Friday, 2016-01-08

*** lhcheng has joined #openstack-keystone00:02
*** ChanServ sets mode: +v lhcheng00:02
*** spandhe has joined #openstack-keystone00:04
henrynashhtruta: hi00:05
htrutahenrynash, hi.00:05
htrutahad to rebase your patch... seems like I've done something wrong00:05
henrynashhtruta: did you mean tyo just update the V9 resoruce driver patch and remove the depreaction warning00:06
*** ayoung has quit IRC00:06
henrynashhtruta: ah, yep, didn’t think you meant to do that!00:07
htrutahenrynash, hehe... sorry, I'll fix it00:07
henrynashhtruta: np!00:07
*** arif-ali has quit IRC00:12
notmorganstevemar: waiting on local pep8/py27 run for the stable/liberty revert00:13
notmorganstevemar: kilo revert also proposed00:13
notmorganstevemar: we may want some reno for it too.00:14
notmorgancan add that if you want it00:15
htrutahenrynash, wow, the diff between two versions, which are not base is coll on the new UI00:16
htrutacoo*00:16
htrutacool**00:16
*** arif-ali has joined #openstack-keystone00:20
*** dims has joined #openstack-keystone00:22
stevemarnotmorgan: probs00:25
notmorganstevemar: i'll add a reno patch for master soon.00:26
*** jasonsb has joined #openstack-keystone00:27
*** henrynash has quit IRC00:27
openstackgerritHenrique Truta proposed openstack/keystone: Replace tenant for project in resource files  https://review.openstack.org/24829500:28
openstackgerritHenrique Truta proposed openstack/keystone: Create V9 version of resource driver interface  https://review.openstack.org/26208200:28
notmorganstevemar: https://review.openstack.org/#/c/265023/ stable/liberty00:31
*** openstackgerrit has quit IRC00:32
*** openstackgerrit has joined #openstack-keystone00:32
roxanaghebknudson_, still around? for https://review.openstack.org/#/c/242512/ I still don't get it how that code in extras is hit. I can login with ADFS without hitting the ADFSPassword plugin00:36
notmorganstevemar: https://review.openstack.org/#/q/topic:bug/1475762+status:open00:36
*** oomichi has joined #openstack-keystone00:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Add release note for revert of c4723550aa95be403ff591dd132c9024549eff10  https://review.openstack.org/26502400:43
notmorganstevemar: ^ reno00:43
gyeenotmorgan, stevemar, I suggest you guys to double check with Swift before approving the revert, it may cause problems with cross-tenant ACLs with names only00:49
gyeehttps://github.com/openstack/swift/blob/master/swift/common/middleware/keystoneauth.py#L14300:49
gyeethere are legacy stuff may break if we are not careful00:49
samueldmqnotmorgan: this looks to be a serious regression on running clouds00:49
notmorgangyee: hopefully not since that was the previous behavior before that fix00:50
gyeebknudson_, btw, roxanaghe was looking at the patch, we can't figure out how that code got exercised at all00:50
notmorgangyee: this only changes that you can use ids to get a token00:51
gyeenotmorgan, right, but they are using token data version to determine the domain00:51
samueldmqnotmorgan: is there a bug open for that ?00:51
gyeeI would suggest they sign off on those patches so we have CYA :-)00:51
notmorganand unless they changed that in liberty00:51
notmorganwe don't care00:51
notmorganin fact, we should be reverting to maintain compat00:52
notmorganchanged it post l300:52
notmorgangyee: it's been doing that according to the blame since 201400:52
notmorganso we should be fine reverting00:52
notmorganbut we'llk see what breaks anyway at least w/ devstack-isms and go from there00:53
gyeeif we that, make sure they set allow_names_in_acls to False00:53
notmorganfwiw https://github.com/openstack/swift/commit/49fa5b8fb467bb5900dda36da47d46d4c5882bb0 that doc line was updated in 201400:53
notmorganso, like i said, this is just restoring us to correct behavior00:54
gyeev2 APIs should not be domain-aware at all00:54
notmorgangyee: no they shouldn't but this is breaking real deployments and we just need to maintain old behavior unfortunately00:55
gyeelhcheng, do you know of ADFSPassword plugin being used at all?00:55
gyeenotmorgan, yeah, so as long as they are aware of it and OK with it, that's all I am saying00:56
*** woodster_ has quit IRC00:56
notmorgangyee: i am unhappy about needing to revert it :(00:57
gyeelhcheng, bknudson_, looking at django-auth, we can't figure out how ADFSPassword plugin is being utilized00:57
*** slberger has left #openstack-keystone00:58
lhchenggyee: CERN uses ADFS, don't know if they used the ADFSPassword  plugin.00:59
gyeewe are trying to validate bknudson_ patch, but can't figure out how to test it00:59
gyeewith ADFS that is00:59
lhchenggyee: django_openstack_auth doesn't use it.00:59
gyeethen I don't understand who uses that code01:00
lhchenggyee: https://github.com/openstack/keystoneauth/blob/6547b156e95b6a8ad7f9efe290cbe0a3349f4977/keystoneauth1/tests/unit/extras/saml2/examples/xml/ADFS_RequestSecurityTokenResponse.xml#L2101:02
lhchengmarekd might know :)01:02
gyeeright, that's the part we are trying to validate01:05
gyeelemme do some mo code diving01:06
*** _zouyee has joined #openstack-keystone01:06
*** KarthikB has joined #openstack-keystone01:09
*** lhcheng has quit IRC01:10
*** EinstCrazy has joined #openstack-keystone01:14
*** _cjones_ has quit IRC01:40
openstackgerritRoxana Gherle proposed openstack/keystone: Allow '_' character in mapping_id value  https://review.openstack.org/26493701:43
openstackgerritRoxana Gherle proposed openstack/keystone: Allow '_' character in mapping_id value  https://review.openstack.org/26493701:46
*** shoutm_ has joined #openstack-keystone01:49
*** shoutm has quit IRC01:53
*** spzala has joined #openstack-keystone01:55
*** ccard__ has quit IRC01:56
*** spzala has quit IRC01:59
*** spandhe has quit IRC02:05
*** KarthikB has quit IRC02:06
*** ccard__ has joined #openstack-keystone02:07
*** pai15 has joined #openstack-keystone02:09
*** csoukup has joined #openstack-keystone02:23
*** shoutm_ has quit IRC02:25
*** henrynash has joined #openstack-keystone02:26
*** ChanServ sets mode: +v henrynash02:26
*** shoutm has joined #openstack-keystone02:26
*** richm has quit IRC02:31
*** yangyapeng has joined #openstack-keystone02:32
*** ayoung has joined #openstack-keystone02:35
*** ChanServ sets mode: +v ayoung02:35
*** jaosorior has quit IRC02:35
*** jaosorior has joined #openstack-keystone02:35
*** dims has quit IRC02:36
*** jasonsb has quit IRC02:44
*** jasonsb has joined #openstack-keystone02:44
*** tqtran has quit IRC02:47
*** tsymanczyk has joined #openstack-keystone02:57
*** tsymanczyk is now known as Guest8294402:57
*** Guest82944 has quit IRC02:57
*** pai15 has quit IRC02:58
*** gyee has quit IRC03:04
*** henrynash has quit IRC03:06
*** spandhe has joined #openstack-keystone03:35
*** aginwala has joined #openstack-keystone03:42
stevemarjamielennox: this is so close: https://review.openstack.org/#/c/244440/703:57
jamielennoxstevemar: always the funny thing is that i had +A there for a bit, but it merge conflicted03:57
jamielennoxstevemar: is my gerrit messed up or are bknudson_'s nits unrelated?04:00
stevemarjamielennox: i think your gerrit is messed up, they seem related to me04:00
stevemari think the big one is fixing the licence, cause #lawyers04:01
jamielennoxit seems like code i changed, but gerrit isn't showing it as changed from the original04:01
stevemaroh, actually, you are right04:01
stevemarnot sure why he wrote thta04:01
stevemarcommented04:02
dstanekjamielennox: stevemar: i was just looking at that code04:03
dstanekcopyright is borked :-)04:03
jamielennoxdstanek: i've no idea how i did that04:03
jamielennoxdstanek: there are pros and cons to vim, sometimes you accidently hit a key and it makes a giant change to your file you don't notice04:04
dstanekbeen there04:04
openstackgerritJamie Lennox proposed openstack/keystone: Perform middleware tests with webtest  https://review.openstack.org/24444004:05
openstackgerritJamie Lennox proposed openstack/keystone: Make AuthContext depend on auth_token middleware  https://review.openstack.org/25568604:05
*** edmondsw has quit IRC04:05
*** tsymanczyk has joined #openstack-keystone04:07
*** tsymanczyk is now known as Guest8924704:08
*** aginwala has quit IRC04:11
*** Guest89247 has quit IRC04:12
openstackgerritMerged openstack/keystone: Change LOG.warn to LOG.warning  https://review.openstack.org/26311304:16
openstackgerritmelissaml proposed openstack/keystone: Wrong usage of "an"  https://review.openstack.org/26506604:19
openstackgerritMerged openstack/keystone: Adds a hacking check looking for Logger.warn usage  https://review.openstack.org/26433404:20
openstackgerritMerged openstack/keystone: Fixes hacking logger test cases to use same base  https://review.openstack.org/26433504:20
ayounghttp://phys.org/news/2016-01-evidence-bad.html   Suggests that our current code review system is broken.  Since we insist on all the -1s going away before we merge code.04:25
*** tobe has joined #openstack-keystone04:25
*** tobe has quit IRC04:26
*** links has joined #openstack-keystone04:27
*** KarthikB has joined #openstack-keystone04:35
*** markvoelker has quit IRC04:38
*** aginwala has joined #openstack-keystone04:38
*** flwang has quit IRC04:42
*** aginwala has quit IRC04:42
*** flwang1 has joined #openstack-keystone04:46
openstackgerritHenrique Truta proposed openstack/keystone: Restricting domain_id update  https://review.openstack.org/20721804:56
*** jamielennox is now known as jamielennox|away05:27
*** fawadkhaliq has joined #openstack-keystone05:32
*** spandhe has quit IRC05:35
*** jaosorior has quit IRC05:47
*** dave-mccowan has quit IRC05:49
*** henrynash has joined #openstack-keystone05:58
*** GB21 has joined #openstack-keystone05:58
*** ChanServ sets mode: +v henrynash05:58
*** sigmavirus24_awa is now known as sigmavirus2406:03
*** sigmavirus24 is now known as sigmavirus24_awa06:05
*** toddnni_ has joined #openstack-keystone06:08
*** toddnni has quit IRC06:09
*** toddnni_ is now known as toddnni06:09
*** mgagne has quit IRC06:09
*** andreaf has quit IRC06:09
*** spzala has joined #openstack-keystone06:10
*** dtroyer has quit IRC06:11
*** vgridnev has joined #openstack-keystone06:13
*** markvoelker has joined #openstack-keystone06:13
*** spzala has quit IRC06:15
*** mgagne has joined #openstack-keystone06:16
*** mgagne is now known as Guest4180406:16
*** andreaf has joined #openstack-keystone06:17
*** dtroyer has joined #openstack-keystone06:17
*** _cjones_ has joined #openstack-keystone06:17
*** markvoelker has quit IRC06:18
*** _cjones_ has quit IRC06:19
*** _cjones_ has joined #openstack-keystone06:19
*** KarthikB has quit IRC06:19
*** vgridnev has quit IRC06:20
*** jaosorior has joined #openstack-keystone06:21
*** aginwala has joined #openstack-keystone06:29
*** EinstCrazy has quit IRC06:37
*** aginwala has quit IRC06:38
openstackgerritAnkit Agrawal proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125306:38
*** aginwala has joined #openstack-keystone06:39
*** rdo has quit IRC06:44
*** rdo has joined #openstack-keystone06:46
*** aginwala has quit IRC06:50
*** _cjones_ has quit IRC06:51
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/26442606:51
*** rdo has quit IRC06:54
*** rdo has joined #openstack-keystone06:56
*** itlinux has joined #openstack-keystone06:58
*** zqfan has joined #openstack-keystone07:02
*** shoutm has quit IRC07:02
*** henrynash has quit IRC07:03
*** aginwala has joined #openstack-keystone07:06
*** shoutm has joined #openstack-keystone07:12
*** aginwala_ has joined #openstack-keystone07:13
*** itlinux has quit IRC07:14
*** itlinux has joined #openstack-keystone07:15
*** itlinux has quit IRC07:16
*** aginwala has quit IRC07:16
*** belmoreira has joined #openstack-keystone07:26
*** aginwala has joined #openstack-keystone07:27
*** aginwala_ has quit IRC07:30
*** aginwala has quit IRC07:31
*** aginwala has joined #openstack-keystone07:34
*** GB21 has quit IRC07:39
*** EinstCrazy has joined #openstack-keystone07:49
*** aginwala has quit IRC07:52
*** aginwala has joined #openstack-keystone07:55
*** csoukup has quit IRC07:55
*** oomichi has quit IRC07:56
*** GB21 has joined #openstack-keystone08:00
*** aginwala_ has joined #openstack-keystone08:02
*** fawadkhaliq has quit IRC08:04
*** ankit_ag has joined #openstack-keystone08:05
*** aginwala has quit IRC08:06
openstackgerritMerged openstack/keystone: Expose defect in users_in_group, groups_for_user exact filters  https://review.openstack.org/26477908:12
openstackgerritMerged openstack/keystone: Fix users in group and groups for user exact filters  https://review.openstack.org/26315808:14
*** oomichi has joined #openstack-keystone08:14
*** markvoelker has joined #openstack-keystone08:15
*** jaosorior has quit IRC08:16
*** jaosorior has joined #openstack-keystone08:16
*** markvoelker has quit IRC08:19
*** jistr has joined #openstack-keystone08:24
marekddolphm: around now08:26
*** aginwala_ has quit IRC08:29
*** spzala has joined #openstack-keystone08:33
*** GB21 has quit IRC08:37
*** spzala has quit IRC08:38
*** fhubik has joined #openstack-keystone08:54
*** GB21 has joined #openstack-keystone08:55
openstackgerritMerged openstack/keystone: De-duplicate fernet payload tests  https://review.openstack.org/23019308:58
*** browne has quit IRC09:04
openstackgerritAndreas Jaeger proposed openstack/keystone: Merge pep8 and bandit test environments  https://review.openstack.org/26199309:07
openstackgerritAndreas Jaeger proposed openstack/keystone: Merge pep8 and bandit test environments  https://review.openstack.org/26514809:11
*** dstanek has quit IRC09:16
*** dstanek has joined #openstack-keystone09:18
*** ChanServ sets mode: +v dstanek09:18
*** mhickey has joined #openstack-keystone09:23
*** BobBall has joined #openstack-keystone09:46
*** fawadkhaliq has joined #openstack-keystone09:56
BobBallI'm confused with v2 vs v3 when using keystone_authtoken - could someone help? http://paste.openstack.org/show/483306/ glance-api and glance-registry are both configured with auth_uri=.../v3 and auth_version=v3.0, however keystoneclient.auth.identity.v2 is making the authentication requests!09:56
BobBallI suspect I'm missing something very obvious here, but I'm really confused09:57
*** EinstCrazy has quit IRC10:04
*** markvoelker has joined #openstack-keystone10:15
*** markvoelker has quit IRC10:20
*** jaosorior has quit IRC10:37
*** jaosorior has joined #openstack-keystone10:38
*** csoukup has joined #openstack-keystone10:52
*** csoukup has quit IRC10:56
*** daemontool has joined #openstack-keystone10:58
openstackgerritMaho Koshiya proposed openstack/python-keystoneclient: Add wrapper classes for return-request-id-to-caller  https://review.openstack.org/26118810:58
*** fawadkhaliq has quit IRC11:05
*** fawadkhaliq has joined #openstack-keystone11:05
*** _zouyee has quit IRC11:09
*** dims has joined #openstack-keystone11:09
samueldmqmorning keystoners11:09
samueldmqBobBall: hi11:10
samueldmqBobBall: have you restarted the service after updating the configuration?11:10
BobBallAnd the VM they are running on :)11:11
BobBallThe paste shows that auth.identity.v2 is using a v3 API11:11
BobBallURI I mean11:11
samueldmqBobBall: devstack ?11:11
BobBallNo; Mirantis OpenStack11:12
samueldmqBobBall: yes something is weird, and it actually tried v2 URL then v311:15
samueldmqBobBall: keystoneclient.auth.identity.v2 making v2.0 requests and keystoneclient.session using the v3 uri11:15
*** yangyapeng has quit IRC11:16
BobBallAny ideas why it might do that?  (even if it's not a way to fix it) because I'm very confused about the whole thing tbh :D11:17
samueldmqBobBall: is it working ?11:19
BobBallno :/11:19
samueldmqBobBall: could you reproduce the same using devstack?11:20
BobBallHang on - you saying that the logs suggest it tries a v3 auth against a v3 url?11:20
BobBallI'd assumed it didn't try that since there was no reference to identity.v311:20
BobBallIf it tries a v3 auth then the problem might just be that the v3 auth itself is broken in my setup.  I don't expect v2 to work, but I assumed from the above that v3 was not being attempted, just v2 with the v3 URI?11:21
samueldmqBobBall: yes maybe11:21
samueldmqBobBall: I see it trying v3 auth, then v2 auth ... v3 auth again then v211:21
samueldmqBobBall: also it might be worth it to test against devstack, just to make sure it's working11:22
samueldmqBobBall: and test v3 auth manually on your keystone11:22
BobBallAwesome.  Then I'll assume that I've just not got the right settings for the v3 auth plugin somehow or somewhere and v3 auth is working fine11:22
BobBallv3 auth works in 95% of scenarious11:23
BobBallscenarios*11:23
BobBallThis is only failing for glance_store using swift11:23
BobBallSorry for my misunderstanding of the logs - if I'd realised that v3 was actually being attempted correctly I would have dug into the auth earlier11:24
samueldmqBobBall: no problem, welcome11:24
samueldmqBobBall: let us know if you've got it working, or if you need help11:25
*** fawadkhaliq has quit IRC11:25
BobBallWill do!11:25
*** fawadkhaliq has joined #openstack-keystone11:25
*** shoutm has quit IRC11:30
*** _zouyee has joined #openstack-keystone11:48
breton_BobBall: which version of MOS is it?11:51
BobBall7 but with modifications to use keystone v3 by default, so it's not a standard thing for anyone :)11:52
breton_BobBall: could you please do `curl https://public.fuel.local:5000` and post the output?11:53
breton_or curl http://192.168.10.2:5000/11:54
BobBall{"versions": {"values": [{"status": "stable", "updated": "2015-03-30T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.4", "links": [{"href": "https://public.fuel.local:5000/v3/", "rel": "self"}]}, {"status": "stable", "updated": "2014-04-17T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v2.0+json"}11:56
*** markvoelker has joined #openstack-keystone12:01
breton_BobBall: https://bugs.launchpad.net/keystone/+bug/143846912:04
openstackLaunchpad bug 1438469 in keystonemiddleware "auth_version config not used" [Undecided,Incomplete]12:04
breton_stevemar: ^12:04
*** markvoelker has quit IRC12:06
*** raildo-afk is now known as raildo12:16
*** EinstCrazy has joined #openstack-keystone12:18
*** lhcheng has joined #openstack-keystone12:23
*** ChanServ sets mode: +v lhcheng12:23
*** GB21 has quit IRC12:23
*** EinstCrazy has quit IRC12:28
*** dims_ has joined #openstack-keystone12:40
*** dims has quit IRC12:41
*** markvoelker has joined #openstack-keystone12:45
samueldmqdstanek: hi, you around ?12:45
*** EinstCrazy has joined #openstack-keystone12:49
*** fawadkhaliq has quit IRC12:50
*** EinstCrazy has quit IRC12:52
*** EinstCrazy has joined #openstack-keystone12:54
*** fawadkhaliq has joined #openstack-keystone12:55
openstackgerritPaulo Ewerton Gomes Fragoso proposed openstack/keystone: API support for project cascade update  https://review.openstack.org/24358513:14
*** dims_ has quit IRC13:16
*** links has quit IRC13:25
*** dims has joined #openstack-keystone13:26
*** ankit_ag has quit IRC13:27
openstackgerritGrzegorz Grasza (xek) proposed openstack/keystone: Online schema migration documentation  https://review.openstack.org/26525213:33
*** edmondsw has joined #openstack-keystone13:35
*** EinstCrazy has quit IRC13:38
openstackgerritHenrique Truta proposed openstack/keystone: API support for project cascade delete  https://review.openstack.org/24424813:40
openstackgerritHenrique Truta proposed openstack/keystone: Manager support for project delete cascade  https://review.openstack.org/24414913:40
openstackgerritHenrique Truta proposed openstack/keystone: Add backend support for deleting a projects list  https://review.openstack.org/24591613:40
*** sigmavirus24_awa is now known as sigmavirus2413:46
*** sileht has quit IRC13:46
*** sileht has joined #openstack-keystone13:48
*** annasort has joined #openstack-keystone13:50
*** gordc has joined #openstack-keystone13:50
*** e0ne has joined #openstack-keystone13:52
openstackgerritPaulo Ewerton Gomes Fragoso proposed openstack/keystone: Manager support for project cascade update  https://review.openstack.org/24358413:53
openstackgerritGrzegorz Grasza (xek) proposed openstack/keystone: Unit test for checking cross-version migrations compatibility  https://review.openstack.org/24160313:54
openstackgerritGrzegorz Grasza (xek) proposed openstack/keystone: Unit test for checking cross-version migrations compatibility  https://review.openstack.org/24160313:57
*** jaosorior has quit IRC14:02
*** richm has joined #openstack-keystone14:02
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Improve Development Environment Docs  https://review.openstack.org/24640014:09
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Improve Development Environment Docs  https://review.openstack.org/24640014:10
*** dave-mccowan has joined #openstack-keystone14:13
*** GB21 has joined #openstack-keystone14:13
samueldmqokay, time to review and get used to new gerrit interface :)14:14
openstackgerritHenrique Truta proposed openstack/keystone: Improves domain name case sensitivity tests  https://review.openstack.org/23610314:16
*** spzala has joined #openstack-keystone14:18
*** jsavak has joined #openstack-keystone14:30
*** KarthikB has joined #openstack-keystone14:31
*** Eva-i has joined #openstack-keystone14:35
openstackgerritLin Hua Cheng proposed openstack/keystone: Improve Conflict error message in IdP creation  https://review.openstack.org/26527914:41
*** magalhaes has joined #openstack-keystone14:46
magalhaesHi there14:46
magalhaesanyone here has used keystone to keystone federation? In order to connect an private cloud openstack to an openstack located in the public cloud?14:47
*** petertr7_away is now known as petertr714:47
*** doug-fish has joined #openstack-keystone14:50
*** iurygregory has quit IRC14:52
Eva-iHello. Is it possible to gather keystone auth token from web browser like this https://github.com/openstack/zaqar/blob/master/examples/websocket.html#L101? Seems like this javascript code was working in the past, but now Keystone server doesn't allow cross-origin requests.14:54
*** fawadkhaliq has quit IRC14:54
*** fawadkhaliq has joined #openstack-keystone14:54
*** fawadkhaliq has quit IRC14:55
Eva-iIn Firefox web browser the error looks like this on attempt to get auth token from Keystone: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at http://localhost:5000/v3/auth/tokens. (Reason: CORS header 'Access-Control-Allow-Origin' missing)."15:00
*** vgridnev has joined #openstack-keystone15:01
*** topol has joined #openstack-keystone15:02
*** ChanServ sets mode: +v topol15:02
*** iurygregory has joined #openstack-keystone15:03
*** mhickey has quit IRC15:04
openstackgerritLance Bragstad proposed openstack/keystone: Consolidate the fernet provider validate_v3_token()  https://review.openstack.org/19687715:09
*** browne has joined #openstack-keystone15:09
*** peter-hamilton has joined #openstack-keystone15:14
*** peter-hamilton has quit IRC15:18
*** mhickey has joined #openstack-keystone15:18
*** csoukup has joined #openstack-keystone15:19
*** petertr7 is now known as petertr7_away15:19
*** fawadkhaliq has joined #openstack-keystone15:23
*** dansmith is now known as superdan15:23
*** petertr7_away is now known as petertr715:24
*** timcline has joined #openstack-keystone15:26
*** breitz has quit IRC15:30
*** breitz has joined #openstack-keystone15:31
lbragstaddolphm strange gerrit UI question for you, or anyone else who uses the gerrit-dash-creator. I have reviews that are "In Progress" meaning they aren't -1'd or failing Jenkins, yet they still show up as "Need Attention".. seems to only happen with the new gerrit UI.15:40
lbragstadhas anyone else's gerrit dashboard behaved differently after the update?15:41
*** e0ne has quit IRC15:42
lbragstadcc dstanek ^15:43
*** links has joined #openstack-keystone15:47
*** slberger has joined #openstack-keystone15:48
openstackgerritMerged openstack/keystone: Updated from global requirements  https://review.openstack.org/26442615:51
openstackgerritMerged openstack/keystone: Perform middleware tests with webtest  https://review.openstack.org/24444015:52
*** spzala_ has joined #openstack-keystone15:53
*** spzala has quit IRC15:55
*** ninag has joined #openstack-keystone15:56
openstackgerritMarek Denis proposed openstack/keystone: Service Providers and Projects associations  https://review.openstack.org/26485415:58
*** fawadkhaliq has quit IRC16:01
*** jsavak has quit IRC16:02
*** timcline has quit IRC16:03
*** tonytan4ever has joined #openstack-keystone16:03
*** jsavak has joined #openstack-keystone16:05
*** mhickey has quit IRC16:06
*** henrynash has joined #openstack-keystone16:07
*** ChanServ sets mode: +v henrynash16:07
dstaneklbragstad: i've not really noticed that yet. i've mostly moved to trello for managing reviews16:09
*** zigo has quit IRC16:09
bknudson_dstanek: what does your trello board look like?16:10
*** zigo has joined #openstack-keystone16:10
*** belmoreira has quit IRC16:10
lbragstaddstanek alright - oh well... it's not a blocker, just annoying16:11
lbragstadand i was curious if anyone else noticed it16:11
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125316:11
*** petertr7 is now known as petertr7_away16:11
*** lhcheng has quit IRC16:12
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125316:13
lbragstaddstanek it's bug day - anything in particular you need me to review yet?16:14
*** daemontool has quit IRC16:15
dstaneklbragstad: nope, i'm just starting to figure out what reviews i want to look at16:15
lbragstadFYI to everyone else - if you want we have an etherpad going per usual for the bug day - https://etherpad.openstack.org/p/keystone-office-hours16:15
*** petertr7_away is now known as petertr716:17
*** mhickey has joined #openstack-keystone16:18
*** henrynash has quit IRC16:18
dstanekbknudson_: https://trello.com/b/kAcLdBiq/openstack16:19
dstanekbknudson_: i'm still working out what my workflow will be, but the only thing i do manually is move a card into "In Progress" - the app does everything else for me16:20
marekddstanek: it's not correlated with gerrit, is it?16:21
*** jdennis1 has quit IRC16:21
bknudson_nothing is in progress16:21
bknudson_must be nice16:21
marekdyour votes will not impact cards' status16:21
dstanekbknudson_: that because i'm going through and staring the reviews i want to look at :-)16:21
dstanekmarekd: the data comes from gerrit16:21
*** GB21 has quit IRC16:21
marekddstanek: how?16:22
dstanekmarekd: https://github.com/dstanek/os-trello16:22
*** KarthikB has quit IRC16:23
*** jdennis has joined #openstack-keystone16:24
marekddstanek: thx16:24
dstanekmarekd: np16:24
*** dims has quit IRC16:25
dstanekmarekd: it gets starred reviews from gerrit and watches/assigned bugs from launchpad - specs are coming this weekend16:26
*** dims has joined #openstack-keystone16:26
*** ninag has quit IRC16:26
*** jbell8 has joined #openstack-keystone16:26
*** tonytan4ever has quit IRC16:27
*** links has quit IRC16:27
*** jsavak has quit IRC16:31
openstackgerritMarek Denis proposed openstack/keystone: Service Providers and Projects associations  https://review.openstack.org/26485416:31
*** jsavak has joined #openstack-keystone16:32
*** jistr has quit IRC16:33
*** _zouyee has quit IRC16:37
*** tonytan4ever has joined #openstack-keystone16:40
*** gyee has joined #openstack-keystone16:40
*** ChanServ sets mode: +v gyee16:40
*** fawadkhaliq has joined #openstack-keystone16:48
openstackgerritNavid Pustchi proposed openstack/keystone: Delete checks for default domain delete  https://review.openstack.org/26434216:48
*** phalmos has joined #openstack-keystone16:54
openstackgerritBrant Knudson proposed openstack/keystone: AuthContextMiddleware admin token handling  https://review.openstack.org/19893116:56
*** KarthikB has joined #openstack-keystone16:58
*** rderose has joined #openstack-keystone17:00
openstackgerritBrant Knudson proposed openstack/keystone: Use assertIn to check if collection contains value  https://review.openstack.org/26495917:02
*** jsavak has quit IRC17:03
*** fhubik has quit IRC17:03
*** henrynash has joined #openstack-keystone17:04
*** ChanServ sets mode: +v henrynash17:04
*** _cjones_ has joined #openstack-keystone17:05
*** _cjones_ has quit IRC17:06
*** _cjones_ has joined #openstack-keystone17:06
*** jsavak has joined #openstack-keystone17:06
stevemardstanek: office hours have started, yes?17:16
dstanekstevemar: i've been here for a while :-)17:17
stevemardstanek: any "drop-in"?17:17
*** GB21 has joined #openstack-keystone17:17
dstanekstevemar: how do you feel about https://review.openstack.org/#/c/253273/27 and its bug https://bugs.launchpad.net/keystone/+bug/152403017:18
openstackLaunchpad bug 1524030 in OpenStack Identity (keystone) "Reduce revocation events for performance improvement" [Medium,In progress] - Assigned to Jorge Munoz (jorge-munoz)17:18
dstanekstevemar: nobody ever drops in :-)17:18
stevemardstanek: :(17:18
stevemardstanek: there have been a few attempts at speeding up revocation events17:18
samueldmqhenrynash: hi17:19
henrynashsamueldmq: hi17:20
dstanekstevemar: i'm wondering if special casing the disabling events gives enough of a benefit for breaking up the code like that17:20
samueldmqhenrynash: this bp may be considered implemented17:21
samueldmqhenrynash: https://blueprints.launchpad.net/keystone/+spec/assignment-manager-cleanup17:21
samueldmqhenrynash: I think the lat patches were the ones you submitted to re-use list_role_assignments17:21
samueldmqhenrynash: do you agree?17:21
lbragstaddstanek we might be able to justify the trust + fernet thing as a separate bug?17:23
*** roxanagh_ has joined #openstack-keystone17:23
lbragstadsince it's something that is inconsistent between token providers17:23
dstaneklbragstad: if it's not correct behavior it should definitely be a separate bug17:23
lbragstadis mfisch around?17:23
henrynashsamueldmq: so I have one more i the series I am working on….which allows  the federation calls (e.g. list_projects_for_groups) to use list_role_assignments17:24
lbragstaddstanek I believe this patch is the result of some conversations at the summit17:24
lbragstadbetween jorge_munoz and dolphm IIRC17:24
henrynashsamueldmq: which I will get in for M217:24
*** e0ne has joined #openstack-keystone17:25
*** fawadkhaliq has quit IRC17:26
*** fawadkhaliq has joined #openstack-keystone17:26
*** rderose has quit IRC17:27
samueldmqhenrynash: have you posted them up for review already?17:27
*** superdan has quit IRC17:27
*** dansmith has joined #openstack-keystone17:27
lbragstaddstanek and I want to say that mfisch had some input around the volume of revocation events17:27
henrynashsamueldmq: not the last one yet, it’s mainly done - I need to rebase it and tidy it up…I’ll try and do that over the weekend and post early next week17:27
lbragstaddstanek I believe that he saw token validation times tank as the table grew, which is what helped spark the discussion at the summit17:28
dstaneklbragstad: according to mfisch's blog post on the subject the logouts from horizon (and something else) have the greatest number of evernt17:28
samueldmqhenrynash: sure sir, please let me know, looking forward to review it17:28
lbragstaddstanek yeah, that sounds right17:28
lbragstaddstanek it was something that created *tons* of revocation events,17:28
lbragstadand that scaled up with token validations17:28
dstaneklbragstad: the real question is can we do something different in the algorithm for deleting old events? maybe limiting the deletes in a effort to stop table locking17:29
lbragstaddstanek at the summit we had a discussion around which revocation checks we could eliminate17:29
lbragstaddstanek we chose to remove the check for domain and project membership17:29
dstaneklbragstad: maybe i'll do some hacking on that over the weekend - but eliminating a very small percentage of the overall events may not be worth it17:29
lbragstaddstanek when you remove a user from a project or domain, a revocation event is stored to17:29
*** GB21 has quit IRC17:30
lbragstaddstanek that behavior is something that we get for free with fernet because we rebuild the user/project and user/domain relationships on token validation - so there is no need for a revocation event17:30
*** dansmith is now known as superdan17:31
lbragstaddstanek I want to say that we narrowed it down to a list of revocation events that we must keep - i'll try and dig those up17:31
dstaneklbragstad: i'm going to try to fix up https://review.openstack.org/#/c/127433/19 to get it through17:31
lbragstaddstanek related to bullet 1.3 here - https://etherpad.openstack.org/p/keystone-mitaka-summit-tokens17:33
*** ninag has joined #openstack-keystone17:34
lbragstadayoung was also a part of the conversation17:35
lbragstadayoung question for you - do you remember what revocation events we wanted to keep?17:35
*** diazjf has joined #openstack-keystone17:37
*** jsavak has quit IRC17:38
*** jsavak has joined #openstack-keystone17:38
openstackgerritNavid Pustchi proposed openstack/keystone: Disallow disabling the default domain  https://review.openstack.org/26006717:40
*** timcline has joined #openstack-keystone17:40
lbragstaddstanek opened a new bug - https://bugs.launchpad.net/keystone/+bug/153228017:43
openstackLaunchpad bug 1532280 in OpenStack Identity (keystone) "Fernet trust token is still valid when user's domain is disabled." [Undecided,New]17:43
lbragstadcc jorge_munoz ^17:43
dstaneklbragstad: i need to try to setup a test environment to run the benchmark17:44
notmorganstevemar: not sure why the reverts are failing gate. They worked.locally17:44
notmorganstevemar: will poke at them again shortly17:44
*** mhickey has quit IRC17:45
*** magalhaes has quit IRC17:47
mfischstevemar: is admin_token_auth the filter for the service token?17:51
mfischif so I'm curious why it's enabled in the public endpoint by default, calls using it to that endpoint don't seem to work, but its in the pipeline17:51
*** spandhe has joined #openstack-keystone17:53
openstackgerritRoxana Gherle proposed openstack/keystone: Allow '_' character in mapping_id value  https://review.openstack.org/26493717:54
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125317:57
*** spandhe has quit IRC17:58
*** doug-fis_ has joined #openstack-keystone17:58
*** doug-fis_ has quit IRC17:58
*** doug-fis_ has joined #openstack-keystone17:59
*** jbell8 has quit IRC18:00
*** lhcheng has joined #openstack-keystone18:00
*** ChanServ sets mode: +v lhcheng18:00
*** e0ne has quit IRC18:01
*** doug-fish has quit IRC18:01
*** dims_ has joined #openstack-keystone18:02
*** Madkiss_ has joined #openstack-keystone18:03
*** Madkiss has quit IRC18:03
*** henrynash has quit IRC18:03
*** doug-fis_ has quit IRC18:03
*** jbell8 has joined #openstack-keystone18:04
*** dims has quit IRC18:05
*** lhcheng has quit IRC18:05
*** doug-fish has joined #openstack-keystone18:12
*** doug-fish has quit IRC18:16
*** jasonsb has quit IRC18:20
*** spandhe has joined #openstack-keystone18:24
*** timcline_ has joined #openstack-keystone18:30
*** timcline has quit IRC18:30
notmorganmfisch: no it is meant for bootstrapping18:33
notmorganmfisch: it is a static token that is "admin" but has nothing else going one18:34
notmorganon*18:34
notmorganmfisch: so basically "i'm an admin, do things and trust me"18:34
notmorganmfisch: we're trying to deprecate it. hence the addition of keystone-manage bootstrap18:34
notmorganmfisch: in a real deployment you should not have admin_token in the pipeline at all once bootstrap is complete18:35
stevemarmfisch: what notmorgan said, it's what validates the "ADMIN_TOKEN" in keystone.conf18:36
notmorganstevemar: i'm not getting py27 failures locally. WTF.18:37
notmorganstevemar: in this revert.18:37
stevemarlol18:38
* notmorgan waits maybe not hit it yet.18:38
stevemarthats gonna be a joy to dbeug18:38
*** ninag has quit IRC18:38
notmorgani know i ran these full tests locally and got a pass which is why i'm baffled18:39
notmorganjust did a clean master checkout/cherry-pick18:39
notmorganand a new TOX env18:39
notmorganso.18:39
notmorganalso our tests are slow :()18:39
*** RichardRaseley has joined #openstack-keystone18:41
mfischnotmorgan: for bootstrapping though shouldnt it only need to be in the admin pipeline by default and not the public one?18:41
*** pgbridge has joined #openstack-keystone18:41
mfischthat was my real question18:41
*** ninag has joined #openstack-keystone18:41
notmorganmfisch: admin and public don't really matter18:41
notmorganthat is a bad v2 artifact18:41
notmorgani always recommend making them the same18:42
notmorganin mitaka it shouldn't matter anymore since we've compressed the routers entries into 1 entry basically you get "keystone"18:42
notmorganat least i think we compressed them down to 1 entry18:42
* notmorgan thinks samueldmq did that18:42
*** petertr7 is now known as petertr7_away18:43
RichardRaseleyI am having some issues assigning roles via keystoneclient in Python. As I understand, we should be able to do a `keystone.roles.grant(self, user, group, domain, project, os_inherit_extension_inherited, **kwargs)`. I am not familiar with what 'group' would be in this context. Could someone advise?18:44
*** ninag has quit IRC18:44
*** ninag has joined #openstack-keystone18:44
*** ninag has quit IRC18:45
raildoRichardRaseley: a group of users18:45
notmorganstevemar: ugh something changed since i wrote this patch18:45
notmorganstevemar: :(18:45
RichardRaseleyraildo: I am used to using the user, role, and project constructs. A 'group' in what context?18:45
notmorganor... some other subtle thing. i HATE our tests they are bloody impossible to debug cause they error with HTTP errors.18:45
raildoRichardRaseley: you can great a group, add users on this group, when you grant a role for this group, all the users inside this group will have this role18:46
notmorganand don't catpture the real log18:46
raildoRichardRaseley: would be group, role, project (the users inside this group will have this role on that project)18:46
RichardRaseleyraildo: When were groups introduced?18:47
notmorganstevemar: basically we're fialing in an opaque way now . fantastic :(18:47
notmorganstevemar: "need auth to validate a token" getting a 40118:47
notmorganthis passed when i wrote the patch18:47
RichardRaseleyraildo: I have an LDAP backend, and doing an `openstack group list` shows my LDAP groups. Nice.18:48
raildoRichardRaseley: Havana: https://wiki.openstack.org/wiki/ReleaseNotes/Havana#Domains.2C_Groups.2C_and_More:_Identity_API_v3_Support18:48
RichardRaseleyraildo: Anyhow, for my purposes I am assigning access to a specific individual, so I thought I could pass `None` for the group, but it didn't seem to like that. Let me find the error.18:49
*** aginwala has joined #openstack-keystone18:49
*** rderose has joined #openstack-keystone18:50
*** itlinux has joined #openstack-keystone18:53
baffleRichardRaseley: I've used Groups since Havana..18:57
RichardRaseleybaffle: I believe you. =]18:58
*** aginwala has quit IRC18:58
notmorganstevemar: found it. ayoung did more cleanup that locked down default domain. we're protecting ourselves in like 5 places against this since we fixed that bug19:01
notmorganstevemar: undoing ayoung's fixes as well now19:02
notmorganstevemar: this is not a pretty revert :(19:02
*** RichardRaseley has quit IRC19:03
*** jsavak has quit IRC19:03
*** tonytan4ever has quit IRC19:05
*** Ephur has joined #openstack-keystone19:08
*** fawadkhaliq has quit IRC19:08
notmorganayoung: ugh we rolled up so many fixed across so many patches to prevent issuing tokens for users outside of the default domain via v2 auth api. =(19:09
notmorganalso i noticed we are using 401s instead of 404s for validate19:11
ayoungnotmorgan, when did we do that?  It ws like, 3 years ago, IIRC19:11
notmorganthis is a huge mess19:11
notmorganayoung: nope we fixed the bug in liberty and backported it19:11
*** jasonsb has joined #openstack-keystone19:11
notmorganayoung: and people relied on it in production19:11
notmorganusing project-id user-id to auth19:11
ayoungYay!19:11
notmorganayoung: also you started raising 401s for token not-validated19:12
notmorganvs. 40419:13
notmorganwhich will cause middleware token churn19:13
*** rdo has quit IRC19:13
notmorganthis has become quite the rabbithole19:13
* notmorgan wonders if we can skip the trust token intermix outside of default domain.19:13
bknudson_lbragstad: answered your question in https://review.openstack.org/#/c/258141/419:14
bknudson_I'll admit it's still strange19:14
ayoungnotmorgan, check the bug on the 401 vs 404...19:14
*** aginwala has joined #openstack-keystone19:14
ayoungthere was a reason for that, and I think it *was* middleware churn19:15
notmorganayoung: yeah. the 404 is correct, 401 seems to have sneaked back in19:15
notmorganayoung: in some of our refactoring19:15
ayoungnotmorgan, what commits were those?  I was not doing cleanup for cleanups sake.19:17
notmorganthis one was actually in 201319:17
notmorganbut we started calling the method in another cleanup19:17
notmorganso we fail in weird ways19:17
notmorganbasically you did fix A, we did fix b, c, d, e and f, and now call functions from fix a19:17
notmorganand BOOM19:18
notmorganso i *think* i'm just going to exempt non-trust tokens19:18
*** timcline_ has quit IRC19:19
*** bradjones has quit IRC19:19
notmorganfor sanity/ease of solving the real issue and then i think we need to start expanding our execptions to not just be "Unauthorized" but "TokenValidationFailed" so this confusion stops between what exception to use when raising out and converting to a web-error19:19
*** bradjones has joined #openstack-keystone19:19
*** bradjones has quit IRC19:19
*** bradjones has joined #openstack-keystone19:19
*** timcline has joined #openstack-keystone19:19
*** rderose has quit IRC19:20
*** itlinux has quit IRC19:20
*** browne has quit IRC19:22
*** bradjones has quit IRC19:27
*** bradjones has joined #openstack-keystone19:28
*** bradjones has quit IRC19:28
*** bradjones has joined #openstack-keystone19:28
*** tonytan4ever has joined #openstack-keystone19:30
*** timcline_ has joined #openstack-keystone19:36
*** aginwala has quit IRC19:37
ayoungnotmorgan, "exempt non-trust tokens"  from what?19:38
notmorganayoung: the revert19:38
notmorganayoung: so you can again get a v2 token for a user in non-default domain. the fix we had broke behavior people relied on19:39
notmorganso we have to undo that fix19:39
notmorganyou can use user_id, and tenant_id to get a v2 token for non-v2 project or user19:39
*** petertr7_away is now known as petertr719:39
notmorganit's crappy, but maintaining behavior that real deployments use is important...19:40
ayoung"v2 token for a user in non-default domain"  So long as it is requested by userid, that should b OK19:40
notmorganyeah19:40
notmorganthats the idea19:40
*** timcline has quit IRC19:40
ayoungthe only issue is that username is not guarnateed to be unique across domains19:40
notmorganand i'm leaving trusts being locked out.19:40
ayoungwhy exempt trusts?19:40
ayoungI bet that breaks something19:40
notmorganbecause they already didn't work afaict19:40
ayounghmmmm19:40
notmorganthis is a very narrow edge case19:40
*** aginwala has joined #openstack-keystone19:40
notmorganwe had a bug that fixed it19:40
ayoungnotmorgan, I'll take your word19:41
notmorganin liberty for general tokens. i am trying to keep the revert as narrow as i can19:41
ayoungwhat was the commit that broke everything?19:41
notmorgana combination of like 3-5 of them19:41
notmorganthat refactored for fernet tokens19:41
notmorganand then closed a hole19:41
notmorganthis is a hand rolled revert19:41
notmorganbecause so much changed between when the fixes landed and when liberty shipped19:42
notmorganhttps://review.openstack.org/#/c/208069/19:42
notmorganthat was the final "break things" commit19:42
notmorganbut this is a rabbithole19:42
ayoungnotmorgan, so the ones I made were the commits back in 2013, nothing recent?19:43
notmorganyeah, we just started calling .assert_default_domain in new ways19:43
*** fawadkhaliq has joined #openstack-keystone19:43
notmorganso - your fixes/cleanup from 2013 is also "fixing" this bug in some cases19:43
openstackgerritMorgan Fainberg proposed openstack/keystone: Revert "Validate domain ownership for v2 tokens"  https://review.openstack.org/26500219:44
notmorganstevemar: ^ that should pass py27 now19:44
openstackgerritMorgan Fainberg proposed openstack/keystone: Revert "Validate domain ownership for v2 tokens"  https://review.openstack.org/26500219:45
*** timcline_ has quit IRC19:46
stevemarnotmorgan: thanks boss sauce19:47
*** rdo has joined #openstack-keystone19:47
*** timcline has joined #openstack-keystone19:47
stevemarnotmorgan: poke: https://review.openstack.org/#/c/259730/19:48
*** timcline has quit IRC19:49
*** timcline_ has joined #openstack-keystone19:49
*** lhcheng has joined #openstack-keystone19:49
*** ChanServ sets mode: +v lhcheng19:49
*** jbell8 has quit IRC19:50
notmorganstevemar: working on stable/liberty revert now19:50
notmorganand then kilo then i'll get to that review19:51
stevemarkk, nvm19:51
notmorganthese hand-rolled reverts are unfun19:51
*** diazjf has quit IRC19:51
stevemarmmhmm19:52
*** lhcheng has quit IRC19:54
*** jsavak has joined #openstack-keystone19:57
*** aginwala has quit IRC20:03
*** aginwala has joined #openstack-keystone20:05
*** timcline_ has quit IRC20:05
*** timcline has joined #openstack-keystone20:06
openstackgerritMorgan Fainberg proposed openstack/keystone: Add release note for revert of c4723550aa95be403ff591dd132c9024549eff10  https://review.openstack.org/26502420:06
openstackgerritMorgan Fainberg proposed openstack/keystone: Revert "Validate domain ownership for v2 tokens"  https://review.openstack.org/26500220:07
*** lhcheng has joined #openstack-keystone20:14
*** ChanServ sets mode: +v lhcheng20:14
openstackgerritayoung proposed openstack/keystone: SQL migrations for implied roles  https://review.openstack.org/26425920:16
ayoungwere hotels posted for the Austin Summit yet?20:17
*** fawadkhaliq has quit IRC20:17
*** fawadkhaliq has joined #openstack-keystone20:18
tjcocozzI am having trouble debugging in py34 anyone have any tips on how to have the code stop at a breakpoint?20:19
*** lhcheng has quit IRC20:19
*** jsavak has quit IRC20:21
*** jsavak has joined #openstack-keystone20:21
*** fawadkhaliq has quit IRC20:22
notmorganayoung: yes20:25
bknudson_tjcocozz: nosetests -s20:26
ayoungnotmorgan, thanks20:26
tjcocozzha i havn't tried the -s,  thank you bknudson_ it worked!20:27
lbragstadayoung i have a trust question20:28
ayounglbragstad, I have trust issues20:28
lbragstadayoung touche20:28
lbragstadayoung is there any reason why this shouldn't work - http://cdn.pasteraw.com/5pbraajahsqrhl5qagn4xkyu1tppje920:29
lbragstadthe creation of the trust fails20:29
lbragstadwith 403 - saying the user isn't allowed to create the trust, but I don't see why not20:29
ayounglbragstad, r = self.post('/OS-TRUST/trusts', body={'trust': trust_ref})  fails?20:30
lbragstadayoung yep20:30
* lbragstad grabs the trace20:30
lbragstadayoung http://cdn.pasteraw.com/l7b4cwmwe964lhzgeg3zi24rnknbm7w20:31
lbragstadayoung I double checked things through the self.assignment_api in the tests and the trustor has the self.role assigned to the new project (that should work, right?)20:31
ayoungYou are not authorized to perform the requested action: identity:create_trust  looks like an RBAC problem.  What is the policy rule in effect?20:32
lbragstadayoung the policy loaded is the default one stored in /home/lancebragstad/projects/keystone/etc/policy.json20:32
lbragstadso, whatever we keep in source?20:32
*** lhcheng has joined #openstack-keystone20:32
*** ChanServ sets mode: +v lhcheng20:32
lbragstadayoung - https://github.com/openstack/keystone/blob/master/etc/policy.json#L9920:33
ayoung"user_id:%(trust.trustor_user_id)s",20:33
lbragstadayoung yep20:33
lbragstadis that not right for what I'm trying to do?20:34
ayounglbragstad, wrong user making the call, then20:34
lbragstadayoung oh...20:34
ayounglbragstad, what user makes the call r = self.post('/OS-TRUST/trusts', body={'trust': trust_ref})20:34
lbragstadayoung I'm not sure - checking20:34
lbragstadI wonder if that is self.user20:34
ayounglbragstad, I think you need to get an explicit token for that user, and use it to make the call instead of the default.  I think you are right that it is self.user20:35
lbragstadbecause in other examples - self.user is used as the trustor and it seems to work fine20:35
lbragstadayoung let me try that quick20:35
*** diazjf has joined #openstack-keystone20:36
*** Daviey has joined #openstack-keystone20:38
*** henrynash has joined #openstack-keystone20:41
*** ChanServ sets mode: +v henrynash20:41
notmorganstevemar: -1 on the doc but because we need to explain how to get the admin token now with openstack token issue i think20:41
notmorganstevemar: otherwise looks good.20:42
notmorganstevemar: can't use username/password until there is a keystone catalog entry20:42
*** lhcheng_ has joined #openstack-keystone20:42
notmorganat least afaik20:42
stevemars/the admin token/any token20:42
notmorganstevemar: yes. get the token for the user just created20:42
notmorganbecause bootstrap doesn't return that since it doesn't actually have a running keystone20:42
notmorgando you want me to toss in a way to output (JSON?) for the created/not-created[idempotent] user/role/etc20:43
notmorganor are we good with it as is for now?20:43
htrutabknudson_: are you around?20:44
bknudson_seems broken that you can't use username/password just because there's no catalog entry20:44
bknudson_htruta: yes20:44
*** lhcheng has quit IRC20:44
htrutabknudson_: regarding this comment here: https://review.openstack.org/#/c/134095/14/keystone/catalog/core.py is moving this logic to the sql backend ok?20:45
htrutacatching the DBDuplicateEntry there and raise the Conflict20:45
bknudson_htruta: I guess so. I can't think of a better way20:46
notmorganbknudson_: also your eyes on the revert for master would be welcome20:46
notmorganbknudson_: since it's hand-rolled due to $oh-god-so-much-changed$20:46
notmorganbknudson_: i want to make sure it's not going to cause us other issues down the line.20:47
ayounghenrynash, why do you feel the need to prepend the work Implement to your patches?20:47
ayoungOr my patches in this case?20:47
*** aginwala has quit IRC20:47
htrutabknudson_: ok, just wondered if it really was a backend responsibility, but couldn't find a better way either. thanks20:47
henrynashayoung: in the commit comment?20:48
ayoungYeah20:48
ayounghenrynash, I just ask cuz it keeps messing me up searching for my patches20:48
ayoungI like to keep the titles succinct20:48
henrynashayoung: I just think it helps reviews understand what’s in a patch (especiiay when an overall bp is spread over several patches)20:48
lhcheng_htruta: I did the same thing in this patch: https://review.openstack.org/#/c/265279/20:49
ayounghenrynash, dstanek BTW https://review.openstack.org/#/c/264259/5..6/keystone/common/sql/migrate_repo/versions/087_implied_roles.py   I removed the spurious comment and resubbmited, since it failed grenade20:49
htrutalhcheng_: nice! will base on that20:50
ayounghenrynash, I'd rather you not add extra words to the top commit line. When doing a git log, words like implement etc don't help with searches.  Cleaning up the messages themselves, OTOH, is greatly appreciated20:51
henrynashayoung: Ok, for the commit line, i’ll keep succinct :-)20:51
ayoungthanks, henrynash .  Was your last commit just a rebase other than that?20:52
henrynashayoung: and not change it agian, promise, scouts-honor etc.20:52
henrynashayoung: the very last one added some new tests20:52
henrynashin test_backend.py20:52
ayoungOK. looking20:53
henrynashayoung: actually, sorry, the VERY last change was a pur rebase20:53
henrynashayoung: patch 7 added the tetss20:53
ayounghenrynash, it is a two level tree, why do you think three>20:53
ayoung?20:53
ayoungDoH20:54
* ayoung sorry20:54
henrynashayoung: my misguided thoughts I can never decide if you should call it two or three level20:54
ayoungI was counting the relationships. Your way makes much mores sense20:54
ayounghenrynash, I really like that last test: test_role_assignments_inherited_implied_roles20:56
henrynashayoung: yeah, thought we had to do something like that…that was one of the new ones I added in patch 720:57
openstackgerritayoung proposed openstack/keystone: Implement manager and backend changes for implied roles  https://review.openstack.org/26426020:57
ayoungminor typo...edited on the page.  I like that feature20:57
*** daemontool has joined #openstack-keystone20:59
stevemarits not too shabby21:00
henrynashayuong: thx21:00
stevemarnotmorgan: meh21:01
stevemarnotmorgan: we do need a way to output stuff for config tools like puppet21:01
notmorganstevemar: yeah.21:01
*** aginwala has joined #openstack-keystone21:04
*** pauloewerton has quit IRC21:08
*** timcline_ has joined #openstack-keystone21:11
*** timcline has quit IRC21:12
*** jbell8 has joined #openstack-keystone21:14
*** raildo is now known as raildo-afk21:17
*** edmondsw has quit IRC21:17
*** aginwala has quit IRC21:17
*** RichardRaseley has joined #openstack-keystone21:21
*** aginwala has joined #openstack-keystone21:22
RichardRaseleyHello. I am having some issues assigning roles using python-keystoneclient. Here is my existing code, please forgive any amateurish mistakes: http://paste.openstack.org/show/483350/21:22
RichardRaseleyThe code can be found in the `openstack_assign_role` function.21:23
*** jsavak has quit IRC21:24
*** topol has quit IRC21:24
*** daemontool has quit IRC21:27
*** phalmos has quit IRC21:28
*** daemontool has joined #openstack-keystone21:32
*** roxanagh_ has quit IRC21:32
RichardRaseleyI seem to be getting a ' No handlers could be found for logger "keystoneclient.utils" ' in the above-mentioned script. I am not sure what is causing this or how to remedy it, any help would be appreciated.21:39
*** diazjf has quit IRC21:39
*** roxanagh_ has joined #openstack-keystone21:40
openstackgerritLance Bragstad proposed openstack/keystone: Expose bug with fernet and trusts  https://review.openstack.org/26545521:43
lbragstadayoung pushed my wip for now - i'll dig back into it21:43
*** aginwala has quit IRC21:44
*** slberger has quit IRC21:45
*** aginwala has joined #openstack-keystone21:48
openstackgerritMerged openstack/keystone: Wrong usage of "an"  https://review.openstack.org/26506621:54
*** slberger has joined #openstack-keystone21:55
openstackgerritMerged openstack/keystone: Correct DN/encoding in test  https://review.openstack.org/26073121:56
*** jsavak has joined #openstack-keystone22:02
*** jsavak has quit IRC22:06
*** jsavak has joined #openstack-keystone22:08
*** jbell8 has quit IRC22:09
RichardRaseleyIs this (http://docs.openstack.org/developer/python-keystoneclient/api/keystoneclient.v3.html#keystoneclient.v3.roles.RoleManager.list) expecting the project ID? Doesn't seem to like the name.22:12
*** timcline_ has quit IRC22:29
*** timcline has joined #openstack-keystone22:29
*** timcline_ has joined #openstack-keystone22:31
*** timcline has quit IRC22:34
*** petertr7 is now known as petertr7_away22:34
lhcheng_RichardRaseley: should be passing IDs. Even for the role.grant() call, it should be passing role_id not name (_member_)22:36
*** aginwala has quit IRC22:39
RichardRaseleyihcheng_: OK22:41
RichardRaseleyThanks22:41
*** aginwala has joined #openstack-keystone22:43
*** roxanagh_ has quit IRC22:44
*** RichardRaseley has quit IRC22:44
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125322:45
tjcocozzbknudson_, Do these comments make more senese ^^22:47
*** diazjf has joined #openstack-keystone22:47
bknudson_tjcocozz: yes.22:49
tjcocozzbknudson_, awesome.  test_middleware.py is tricky to debug.  The stack trace didn't start at the test i was running, so it took me almost all day to fill in the gaps.22:51
*** roxanagh_ has joined #openstack-keystone22:51
*** lhcheng_ has quit IRC22:51
openstackgerritBrant Knudson proposed openstack/keystone: Escape DN in enabled query  https://review.openstack.org/26233422:54
openstackgerritBrant Knudson proposed openstack/keystone: Test enabled emulation with special user_tree_dn  https://review.openstack.org/26546222:54
*** timcline_ has quit IRC22:54
*** jsavak has quit IRC22:58
*** slberger has left #openstack-keystone22:58
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125322:59
*** roxanagh_ has quit IRC23:01
openstackgerritMerged openstack/keystone: Reference driver methods through the Manager  https://review.openstack.org/26495823:02
tjcocozzbknudson_, running py34 now. hopefully the right patch will be up shortly23:02
*** diazjf has quit IRC23:02
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125323:04
openstackgerritTom Cocozzello proposed openstack/keystone: Replace unicode with six.text_type  https://review.openstack.org/26125323:06
*** roxanagh_ has joined #openstack-keystone23:07
*** phalmos has joined #openstack-keystone23:07
*** sigmavirus24 is now known as sigmavirus24_awa23:13
*** lhcheng has joined #openstack-keystone23:13
*** ChanServ sets mode: +v lhcheng23:13
*** aginwala has quit IRC23:13
*** csoukup has quit IRC23:16
*** roxanagh_ has quit IRC23:18
*** jbell8 has joined #openstack-keystone23:18
*** tonytan4ever has quit IRC23:19
*** roxanagh_ has joined #openstack-keystone23:21
*** vgridnev has quit IRC23:22
*** aginwala has joined #openstack-keystone23:22
*** slberger has joined #openstack-keystone23:30
*** KarthikB has quit IRC23:33
*** jasonsb has quit IRC23:44
*** gordc has quit IRC23:47
*** itlinux has joined #openstack-keystone23:47
*** annasort has quit IRC23:53
*** pgbridge has quit IRC23:55
notmorgantjcocozz: welcome to crappy tests :(23:58
notmorganwe have a lot of them23:58
*** topol has joined #openstack-keystone23:59
*** ChanServ sets mode: +v topol23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!