ayoungbigjools, what needs to happen is the Keystone server  creates a page to post the token back to horizon.  DO you see that post happening?  You can tell from the Horizon logs21:56
*** ankita_wagh has joined #openstack-keystone21:56
*** david-lyle has joined #openstack-keystone21:56
ayoungbigjools, my guess is that the post is what is hanging.21:56
bigjoolsyeah exactly21:56
bigjoolsthen it redirects back to login page21:57
ayoungbigjools, how did you install Horiozn?21:57
bigjoolsdevstack21:57
bigjoolsjust trying to get a demo set up21:57
ayoungbigjools, so it is the post that is failing?  Is it going to the right url?21:58
bigjoolsit goes to the websso url21:58
bigjoolsthen hangs21:58
ayoungbigjools, my set up is a little different, in the I started with packstack.  I needed a WEBROOT value set in the local settings21:58
ayoungI don;t think devstack needs that21:58
bigjoolsI have it working with Kerberos with the same setup21:58
bigjoolsswitching to SAML gives this problem21:58
*** ankita_w_ has quit IRC21:59
ayoungWEBROOT = '/dashboard/'21:59
*** chlong has quit IRC21:59
bigjoolsI'm kinda new to Openstack so not sure what everything is yet21:59
ayoungbigjools, Kerberos is a different system, right?  You are not trying to mix the two on one are you?21:59
bigjoolsI have separate providers for them22:00
ayoungand they are on separate servers, right.22:00
bigjoolsthe IdP? yes22:00
ayoungno, I mean the Horizon set with Kerberos is a different server than you are trying to get SAML working on22:00
ayoungit sounds like a dumb question, but I need to ask...22:01
bigjoolsno, it's all the same22:01
*** gokrokve has quit IRC22:01
*** gokrokve has joined #openstack-keystone22:01
bigjoolsI just set up WEBSSO_CHOICES with the extra stuff22:01
ayoungbigjools, Kerberos using S4U2Proxy?22:01
bigjoolsdon't know what that is so I guess not :)22:01
ayoungbigjools, what do you mean by "I have it working with Kerberos with the same setup" then?22:02
bigjoolsI have Apache with the appropriate modules sat in front of it22:02
bigjoolsso you get the redirect through the difference URLs for auth22:03
bigjoolsdifferent*22:03
ayoungbigjools, is Kerberos protecting Horizon, or just your IdP?22:03
bigjoolsboth22:03
ayoungGAh22:03
ayoungwhy?22:03
bigjoolswell - both horizon and keystone I mean22:03
ayoungyou should not have kerberos in front of Horizon.  I suspect that is why things are hangin22:04
bigjoolsI am following the directions on docs.openstack.org22:04
ayoungthey lie22:04
bigjoolsheh22:04
ayoungyou are mixing apples and kangaroos22:04
bigjoolsI found a few bad things22:04
ayoungthose were my fault22:04
bigjoolsyour blog did get me going with Kerberos though :)22:05
ayoungdon't even know what you found, but yopui can probably blame me22:05
ayounguh uh22:05
ayoungswell?22:05
bigjoolsgot me going - I'm using Ubuntu so lots of different stuff22:05
ayoungOK...so...for Kerberos, I would22:05
bigjoolsI blogged my own setup22:05
ayoungyou are not going to make this easy for me, are you?22:05
ayounglink?22:06
bigjoolsI have two Location blocks in Apache's vhost for the websso part and the keystone part22:06
bigjoolshttps://bigjools.wordpress.com/2015/04/27/federated-openstack-logins-using-kerberos/22:06
ayoungOK...so you don't want to mix kerberos and SAML.  You want to do them side by side, but not the same URL22:06
ayoungI think the SSSD approach will work on latest Ubuntus...that is probably what you want for local kerberos22:06
*** gokrokve has quit IRC22:07
*** emagana has quit IRC22:07
ayoungand for SAML  you put it  parallel under OS-FEDERATION22:07
bigjoolswhen you say same URL, I'm not sure what you mean22:07
*** gokrokve has joined #openstack-keystone22:07
ayounghttp://adam.younglogic.com/2015/04/horizon-websso-sssd/22:07
ayoungbigjools, OK,  so under keystone, it is....(one sec)22:08
bigjoolsthere's no sssd on ubuntu I think22:08
bigjoolsat least not on 12.04 which is what I need to use22:08
ayoungcurl   --negotiate -u:   $HOSTNAME:5000/v3/OS-FEDERATION/identity_providers/sssd/protocols/kerberos/auth22:08
ayoungbigjools, pretty sure there is22:08
ayoungwe've been making sure it is out for a while...22:09
bigjoolsI've got this22:09
bigjools    <Location "/v3/OS-FEDERATION/identity_providers/saml/protocols/saml2/auth">22:09
bigjoolsmy idp is just called saml22:09
ayoungright so you don't want kerberos protecting that22:09
ayoungonly SAML22:09
bigjoolsand this:     <Location ~ "/v3/auth/OS-FEDERATION/websso/saml2">22:09
ayounglooks right22:09
bigjoolsit isn't protecting that22:09
bigjoolsI have this too: <Location ~ "kerberos" >22:10
bigjoolsso shouldn't clash22:10
ayoungso Kerberos is on something like htosname:4443/kerberos/v3/auth  ?22:10
ayoungtoastname22:10
bigjoolsI presume so22:11
ayoungoy vey es mir22:11
bigjoolsat least I can see the two separate URLs working OK when I use it22:11
bigjoolsactually, not sure what you mean22:11
ayoungI think you are OK at that level...let's ignore SSSD for now22:12
ayoungbigjools, figure out the SAML part of it.  Are you using shibboleth or mellon for the apache module?22:12
bigjoolsshib22:12
ayoungnkinder, ^^ this is interesting,  you might like to lurk22:12
bigjoolsI am using testshib22:12
bigjoolsfor the idp22:12
ayoungbigjools, ok,  I've not tried shib yet...but it should work, I think22:13
bigjoolsI was advised to use it by marekd22:13
bigjoolshe said it worked for him :)22:13
ayoungbigjools, if nothing else it gets me out of the hot seat....22:13
bigjoolsthe last thing I see in keystone's log is:22:13
bigjoolsDEBUG keystone.contrib.federation.utils [-] mapped_properties: .....22:13
ayoungbigjools, OK,  so you can verify that it is the post of the token to Horizon that is failing?22:13
bigjoolsyes22:14
bigjoolslet me fire it up again, I just had to reboot a machine22:14
ayoungbigjools, ok...so we are beyond SAML at this point. DO you see the post coming in the apache access log?22:14
bigjoolsthe last thing is a GET22:15
*** browne has joined #openstack-keystone22:15
bigjoolsGET /v3/auth/OS-FEDERATION/websso/saml2?origin=...22:16
bigjoolswith the user set22:16
ayoungthat is the keystone side of things...is the horizon log separate?  I don't have a devstacked one handy22:17
*** nkinder has quit IRC22:18
bigjoolsyeah separate22:18
bigjoolsPOST /auth/login/ is the last thing22:19
bigjoolsoh damn I broke my firewall22:19
ayoungbigjools, ok,  so need to see if the Horizon server receives that. Also, I've had luck with browser plugins for this kind of thing, and I recommend either firebug or SAML tracer22:19
ayoungACHA!22:19
bigjoolsthat's nothing to do with this problem :)22:19
bigjoolsit means I can't recreate anything until I get my ports forwarded again22:20
bigjoolsso I am tracing all this in chrome's developer console, it definitely POSTs22:20
bigjoolsalthough you got me wondering if my firewall is causing this all now22:21
*** gokrokve has quit IRC22:21
*** gordc has quit IRC22:24
bigjoolsayoung: so I do see that POST to horizon, it just ignores it22:33
bigjoolsnow if only I could remember what I did to get port forwarding working in my container22:34
*** amerine has joined #openstack-keystone22:35
*** Raildo_ has joined #openstack-keystone22:36
ayoungbigjools, ytou see the token getting posted to horizon, but horizon ignores it?22:36
bigjoolsayoung: it does POST /auth/websso/22:37
bigjoolsthen 2 minutes later a GET, when it times out22:37
ayoungbigjools, should that be /dashboard/auth/websso ?  It is for me22:37
bigjoolsI don't have the dashboard prefix anywhere22:37
*** joesavak has quit IRC22:38
ayoungbigjools, I wonder if you havean old version of Django openstack auth22:38
bigjoolshorizon seems to time out, that post returns 30222:38
*** david-lyle has quit IRC22:38
ayoungit shouldn't hang, though22:38
bigjoolsback to the login page22:39
bigjoolslet me check the version22:39
bigjoolsit's on stable/kilo22:39
bigjoolseverything should be on stable/kilo22:40
ayoungbigjools, django openstack auth is installed via pip, not git in devstack.  I wonder if the most recent code is in pip.22:40
* bigjools checks22:40
ayoungbigjools, one thing you could try is doing a git checkout of doa, then a sudo python setup.py develop22:41
bigjoolsdjango-openstack-auth (1.3.0)22:41
ayoungthat should be good22:41
bigjoolsI *thought* that was what stack.sh does22:41
bigjoolsok let's do that22:42
ayoungbigjools, stack.sh does that for services, but not librarires. I don;'t think it does for DOA, but you can check...it would be in /opt/stack/django-openstack-auth22:42
*** rm_work is now known as rm_work|away22:42
ayoung1.3.0 is current22:42
ayoungit is missing the WEBROOT fix, but you should not need that22:42
bigjoolsummm .... Processing dependencies for django-openstack-auth==1.2.0.post122:43
bigjoolsgit branch says stable/kilo22:43
ayoungbigjools, I'd make sure you have the right DOA.22:44
lhchengbigjools: did you configure horizon against keystone v3 endpoint?22:44
bigjoolsyes22:45
*** topol has joined #openstack-keystone22:46
*** ChanServ sets mode: +v topol22:46
bigjoolsayoung: do I need to move to 1.3.0 even though kilo is at 1.2.0?22:47
ayoungbigjools, ask in #openstack-horizon. david lyle would know22:49
bigjoolsack, thanks22:50
ayoungbigjools, he's not around...but I suspect so22:50
ayounglet me look at what tag 1.2 is in git22:50
ayounghttp://git.openstack.org/cgit/openstack/django_openstack_auth/log/22:50
ayoungI don't see anything major between 1.2.0 and 1.3.0 there22:51
bigjoolsme neither22:51
ayoungwebsso redirect test is a ways back, so websso  should be there...ok,  let's assume that the library is good22:52
bigjoolsgiven that this all works with kerberos for me, I would have been surprised if it was the wrong version22:52
ayoungbigjools, do you have websso enabled?22:53
bigjoolsyes22:53
bigjoolsnot sure I'd get very far from Horizon otherwise :)22:53
ayoungbigjools, at this point, I'd probably bust out rpdb and put a breack point around here:  http://git.openstack.org/cgit/openstack/django_openstack_auth/tree/openstack_auth/views.py?id=f5b2827a4de3375ff0c39dbe2884feb5cac0c740#n13422:54
ayoungpip install rpdb.22:54
bigjoolsgood call22:55
ayoungthen edit the file and import rpdb; rpdb.set_trace()22:55
ayoungtrigger the hang, then22:55
ayoungtelnet localhost 444422:55
ayoungmake sure you have telnet installed first.  I hate when I forget that22:55
bigjoolsyeah it's not in my container22:55
bigjoolsI am not sure what I did yesterday to get ports forwarded into lxc but I can't get it working today, damn.22:56
bigjoolsthis is blocking me, I might be a little while working this out, sorry :(22:56
bigjoolsthanks for the help so far though!22:56
ayoungbigjools, so,  the last thing you saw on Keystone was the websso redirect back to horizon.  Here is what should happen next22:57
ayoungyou hit the code I linked above ,which calls into22:57
ayoungauthenticate here http://git.openstack.org/cgit/openstack/django_openstack_auth/tree/openstack_auth/backend.py#n8322:57
ayoungit should see that it has a token, and use the approparet KC auth plugin, and try to list projects for the user22:58
ayoungit looks like it never starts making calls back to keystone, though.22:58
bigjoolsit's getting as least as far as this:22:59
bigjoolsDEBUG keystone.contrib.federation.utils [-] mapped_properties: {'group_ids': [u'2b684c680c8f48e590125c29c6e4c76e'], 'user': {u'domain': {'id': 'Federated'}, 'type': 'ephemeral', u'name': u'myself@testshib.org'}, 'group_names': []} process /opt/stack/keystone/keystone/contrib/federation/utils.py:47622:59
ayoungthat is federation code, I think.  But maybe that is trying to convert the federated token to a scoped token22:59
bigjoolsso I think it is calling keystone22:59
ayoungyou said you saw a post to /v3/auth/tokens?22:59
bigjoolsyes23:00
ayoungbut you don't see the call to list projects?23:00
bigjoolsthen GET /v3/OS-FEDERATION/mappings23:00
ayoungruh?23:01
bigjoolsthen it goes to GET /v3/auth/OS-FEDERATION/websso/saml2?....23:01
ayoungthat is all before.  THat is  getting the Federation unscoped token/23:01
ayoungnot sure why mappings is called23:01
bigjoolsthat ^^ GET is the last thing in the log23:02
ayoungyeah, that is the response going to Horizon.  The next call is hanging in Horizon for some reason. I'd want rpdb there23:03
ayoungbigjools, I have to go be dad here for a while23:03
bigjoolsno worries23:03
bigjoolssame problems here :)23:03
bigjoolsthanks so far - I'll get my ports fixed and do that rpdb23:03
ayounggood luck23:10
*** arunkant_ has quit IRC23:18
*** chlong has joined #openstack-keystone23:24
*** darrenc is now known as darrenc_afk23:24
*** markvoelker has quit IRC23:26
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/18120523:31
openstackgerritOpenStack Proposal Bot proposed openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/17990423:31
*** nkinder has joined #openstack-keystone23:34
*** samueldmq has quit IRC23:36
*** samueldmq has joined #openstack-keystone23:36
openstackgerritOpenStack Proposal Bot proposed openstack/pycadf: Updated from global requirements  https://review.openstack.org/17842523:36
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/17842623:37
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient-kerberos: Updated from global requirements  https://review.openstack.org/18123523:37
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient-saml2: Updated from global requirements  https://review.openstack.org/16158823:37
*** lhcheng has quit IRC23:40
*** topol has quit IRC23:43
*** darrenc_afk is now known as darrenc23:47
*** dims_ has joined #openstack-keystone23:50
*** dims has quit IRC23:52
*** markvoelker has joined #openstack-keystone23:56
*** ankita_wagh has quit IRC23:57
*** markvoelker has quit IRC23:57
*** markvoelker has joined #openstack-keystone23:57
*** ankita_wagh has joined #openstack-keystone23:57

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!