Monday, 2015-06-08

*** markvoelker has joined #openstack-keystone00:25
*** markvoelker has quit IRC00:30
*** lhcheng has joined #openstack-keystone00:42
*** ChanServ sets mode: +v lhcheng00:42
*** mitz has joined #openstack-keystone00:47
*** lhcheng has quit IRC00:57
*** dims__ has quit IRC01:06
*** jamielennox|away is now known as jamielennox01:07
*** aix has quit IRC01:26
*** davechen_afk is now known as davechen01:44
*** dims_ has joined #openstack-keystone01:58
*** Kennan2 has joined #openstack-keystone02:03
*** dims_ has quit IRC02:03
*** Kennan has quit IRC02:04
*** markvoelker has joined #openstack-keystone02:14
*** markvoelker has quit IRC02:19
*** rlt has quit IRC02:30
*** dims_ has joined #openstack-keystone03:03
*** dims_ has quit IRC03:09
*** liusheng has joined #openstack-keystone03:13
*** topol has joined #openstack-keystone03:25
*** ChanServ sets mode: +v topol03:25
*** tsufiev has quit IRC03:27
*** grantbow has quit IRC03:27
*** josecastroleon has quit IRC03:27
*** bradjones|away has quit IRC03:27
*** mestery_afk has quit IRC03:27
*** Swanson has quit IRC03:27
*** josecastroleon has joined #openstack-keystone03:28
*** Swanson has joined #openstack-keystone03:28
*** bradjones has joined #openstack-keystone03:28
*** bradjones has quit IRC03:28
*** bradjones has joined #openstack-keystone03:28
*** mestery has joined #openstack-keystone03:28
*** tsufiev has joined #openstack-keystone03:28
*** topol has quit IRC03:41
*** naggappan has joined #openstack-keystone04:01
naggappanhi is there any flag in localrc file to turn on https during the devstack deployment ?04:02
morganfainbergnaggappan: I do not think devstack does ca management for SSL termination.04:12
naggappanmorganfinberg: So the only way is to install devstack in normal way, then enable https alone with ca certificates and restart the services ?04:15
*** mabrams has joined #openstack-keystone04:35
*** yottatsa has joined #openstack-keystone05:10
*** belmoreira has joined #openstack-keystone05:20
*** naggappan has quit IRC05:26
bretonmorning05:31
*** iamjarvo has quit IRC05:34
*** lsmola has joined #openstack-keystone05:36
*** fangzhou has quit IRC05:36
*** lhcheng has joined #openstack-keystone05:38
*** ChanServ sets mode: +v lhcheng05:38
*** yottatsa has quit IRC05:40
*** yottatsa has joined #openstack-keystone05:41
*** yottatsa has quit IRC05:46
*** yottatsa has joined #openstack-keystone05:46
*** Kennan2 has quit IRC05:47
*** Kennan has joined #openstack-keystone05:48
*** markvoelker has joined #openstack-keystone05:52
*** markvoelker has quit IRC05:56
*** geoffarnold has joined #openstack-keystone05:58
*** belmoreira has quit IRC06:06
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/18627906:08
*** sks has joined #openstack-keystone06:10
*** josecastroleon has quit IRC06:19
marekdbreton: morning.06:20
*** lhcheng has quit IRC06:28
*** tobe has joined #openstack-keystone06:45
*** mordred has quit IRC06:46
*** andreaf has joined #openstack-keystone06:48
*** abhishekk has joined #openstack-keystone06:49
*** lufix has joined #openstack-keystone06:50
*** ajayaa has joined #openstack-keystone06:51
*** andreaf has quit IRC06:53
*** andreaf has joined #openstack-keystone06:54
morganfainbergmarekd: morning06:58
morganfainbergbreton: morning06:58
abhishekkmorganfainberg: hi, do you have some time?07:02
morganfainbergabhishekk: i have a little time07:02
morganfainbergabhishekk: what can i do for you?07:03
abhishekkneed to discuss with you about service-token07:03
abhishekkyou have given idea about using service-token for passing request-id (ref: https://review.openstack.org/#/c/156508/)07:03
abhishekkmorganfainberg: as of now no client support is there for passing service-token, am I right?07:04
morganfainbergyeah i've seen that proposal07:05
morganfainbergabhishekk: i am fairly certain that is correct07:05
abhishekkmorganfainberg: is there any work going on about this?07:05
morganfainbergabhishekk: i think jamielennox has been looking at that07:07
morganfainbergbut no work yet has been started on it07:07
abhishekkmorganfainberg: thanks for the update07:08
morganfainbergabhishekk: sure thing!07:08
abhishekkmorganfainberg: I am planning to working on it for cinder07:08
morganfainbergnice07:08
morganfainbergso we're looking at baking it into the session object07:08
morganfainbergso you should get it for free07:08
jamielennoxabhishekk: there is an auth_token patch, but as you can't serialize the plugin that implements the call there really isn't much use at the moment07:09
jamielennoxhttps://review.openstack.org/#/c/141614/07:09
jamielennoxbecause the token will be lost as soon as you RPC from the api to the worker07:09
jamielennoxand no-one currently uses the plugin anyway07:09
abhishekkjamielennox: right07:09
abhishekkjamielennox, morganfainberg: thank you for the update07:12
openstackgerritMarek Denis proposed openstack/keystone: Mapping Engine CLI  https://review.openstack.org/18830207:14
*** geoffarn_ has joined #openstack-keystone07:14
*** jaosorior has joined #openstack-keystone07:15
*** henrynash has joined #openstack-keystone07:20
*** ChanServ sets mode: +v henrynash07:20
*** yottatsa has quit IRC07:31
openstackgerritDave Chen proposed openstack/keystone-specs: Use oslo-versioned-objects to deal with upgrades  https://review.openstack.org/16719507:37
*** markvoelker has joined #openstack-keystone07:40
*** markvoelker has quit IRC07:45
*** rlt has joined #openstack-keystone07:50
*** pnavarro_ has joined #openstack-keystone07:51
*** jistr has joined #openstack-keystone07:52
*** belmoreira has joined #openstack-keystone08:00
*** fhubik has joined #openstack-keystone08:06
*** fhubik is now known as fhubik_afk08:06
*** afazekas_mtg has joined #openstack-keystone08:06
*** dguerri` is now known as dguerri08:11
*** lhcheng has joined #openstack-keystone08:16
*** ChanServ sets mode: +v lhcheng08:16
*** josecastroleon has joined #openstack-keystone08:18
*** yottatsa has joined #openstack-keystone08:20
*** lhcheng has quit IRC08:21
*** fhubik_afk is now known as fhubik08:23
*** dims_ has joined #openstack-keystone08:28
openstackgerritMorgan Fainberg proposed openstack/keystonemiddleware: Ensure cache keys are a known/fixed length  https://review.openstack.org/18697108:32
*** dims_ has quit IRC08:33
*** liusheng has quit IRC08:36
*** liusheng has joined #openstack-keystone08:36
openstackgerritMarek Denis proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858108:39
fhubikHey, is anyone using keystone against Active Directory with "user db" write access? Is this even possible for now?08:40
*** aix has joined #openstack-keystone08:41
*** e0ne has joined #openstack-keystone08:56
*** ajayaa has quit IRC09:00
*** yottatsa has quit IRC09:01
openstackgerritMerged openstack/keystone: Remove unnecessary dependencies from KerberosDomain  https://review.openstack.org/18913909:02
*** e0ne is now known as e0ne_09:10
*** yogeshwars1 has left #openstack-keystone09:12
*** geoffarn_ has quit IRC09:14
*** geoffarnold has quit IRC09:15
morganfainbergfhubik: i would be very wary of letting keystone write to Active Directory09:16
morganfainbergfhubik: it is not impossible, but Active Directory might get cranky about the objects created in the tree09:16
*** ajayaa has joined #openstack-keystone09:16
morganfainbergfhubik: there are better tools for managing users in AD than keystone.09:16
*** e0ne_ has quit IRC09:20
fhubikmorganfainberg: For me, it is necessary. I am triyng to run Tempest test-suites against AD and this needs write access to user DB.09:25
morganfainbergfhubik: ah.09:26
morganfainbergso, you may run into bugs09:26
morganfainbergbecause keystone may not create the correct object types in LDAP that AD needs09:27
fhubikmorganfainberg: But no success there, either AD is prohibiting adding "correct-way" user with "unwilling_to_perform" or I can add "crippled" user thru keystone though, but I can not authenticate agains such user then (is disabled) :/09:28
fhubikmorganfainberg: exactly, but I am wondering, is anyone using this usecase? I know about Cern only...09:28
openstackgerritMarek Denis proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858109:29
fhubikmorganfainberg: and thas is even maybe, of course ;)09:29
*** markvoelker has joined #openstack-keystone09:29
*** e0ne has joined #openstack-keystone09:29
*** yottatsa has joined #openstack-keystone09:34
*** markvoelker has quit IRC09:34
*** fhubik is now known as fhubik_afk09:34
openstackgerritMarek Denis proposed openstack/keystoneauth: Keystone2KeystoneAuthPlugin scoping capabilities  https://review.openstack.org/18888109:34
*** fhubik_afk is now known as fhubik09:39
*** yottatsa has quit IRC09:54
*** fhubik is now known as fhubik_afk10:01
*** boris-42 has joined #openstack-keystone10:04
*** lhcheng has joined #openstack-keystone10:05
*** ChanServ sets mode: +v lhcheng10:05
*** jsheeren has joined #openstack-keystone10:07
*** openstackgerrit has quit IRC10:09
*** dims_ has joined #openstack-keystone10:09
*** openstackgerrit has joined #openstack-keystone10:09
*** lhcheng has quit IRC10:10
*** jsheeren has quit IRC10:11
morganfainbergfhubik_afk: you can ask marekd about it. But iirc mostly everyone just uses AD as read-only10:29
*** lhcheng has joined #openstack-keystone10:29
*** ChanServ sets mode: +v lhcheng10:29
*** lhcheng has quit IRC10:33
*** henrynash has quit IRC10:38
*** varya_ has joined #openstack-keystone10:39
openstackgerritDavanum Srinivas (dims) proposed openstack/keystonemiddleware: Remove install_venv_common and fix typo in memorycache  https://review.openstack.org/18911310:43
*** henrynash has joined #openstack-keystone10:43
*** ChanServ sets mode: +v henrynash10:43
*** henrynash has quit IRC10:44
*** ajayaa has quit IRC10:46
*** yottatsa has joined #openstack-keystone10:49
*** fhubik_afk is now known as fhubik10:53
fhubikmorganfainberg: ok, thanks10:54
*** samueldmq has joined #openstack-keystone10:54
samueldmqmorning10:55
samueldmqhope you all had a great weekend :)10:55
*** e0ne is now known as e0ne_10:56
morganfainbergsamueldmq: maaaaybe10:57
*** e0ne_ is now known as e0ne10:57
*** afazekas_mtg is now known as afazekas10:58
*** ajayaa has joined #openstack-keystone10:58
varya_Hi all. I have a question, as part of creating a new tenant can we perform some custom actions in nova or neutron. For example creating a default network for every tenant as soon as the tenant is created? Sorry if this is not the right forum to ask this question.10:59
*** merlin_ has quit IRC10:59
samueldmqmorganfainberg, hi :)11:01
samueldmqmorganfainberg, btw I found something on your patch 'Ensure cache keys are a known/fixed length'11:01
samueldmqmorganfainberg, you defined "long_string = long_string = 8 * uuid.uuid4().hex"11:02
samueldmqmorganfainberg, would you mind if I send a new patch set ?11:02
morganfainbergsamueldmq: oh hah. sure11:02
morganfainbergfeel free to11:02
morganfainbergsamueldmq: you are always welcome to upload fixes like that to my patches, you never need to ask my permission11:02
samueldmqmorganfainberg, cool, nice to know11:03
samueldmqmorganfainberg, I like to check, I think some people don't like :)11:03
samueldmqmorganfainberg, thanks11:03
*** yottatsa has quit IRC11:03
*** yottatsa has joined #openstack-keystone11:05
openstackgerritDavanum Srinivas (dims) proposed openstack/python-keystoneclient: Remove unnecessary install_venv_common module  https://review.openstack.org/18912311:12
*** varya_ has quit IRC11:12
*** ajayaa has quit IRC11:18
*** dguerri is now known as dguerri`11:19
*** rushiagr_away is now known as rushiagr11:22
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: Switch keystone over to oslo_log versionutils  https://review.openstack.org/18926711:23
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: Switch keystone over to oslo_log versionutils  https://review.openstack.org/18926711:25
*** tobe has quit IRC11:26
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: Remove unnecessary install_venv_common.py  https://review.openstack.org/18911111:26
*** markvoelker has joined #openstack-keystone11:30
*** markvoelker has quit IRC11:35
*** ajayaa has joined #openstack-keystone11:37
*** e0ne is now known as e0ne_11:38
*** e0ne_ is now known as e0ne11:39
*** henrynash has joined #openstack-keystone11:40
*** ChanServ sets mode: +v henrynash11:40
openstackgerritMarek Denis proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858111:44
samueldmqhenrynash, hi, good morning11:46
henrynashsamueldmq; hi11:46
samueldmqhenrynash, I will be working on the list role assignments patch again this week :)11:47
henrynashsamueldmq: YES!!!!!!!11:47
henrynashsamueldmq: let me know what I can do to help you get this in11:47
samueldmqhenrynash, I got a review from dstanek proposing to split i) passing the filters to driver and ii) moving the logic to manager11:47
samueldmqhenrynash, yes I will be splitting and will ping you11:48
henrynashsamueldmq: ok!!!11:48
samueldmqhenrynash, so you can take a look at ... it should be time to get that in11:48
samueldmqhenrynash, more than one complete cycle under review11:48
henrynashsamueldmq:yep11:48
samueldmqhenrynash, but we will get that merged soon :)11:49
openstackgerritMarek Denis proposed openstack/keystoneauth: Keystone2KeystoneAuthPlugin scoping capabilities  https://review.openstack.org/18888111:49
samueldmqhenrynash, have something to talk to you .. just pm'ed11:50
*** mflobo has left #openstack-keystone12:02
openstackgerritMarek Denis proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858112:07
*** ajayaa has quit IRC12:07
*** henrynash has quit IRC12:09
*** raildo has joined #openstack-keystone12:11
*** yottatsa has quit IRC12:11
*** yottatsa has joined #openstack-keystone12:13
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystonemiddleware: Ensure cache keys are a known/fixed length  https://review.openstack.org/18697112:15
*** henrynash has joined #openstack-keystone12:18
*** ChanServ sets mode: +v henrynash12:18
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Correct memcached parameters in TokenCache  https://review.openstack.org/17126412:24
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Remove custom header handling  https://review.openstack.org/18038512:28
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Create a simple base class from AuthProtocol  https://review.openstack.org/18081612:28
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Refactor request methods onto request object  https://review.openstack.org/18039412:28
*** pece has joined #openstack-keystone12:29
marekdmorganfainberg: you are now in the middle of the night or somewhere in Europe ?12:30
morganfainbergmarekd: i'm in budapest atm12:31
marekdmorganfainberg: that explains a lot :-)12:32
marekdmorganfainberg: some conference ?12:32
*** woodster_ has quit IRC12:32
morganfainbergmarekd: CEE Day12:33
morganfainbergmarekd: tomorrow i'm off to Berlin12:33
morganfainbergthen Tel Aviv12:33
marekdmorganfainberg: whoa12:33
marekdi think i've never been to Berlin12:34
morganfainberggoing to be there for ~3 days12:34
morganfainbergor more12:34
* morganfainberg would have ot check itinerary12:34
marekdhttp://openstackceeday.com/ -> hah, the guy on the stage looks like noggin14312:34
morganfainberghah12:34
morganfainbergmarekd: he's been here to talk before iirc12:35
marekdmorganfainberg: he talks a lot but hey, imho he does it really well (no biased because he is my boss)12:35
*** fhubik is now known as fhubik_afk12:35
morganfainberghahha12:35
marekdwell, he talks a lot i mean he gives a lot of talks :P12:36
marekd(still not biased :P)12:36
*** henrynash has quit IRC12:38
*** fhubik_afk is now known as fhubik12:39
*** dguerri` is now known as dguerri12:46
*** dsirrine has joined #openstack-keystone12:47
*** raildo has quit IRC12:50
*** gabriel-bezerra has quit IRC12:50
*** tellesnobrega has quit IRC12:50
*** rushiagr is now known as rushiagr_away12:50
*** iurygregory has quit IRC12:51
*** samueldmq has quit IRC12:51
*** nicodemos has quit IRC12:51
*** ericksonsantos has quit IRC12:51
*** noye has joined #openstack-keystone12:57
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Correct memcached parameters in TokenCache  https://review.openstack.org/17126412:58
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: a test for memcache_pool  https://review.openstack.org/18928412:58
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix inheritance of memcache client used in pool  https://review.openstack.org/18928512:58
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix usage of memcache_pool as contextmanager  https://review.openstack.org/18928612:58
*** sks has quit IRC12:59
bretonsorry13:03
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Correct memcached parameters in TokenCache  https://review.openstack.org/17126413:03
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: a test for memcache_pool  https://review.openstack.org/18928413:03
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix inheritance of memcache client used in pool  https://review.openstack.org/18928513:03
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix usage of memcache_pool as contextmanager  https://review.openstack.org/18928613:04
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix usage of memcache_pool as contextmanager  https://review.openstack.org/18928613:06
*** ericksonsantos has joined #openstack-keystone13:06
*** samueldmq has joined #openstack-keystone13:06
*** tellesnobrega has joined #openstack-keystone13:06
*** raildo has joined #openstack-keystone13:06
*** iurygregory has joined #openstack-keystone13:06
*** mflobo has joined #openstack-keystone13:06
*** nicodemos has joined #openstack-keystone13:06
*** gabriel-bezerra has joined #openstack-keystone13:08
*** radez_g0n3 is now known as radez13:09
*** dguerri is now known as dguerri`13:12
*** mflobo has left #openstack-keystone13:12
*** sks has joined #openstack-keystone13:12
*** mflobo has joined #openstack-keystone13:13
*** yottatsa has quit IRC13:19
*** markvoelker has joined #openstack-keystone13:20
*** jsavak has joined #openstack-keystone13:20
*** varya has joined #openstack-keystone13:23
*** dguerri` is now known as dguerri13:24
*** markvoelker has quit IRC13:25
*** abhishekk has quit IRC13:26
*** dsirrine has quit IRC13:27
*** dsirrine has joined #openstack-keystone13:29
openstackgerritMerged openstack/keystone: Remove deprecated external authentication plugins  https://review.openstack.org/12570113:29
*** ayoung has joined #openstack-keystone13:29
*** ChanServ sets mode: +v ayoung13:29
*** afazekas has quit IRC13:31
openstackgerritMarek Denis proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858113:31
openstackgerritAlexander Maretskiy proposed openstack/keystone: Add more Rally scenarios  https://review.openstack.org/18845713:33
openstackgerritMarek Denis proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858113:34
*** krotscheck has joined #openstack-keystone13:34
*** woodster_ has joined #openstack-keystone13:35
*** HT_sergio has quit IRC13:35
*** krotscheck has quit IRC13:38
*** krotscheck has joined #openstack-keystone13:39
*** krotscheck has quit IRC13:40
*** krotscheck has joined #openstack-keystone13:41
*** htruta has joined #openstack-keystone13:44
openstackgerritAlexander Maretskiy proposed openstack/keystone: Improvements for rally jobs files.  https://review.openstack.org/18847913:49
*** HT_sergio has joined #openstack-keystone13:54
*** e0ne is now known as e0ne_13:56
openstackgerritMarek Denis proposed openstack/keystoneauth: Keystone2KeystoneAuthPlugin scoping capabilities  https://review.openstack.org/18888113:57
*** HT_sergio has quit IRC13:58
*** rushiagr_away is now known as rushiagr13:58
*** e0ne_ has quit IRC14:07
*** e0ne has joined #openstack-keystone14:08
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix inheritance of memcache client used in pool  https://review.openstack.org/18928514:09
openstackgerritBoris Bobrov proposed openstack/keystonemiddleware: Fix usage of memcache_pool as contextmanager  https://review.openstack.org/18928614:09
*** fhubik is now known as fhubik_afk14:10
marekdrodrigods: dolphm: would you care reviewing https://review.openstack.org/#/c/188581 ?14:10
*** csoukup has joined #openstack-keystone14:11
*** sigmavirus24_awa is now known as sigmavirus2414:11
*** sks has quit IRC14:11
*** dvorak is now known as clayton14:13
*** fhubik_afk is now known as fhubik14:13
dstanekmorganfainberg: sound like an interesting time14:18
*** varya has quit IRC14:20
*** lastops has joined #openstack-keystone14:20
*** merlin_ has joined #openstack-keystone14:22
*** henrynash has joined #openstack-keystone14:28
*** ChanServ sets mode: +v henrynash14:28
openstackgerritMarek Denis proposed openstack/python-keystoneclient-saml2: Depend on python-keystoneauth  https://review.openstack.org/18685414:30
*** afazekas has joined #openstack-keystone14:36
*** jamielennox is now known as jamielennox|away14:38
*** davechen is now known as davechen_afk14:39
openstackgerritBoris Bobrov proposed openstack/keystoneauth: removed custom assertDictEqual  https://review.openstack.org/18932014:54
*** amakarov_away is now known as amakarov14:54
amakarovayoung, hi! If we merge trusts and assignments to delegations, can we change use case "create assignment for user in project with roles" to "superuser delegates roles on project to the user"?14:57
ayoungamakarov, sounds right14:57
amakarovayoung, I'm trying to figure out how hierarchical roles can fit here14:58
*** HT_sergio has joined #openstack-keystone15:00
*** nkinder has joined #openstack-keystone15:02
*** zzzeek has joined #openstack-keystone15:02
*** belmoreira has quit IRC15:06
*** markvoelker has joined #openstack-keystone15:08
*** markvoelker has quit IRC15:13
ayoungamakarov, role assignment and delegation are two names for the same thing15:14
ayoungI think that, maybe, we treat role-assignments as the special case15:14
ayoungbeing able to make a delegation "sticky" is a special power in itself15:15
* ayoung having flashbacks to the incompleteness theorem15:16
amakarovayoung, we can allow the superuser to create delegations, that has trustor == trustee15:17
ayoungamakarov, and how do we define "superuser"?15:17
amakarovayoung, the one who creates a delegation ))15:17
ayoungand...a trust is checked based on role assignments, so there needs to be an assignment first15:17
ayoungamakarov, so, lets use a real world analogue15:18
amakarovayoung, we have all-mighty admin without any explicit delegations15:19
ayoungA hiring manager accepts a new person into her organization.  She tells HR about the new engineer, and HR puts Jane into the position from the Open Req15:19
amakarovand he is the source of all delegations15:19
ayoungHR is the one making the permanent assignments,  cuz if the hiring manager quits or moves elsehere, the engineer still has their position15:20
amakarovayoung, in this case role is delegated by HR who also has it delegated by her employer15:21
amakarovayoung, oh, I see15:21
amakarovwe can squash delegations15:21
amakarovayoung, we can have delegation chain admin-HR-manager-employee15:23
*** rlt has quit IRC15:23
amakarovif the manager quits it turns to admin-HR-employee15:23
amakarovayoung, looks like spagetti :(15:24
ayoungamakarov, this is the problem with the term "Role" as it can mean a couple different thing.  There are explicitly, long term assignments, and there are short term organizations, and we need both15:24
ayounga user has a role in an organzation,  but a user also has a role in accomplishing a task15:25
amakarovayoung, I'd prefer action based access control...15:25
ayoungamakarov, so, the most genernic term is Attribute Based Access Control15:25
ayoungABAC, is, of course, a tautology15:25
ayoungif you are making any access decision,  you are making them based on attributes of something15:26
ayoungbut..I digress15:26
ayoungso, when a user goes to perform an action, we take into account many things.  For a paranoid organization, like, say, a hospital that needsd to be HIPAA compliant, y9ou might not even let people that are authorized perform certain operations if they are not sitting infront of a controlled termina.  Like, say, turn on the x-ray machine...15:28
amakarovayoung, aha, so we must consider not only the action requested, but also some necessary conditions?15:29
ayoungamakarov, well,  Possibly15:30
ayoungamakarov, Keystone does not do that now.  Its just an example of how Access Control evolves15:30
amakarovayoung, may be just follow some use-cases? Access control has it's purpose as anything else - is it described somewhere?15:32
ayoungamakarov, yes, many pleaces..I have a whole body of links from reading up on this.15:32
amakarovmaybe folmal user-stories or something?15:32
ayoungamakarov, but...lets focus in on the use cases already Identified15:33
rodrigodsmarekd, have some review requests too: https://review.openstack.org/#/c/188534/ :)15:33
amakarovayoung, well, I'd like to place them to the blueprint: can you please provide a link or two?15:34
*** aix has quit IRC15:36
*** gyee_ has joined #openstack-keystone15:36
ayoungamakarov  I will dig them up15:37
amakarovayoung, thank you, it will be much easier to make a spec for the specific use case!15:38
*** lufix has quit IRC15:42
*** esp has joined #openstack-keystone15:46
ayoungamakarov, you are working on a spec for unified delegation, right?15:48
*** pece has quit IRC15:48
amakarovayoung, yes15:48
ayoungamakarov, cool15:48
amakarovayoung, it is a blueprint yet :)15:48
ayoungamakarov, so, I don't want to get too academic about it.  THe location based stuff, is actually policy, not assignment15:48
ayoungamakarov, so, all this is about delegation,  which is just a subset of access control.  I think there are 3 facets we want to cover:15:49
*** _cjones_ has joined #openstack-keystone15:49
ayoung1. Long term assignements like we were discussing before15:49
*** afazekas has quit IRC15:49
ayoung2.  Short term delegations that are implicit or standard parts of defined workflows15:50
ayoung3.  User to user delegations which are somewhere in between15:50
ayoung1.  Is what Roles assignemnts do now, and they lack an audit trail, chain of responsibility, what ever you call it.15:50
ayoung3 is trusts15:51
ayoung2 we carry on the token right now (I give token to Nova, and have essentially granted all things to all parties), and that is the one I am most interested in fixing15:51
ayoungwe have had a couple incremental steps lately worth noting15:52
amakarovayoung, cool, I'll put it in the bp now15:53
ayoungan operator can now set up Keystone so that a user can explicitly reques an unscoped token.  Why?  SO that they can also limit token-for-token requests to   unscoped to scoped only15:53
ayoungthis feature needs to get into Horizon (DOA) so that Horizon holds on to the unscoped token (one per users web session) and uses that to get all the scoped tokens used later15:54
ayoungso  ... how does this realte, you may ask...15:54
ayoungit provides securituy, but it is going to break some work flows that assume a user token can be converted to any other user token15:55
ayoungand we need to provide better ways to do that15:55
ayoungso...15:55
*** Ephur has joined #openstack-keystone15:55
ayoungunified delegation acknowledges that whenever I get a scoped token, I am essentially creating a delegation15:55
ayoungit is the most ephemeral form15:55
ayoungand using it should minimize the side effects possible if someone misuses the token15:56
amakarovayoung, so to put is simple: we want to replace scoped tokens with delegations?15:57
ayoungamakarov, if you take things to the extreme, I think that is where we are headed15:58
ayoungamakarov, lets, instead, say I would like to make that a possibility15:58
amakarovayoung, understood15:58
*** varya has joined #openstack-keystone16:01
*** lastops has quit IRC16:02
*** richm has joined #openstack-keystone16:02
*** rushiagr is now known as rushiagr_away16:04
*** jistr has quit IRC16:10
amakarovayoung, can you please look at https://blueprints.launchpad.net/keystone/+spec/unified-delegation - haven't I miss something?16:14
ayoungamakarov, put in a line stating that it will hand the cases where the chain is broken or changed16:15
*** hemna_ is now known as hemna16:17
ayoungamakarov, I want to make sure that the conceptual model this is based on is something that people can understand.  One major stumbling block to understanding is not having a common model.16:17
*** csoukup has quit IRC16:18
amakarovayoung, updated16:19
*** esp has left #openstack-keystone16:23
*** mabrams has left #openstack-keystone16:23
*** esp has joined #openstack-keystone16:23
*** esp has left #openstack-keystone16:24
*** esp has joined #openstack-keystone16:24
*** csoukup has joined #openstack-keystone16:24
*** lastops has joined #openstack-keystone16:25
*** lhcheng has joined #openstack-keystone16:35
*** ChanServ sets mode: +v lhcheng16:35
samueldmqayoung, naked ping 12316:35
samueldmqayoung, need to talk about writing policy files to directories16:35
ayoungHa!16:35
samueldmqayoung, from oslo policy config, we have 'policy_dirs'16:35
samueldmqayoung, which means we will be writting the fetched policy in each one of the dirs listed there16:36
ayoungsamueldmq, yes we do...and what do we do if we have multiples, you are wondering?16:36
samueldmqayoung, am I right ?16:36
ayoungIts a mess alright16:36
samueldmqayoung, yeah :-)16:36
ayoungsamueldmq, don't you wish we had git for this?16:36
samueldmqayoung, for what ? the code ?16:37
samueldmqayoung, I am filling my code skeleton from last week (review #188561) with real code :-)16:37
*** tqtran_ has joined #openstack-keystone16:38
*** varya has quit IRC16:40
ayoungsamueldmq, nah, for the policy management itself16:41
ayoungsamueldmq, we want to let the projects havea base policy that we then override when it gets downloaded16:41
samueldmqayoung, the new service ?16:41
ayoungnot alawys, but some peopel are going to want that16:41
samueldmqayoung, wait, I need a little bit of context :-)16:42
ayoungsamueldmq, lets say you install an new version of nova, and they've added a new API, but that is not covered by what is in the policy uploaded to Keystone16:42
ayoungsamueldmq, what should happen then?16:42
samueldmqayoung, it needs a way to be uploaded there ... shouldn't use a kind of '/policy' from the service ?16:43
ayoungsamueldmq, yeah...that, too16:43
samueldmqayoung, you now liking the idea of having the /policy in services ?16:43
ayoungsamueldmq, it needs to be deliberate16:43
ayoungsamueldmq, no16:44
samueldmqayoung, to provide the defautls ?16:44
samueldmqayoung, k16:44
*** belmoreira has joined #openstack-keystone16:44
ayoungI just meant "yeah, that discussion"16:44
*** rushiagr_away is now known as rushiagr16:44
samueldmqayoung, ok .. so the challenge is .. the service is the primary source of truth16:44
samueldmqayoung, new APIs, API changes etc .. and that need to be synchronized with the policy server somehow16:45
samueldmqayoung, (being /poicy or not is another discussion)16:45
openstackgerritDavid Stanek proposed openstack/keystonemiddleware: Send the correct user-agent to Keystone  https://review.openstack.org/18076916:45
samueldmqayoung, so far so good ?16:45
ayoungsamueldmq, this is an internal decision.  I mean, /policy would make more sense as something that is returned from an unauthenitcated call on a specific API.  But...From a Horizon standpoint, they need to know ...  what it is across the board16:45
ayoungsamueldmq, OK,  thought experiement time....16:45
ayoungGedankgedank....16:45
samueldmqayoung, now let me know how do you plan to solve that problem16:46
ayounglets say we have /policy from a service...and so when a user makes a call GET https://nova/v3.14/computer  \then what16:46
ayoungit could make a http call to itslef...16:46
samueldmqayoung, and how the git repo you said a few lines above fits in it :)16:46
openstackgerritDavid Stanek proposed openstack/keystonemiddleware: Fixes a spelling error in a test name  https://review.openstack.org/18936516:46
ayoungor it could read the same info out of the file system16:46
ayoungso../policy does not buy us anything at enforcement time...16:47
ayoungit does make the endpoint itself query-able16:47
samueldmqayoung, yes, and that's all we need16:47
ayoung and so Horizon could use it to say "what can the user do against this Horizon server"16:47
ayounger16:47
samueldmqayoung, wait ..16:47
ayoungI mean  and so Horizon could use it to say "what can the user do against this Nova server"16:47
ayoungbut...that is expensive16:47
samueldmqayoung, we load the defaults from the individual services16:47
samueldmqayoung, at init time16:47
ayoungwhy go to each serivce in turn instead of a central repo?16:48
samueldmqayoung, after that, /policy is no longer used .. and everything is as we designed16:48
samueldmqayoung, ok .. I think I know why ..16:48
ayoungsamueldmq, if it is push, why put in tin /policy?  That only makes sense for pull16:48
samueldmqayoung, some deployments may be running with some services on master and other services on grizzly16:48
ayoungso...if I restart a service...I send a notification to Keystone to reread the policy file?16:48
ayoungWhat if...however, that endpoint defines policy in a broken way?16:49
samueldmqayoung, they should be allowed to do that .. we shouldn't be creating a *must* relationship between services16:49
ayoungUploading a policy file to Keystone affects multile endpoint16:49
ayoungmultiple16:49
samueldmqayoung, how do we upgrade between versions ? do I need to touch keystone when upgrading nova ?16:50
samueldmqayoung, (I am really asking, have no idea)16:50
openstackgerritPriti Desai proposed openstack/keystone: Fix for listing role assignments by project admin  https://review.openstack.org/18936616:50
ayoungsamueldmq, I think you should upload policy to Keystone first, and we have arule that the contract for a given policy enforcement can't change.16:51
samueldmqayoung, but how do we upload the policy ? manually ?16:51
ayoungsamueldmq, how do we register endpoints with Keystone?  Its out of band16:52
samueldmqayoung, ok ..16:52
samueldmqayoung, suppose we implemented the /policy in each service ..16:53
*** roxanaghe has joined #openstack-keystone16:53
samueldmqayoung, some services could simply read from the file and post the output16:53
samueldmqayoung, others like nova could implement into their code with they want16:53
samueldmqayoung, although I am not sure we want that ... I think we want consistency though the services16:53
samueldmqayoung, let me think about your proposal16:55
samueldmqayoung, i) the admin register and endpoint ii) admin register its policy on keystone iii) admin modifies policy on keystone iv) admin may upload a new policy, overwriting everything or just in "update mode" (in the case of upgrades)16:57
samueldmqayoung, I think that is what you are saying ... and looks like something that makes sense ...16:57
*** markvoelker has joined #openstack-keystone16:57
*** david8hu has joined #openstack-keystone16:57
*** fhubik has quit IRC16:58
*** amaretskiy has quit IRC16:59
*** markvoelker has quit IRC17:02
*** e0ne has quit IRC17:06
*** yottatsa has joined #openstack-keystone17:06
*** dims has joined #openstack-keystone17:07
ayoungsamueldmq, not in code directly.  lets table that for a moment17:09
ayoungsamueldmq, I think it is something like this17:09
ayoungPolicy is a  hash table17:09
ayounglocal policy gets set first17:10
*** dims_ has quit IRC17:10
ayoungany policy from the central server replaces local rules17:10
ayoungso, if a local rule covers a case not yet in the central server, it will be exposed17:10
ayoungthis is how the Nova team sees it, but I think it is wrong17:10
*** bradjones has quit IRC17:10
ayoungI think instead it should be:17:10
samueldmqayoung, oh .. and if ksmiddleware detects that17:11
ayoungonce any policy comes from the central server, all policy comes from there17:11
samueldmqayoung, it could update the policy server17:11
ayoungif a rule does not exist, deny17:11
*** bradjones has joined #openstack-keystone17:11
*** bradjones has quit IRC17:11
*** bradjones has joined #openstack-keystone17:11
ayoungso for any microversions, it is on the sys admin to make sure the new policy rules get uploaded to the policy server17:11
ayoungsamueldmq, http://adam.younglogic.com/2015/06/dyn-policy-microversions/  you camn read that while I go have some lunch17:12
samueldmqayoung, with microversions we should be expecting to have different policies for microverisons17:12
samueldmqayoung, since the url changes17:12
samueldmqayoung, already started .. will continue reading17:12
samueldmqayoung, bon apetit17:12
*** noye has quit IRC17:22
*** david8hu has quit IRC17:23
*** lufix has joined #openstack-keystone17:29
*** david8hu has joined #openstack-keystone17:31
*** dguerri is now known as dguerri`17:31
*** lsmola has quit IRC17:32
*** rushiagr is now known as rushiagr_away17:33
*** g2` has quit IRC17:38
openstackgerritRodrigo Duarte proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858117:41
openstackgerritRodrigo Duarte proposed openstack/keystoneauth: Keystone2KeystoneAuthPlugin scoping capabilities  https://review.openstack.org/18888117:41
openstackgerritRodrigo Duarte proposed openstack/keystoneauth: Encapsulate Service Providers in AccessInfo  https://review.openstack.org/18842617:41
*** spandhe has joined #openstack-keystone17:43
*** yottatsa has quit IRC17:43
*** gyee_ has quit IRC17:57
*** dontalton has joined #openstack-keystone18:00
*** samleon has joined #openstack-keystone18:03
*** pnavarro_ has quit IRC18:06
*** noye has joined #openstack-keystone18:08
*** e0ne has joined #openstack-keystone18:08
*** openstackgerrit has quit IRC18:09
*** openstackgerrit has joined #openstack-keystone18:09
ayounghenrynash, you still have posting powers for opensax.com?18:16
henrynashayoung: err. probably!18:16
ayounghenrynash, http://abc7chicago.com/travel/video-couple-gets-married-aboard-jetblue-flight/768139/18:17
ayoungskip ahead to 2:4718:17
ayoungI made the evening news, and not in a "wanted" sort of way.18:18
*** rushiagr_away is now known as rushiagr18:18
henrynashayoung: that;s is hysterical!18:19
henrynashI’ll see what I can do!18:19
*** browne has joined #openstack-keystone18:19
ayoungI am also available for Bar Mitzvas18:20
*** krotscheck is now known as krotscheck_confe18:21
*** krotscheck_confe is now known as krotsch_at_con18:21
*** e0ne is now known as e0ne_18:25
lbragstadhenrynash: let me know if you don't have access, I'll make sure you get an admin account!18:26
lbragstadhenrynash: but you should have posting rights18:26
*** lufix_ has joined #openstack-keystone18:27
*** e0ne_ has quit IRC18:30
*** g2` has joined #openstack-keystone18:34
*** rushiagr is now known as rushiagr_away18:40
*** e0ne has joined #openstack-keystone18:46
*** krotsch_at_con is now known as krotsck_at_con18:46
*** markvoelker has joined #openstack-keystone18:46
*** jsavak has quit IRC18:48
*** markvoelker has quit IRC18:52
samueldmqayoung, you back ?18:52
ayoungsamueldmq, sort of18:53
ayoungsamueldmq, bout to head into a meeting18:53
*** g2` has quit IRC18:54
samueldmqayoung, ok, we can discuss later18:55
samueldmqayoung, I think the simple solution where we let the admin in charge of uploading/updating the policy on keystone18:55
samueldmqayoung, may be the better for now, since we can deliver everything in Liberty18:56
*** g2` has joined #openstack-keystone18:56
*** ayoung has quit IRC18:58
*** Rockyg has joined #openstack-keystone18:58
*** csoukup has quit IRC19:00
*** BAKfr_ has joined #openstack-keystone19:15
*** esp has quit IRC19:15
*** BAKfr has quit IRC19:15
*** BAKfr_ is now known as BAKfr19:15
*** esp has joined #openstack-keystone19:15
*** amakarov is now known as amakarov_away19:18
*** dguerri` is now known as dguerri19:21
*** pnavarro_ has joined #openstack-keystone19:30
*** lufix has quit IRC19:32
anteayaso somehow the keystone etherpad link for the midcycle got replaced with a neutron etherpad: https://wiki.openstack.org/wiki/Sprints19:41
morganfainberghenrynash: ping if not I'll hit you up tomorrow.19:41
morganfainberganteaya: someone messed up teh editing I am guessing.19:42
anteayaI guess the same19:42
anteayaI could have charged in and fixed it myself or tell you19:42
anteayaI choose the later19:42
morganfainbergI don't think there are any things in thenetherpad yet.19:42
anteayaI still want your etherpad19:43
morganfainbergI'll look into it tomorrow post sleep (it's getting late here)19:43
morganfainbergAnd at dinner19:43
*** csoukup has joined #openstack-keystone19:43
anteayagive me the blank keystone etherpad19:43
anteayaenjoy dinner19:43
morganfainberganteaya: hehe.19:43
morganfainberganteaya: thnx!19:44
*** samueldmq has quit IRC19:46
anteaya:)19:51
*** ayoung has joined #openstack-keystone20:00
*** ChanServ sets mode: +v ayoung20:00
*** afazekas has joined #openstack-keystone20:13
ayounghttps://trello.com/b/SXrl6UQ5/midcycle-planning  If you are coming to the midcycle, please add your name to the checklist under Travel20:22
*** radez is now known as radez_g0n320:23
dstanekayoung:  i don't think i can edit20:25
bknudsonthe only button I have there is an X20:26
openstackgerritRoxana Gherle proposed openstack/keystonemiddleware: Send the correct user-agent to Keystone  https://review.openstack.org/18076920:27
ayoungdstanek, try again20:28
*** Rockyg has quit IRC20:29
ayoungbknudson  I don't think you are on trello, are you?20:29
bknudsonayoung: I haven't signed up for an account on trello20:29
bknudsonI only recently got on twitter20:29
ayoungbknudson, I added you20:30
ayoungso long as I have a general list...20:30
bknudsonayoung: thanks. I'm planning to attend.20:30
*** markvoelker has joined #openstack-keystone20:35
henrynashmorganfainberg: hi20:35
dstanekayoung: thx20:36
ayounghenrynash, I have you down as coming to the midcycle.  Is that correct?20:37
henrynashayoung: for SURE!20:37
ayounggood20:37
*** c_soukup has joined #openstack-keystone20:37
*** markvoelker has quit IRC20:40
henrynashayoung: I think we need to get down and dirty about policy…how far can/should we go in step one etc.20:40
ayounghenrynash, welcome to the conversation!20:40
ayounghenrynash, I've been in the muck up to my elbows on policy for a while...20:41
*** csoukup has quit IRC20:41
ayounghenrynash, I what we want to see in policy it is parallel to what Nova is pushing for with APIs:  how do we break the stagnation20:41
henrynashayoung: I’ll bring deoderant and a David Beckham talcum powder xmas set20:42
ayounghenrynash, so...lets talk one detail I think you will like....20:42
ayounghttps://review.openstack.org/#/c/186929/  is especially for you20:42
ayounghenrynash, setting "admin domain"  is the driving factor20:43
henrynashayoung: yep, I see where you are going with that one20:43
ayounghenrynash, that way, we can take your cloudsample as the starting point.20:43
ayounghenrynash, what I would like to do with the cloudsample, BTW, is make a norm about how each rule is organized:20:43
ayoungon the left (and we tell users not to mess with) is the "find the scope" problem20:44
ayoungon the right is the "assign this role"20:44
ayoungand the operators are expected to concern themselves primarily with "assign the role"20:44
ayoungI think you were kindof working towards this, if I can extrapolate a bit20:45
ayoungyou had a bunch of rules that were designed to document where the scope came from for different APIs20:45
ayoungwhat I think we want to enforce is that those rules should be consumed separately from assign the roles...so for example20:45
* ayoung pulling up cloudsmaple20:45
*** __afazekas has joined #openstack-keystone20:46
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/etc/policy.v3cloudsample.json#n2520:46
ayoung"identity:get_endpoint": "rule:admin_or_cloud_admin",20:46
ayoungI'd  say that one should be something like:20:46
ayoungactually...let's leave Service catalog for a moment...20:47
ayoung"identity:get_project": "rule:cloud_admin or rule:admin_and_matching_target_project_domain_id",20:47
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/etc/policy.v3cloudsample.json#n3920:47
ayoungso, who should be able to "get" a project?20:47
*** Ephur has quit IRC20:48
ayounghenrynash, lets say that it would be anyone with a rule on the project?  Or, in current terms,  Member?20:48
ayoungwith Member implying Admin and so forth20:48
ayoungrule:cloud_admin is, I think, and override, and maybe we want to even extract that out of the policy file altogether, if it means that the cloud_admin can do anything anywhere....20:48
ayoungthat leaves20:48
ayoungrule:admin_and_matching_target_project_domain_id20:49
ayoungso I would start by rewriting this rule as20:49
ayoungrule:matching_target_project_domain_id   and role:admin20:49
ayoungnow, we can potentially expand the role:  rule to handle inference20:49
ayoungbut, lets put that off, and use what we have now:20:50
ayoungrule_role_member: role:admin or role:Member20:50
ayoungand then20:50
*** _afazekas has quit IRC20:50
ayoung"identity:get_project": "rule:matching_target_project_domain_id and rule:role_member",20:50
henrynash(sorry was awfk for a sec….catching up)20:51
openstackgerritRaildo Mascena de Sousa Filho proposed openstack/keystone: Honor domain operations in project table  https://review.openstack.org/14376320:51
ayounghenrynash, or, if we wanted to keep the origianly meaning it would be20:51
ayoungrule_role_admin: role:admin20:51
ayoung"identity:get_project": "rule:matching_target_project_domain_id and rule:role_admin",20:51
henrynashso there, as ever, a number of things going on in what you suggest...20:54
openstackgerritRodrigo Duarte proposed openstack/keystoneauth: Add Keystone2KeystoneAuthPlugin for K2K federation  https://review.openstack.org/18858120:56
*** belmoreira has quit IRC20:56
openstackgerritRodrigo Duarte proposed openstack/keystoneauth: Keystone2KeystoneAuthPlugin scoping capabilities  https://review.openstack.org/18888120:56
openstackgerritRodrigo Duarte proposed openstack/keystoneauth: Encapsulate Service Providers in AccessInfo  https://review.openstack.org/18842620:56
henrynash1) Should there be an (external to policy rules) cloud admin override?  Hmm, I thought people fought to get rid of deity access20:56
henrynash2) Does “member” imply “Admin” (etc.)….only if you agree with hierachical roles20:56
ayounghenrynash, deity access is bad, but I think it is around for a while20:57
ayounglets try to isolate20:57
ayoungthat from the other issues,  I think that people need deity access to un_F*** broken systems.  But,  I am not certain it will actually work.  If you have an admin-domain token, and you use it on some API call that looks to the scope of the token to figure out which resource to change...it ain't gonna work20:59
rodrigodsdolphm, see you are reviewing some patches :) fixed a nit in https://review.openstack.org/#/c/188426/420:59
ayounghenrynash, I don't think there really is an alternative to hierarchical roles...but, that is agreat starting point;  if we namespace roles like we discussed, and we allow for role inference, do we have everything we need to solve your use cases?21:00
*** raildo has quit IRC21:00
henrynashayoung: so I actually do agree with the namespace roles proposal….I thikn that is the right approach…..as you know I think there *might* be an implementation timing issue in terms of whether they are pre or post token generation…..but in the end, post token generation is where we need to get to21:02
henrynashayoung: I will try and re-cast my domain roles to be namespace roles as we discussed21:04
ayounghenrynash, so my understanding  "domain" is the main  namespace, but should not be the only one...right?21:04
henrynashayoung: ++21:04
ayounghenrynash, so then the question is "what goes in the token"21:05
ayoungeither it is all "inherited roles"  or "the top one"21:05
*** nkinder_ has joined #openstack-keystone21:05
ayoungnamespace  would have to be accommodted either way, I think21:05
henrynashayoung: yep….one *could* expand out at token generation time, or carry the namespace in the toen along with the role21:06
ayoungso, maybe we say "admin" will become "openstack:admin"  by default or something like that21:06
*** pnavarro_ has quit IRC21:06
ayounghenrynash, I also have something else along these lines worth mentioning...21:06
ayoungallowing a user to explicitly request the roles that go into the token21:06
ayounghttps://review.openstack.org/#/c/186979/21:07
morganfainberghenrynash: i see how painful it is to collaborate w/ the folks in our timezones now when here21:07
morganfainberghenrynash: though i think i'm +2 hrs from you.21:07
henrynashmorganfainberg: quality of response is inversely proportional to time zone overlap :-)21:07
morganfainberghenrynash: hehe21:08
morganfainberghenrynash: though i'll say the food here in budapest has been fantastic21:08
henrynashmorganfainberg: oh, budapest…nice….yes21:08
morganfainbergthough tomorrow is off to berlin.21:08
henrynashmorganfainberg: another day, another marriott (err, I mean city(21:09
*** nkinder has quit IRC21:09
*** nkinder_ has quit IRC21:12
*** nkinder_ has joined #openstack-keystone21:13
*** afazekas has quit IRC21:13
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/18945721:14
openstackgerritOpenStack Proposal Bot proposed openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/18847721:14
*** ChanServ changes topic to "Liberty-1 June 23. This is Spec Proposal Freeze. Please Review and/or Propose Specs."21:18
*** iurygregory has quit IRC21:19
ayounghenrynash, so...I think what I said above carries through regardless of how we expand the role inference:  role:admin  could be implemented either way21:20
*** gyee_ has joined #openstack-keystone21:22
*** nkinder_ has quit IRC21:26
*** nkinder_ has joined #openstack-keystone21:27
*** afazekas has joined #openstack-keystone21:27
*** henrynash has quit IRC21:33
*** EmilienM is now known as EmilienM|afk21:41
*** c_soukup has quit IRC21:44
openstackgerritayoung proposed openstack/keystone-specs: Tokens with subsets of roles or endpoints  https://review.openstack.org/18697921:54
*** lhcheng has quit IRC21:56
openstackgerritDavid J Hu proposed openstack/keystone-specs: Unified namespaced is_admin policy  https://review.openstack.org/18948621:56
*** lhcheng has joined #openstack-keystone21:57
*** ChanServ sets mode: +v lhcheng21:57
*** nkinder__ has joined #openstack-keystone21:58
*** lhcheng has quit IRC21:58
*** lhcheng_ has joined #openstack-keystone21:58
openstackgerritayoung proposed openstack/keystone-specs: Tokens with subsets of roles or endpoints  https://review.openstack.org/18697921:58
*** nkinder_ has quit IRC22:02
*** nkinder__ has quit IRC22:03
*** nkinder__ has joined #openstack-keystone22:04
*** krotsck_at_con is now known as krotscheck22:08
*** afazekas has quit IRC22:17
*** markvoelker has joined #openstack-keystone22:21
openstackgerritMerged openstack/keystonemiddleware: Stop using function deprecated in py34  https://review.openstack.org/18822622:21
*** markvoelker has quit IRC22:26
*** diegows has joined #openstack-keystone22:27
*** liusheng has quit IRC22:28
*** liusheng has joined #openstack-keystone22:28
*** HT_sergio has quit IRC22:32
*** ankita_wagh has joined #openstack-keystone22:54
*** e0ne has quit IRC23:05
*** darrenc is now known as darrenc_afk23:07
*** zzzeek has quit IRC23:11
openstackgerritMerged openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/18847723:14
*** nkinder__ has quit IRC23:18
*** EmilienM|afk is now known as EmilienM23:20
*** jaosorior has quit IRC23:31
*** hemna is now known as hemnafk23:32
*** darrenc_afk is now known as darrenc23:35
*** chlong has joined #openstack-keystone23:36
*** dontalton has quit IRC23:45
*** lhcheng_ is now known as lhcheng23:58
*** ChanServ sets mode: +v lhcheng23:58

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!