Monday, 2016-02-08

*** henrynash has joined #openstack-keystone00:05
*** ChanServ sets mode: +v henrynash00:05
*** henrynash has quit IRC00:06
*** clenimar has quit IRC00:07
*** darrenc_afk is now known as darrenc00:13
*** erlarese has joined #openstack-keystone00:13
*** gildub has joined #openstack-keystone00:19
*** jsavak has joined #openstack-keystone00:23
*** chlong has joined #openstack-keystone00:26
*** mylu has quit IRC00:31
*** gildub has quit IRC00:33
*** jsavak has quit IRC00:50
*** jsavak has joined #openstack-keystone00:50
*** gildub has joined #openstack-keystone00:50
*** gildub has quit IRC00:58
*** dims has quit IRC01:01
*** chlong has quit IRC01:03
*** mylu has joined #openstack-keystone01:05
*** su_zhang has joined #openstack-keystone01:11
*** jsavak has quit IRC01:15
*** gildub has joined #openstack-keystone01:15
*** shoutm_ has joined #openstack-keystone01:15
*** jsavak has joined #openstack-keystone01:17
*** shoutm has quit IRC01:17
*** shoutm has joined #openstack-keystone01:18
*** shoutm_ has quit IRC01:20
*** dims has joined #openstack-keystone01:24
*** dims has quit IRC01:46
*** EinstCrazy has joined #openstack-keystone01:50
*** shoutm has quit IRC01:53
*** shoutm has joined #openstack-keystone01:54
notmorganzzzeek: is there an easy way to pile tests on top of a PR on bitbucket? [I really might be spoiled by gerrit]01:54
*** EinstCrazy has quit IRC01:54
*** mylu has quit IRC01:57
*** mylu has joined #openstack-keystone01:58
*** jsavak has quit IRC02:02
*** chlong has joined #openstack-keystone02:06
*** su_zhang has quit IRC02:07
*** daemontool has quit IRC02:12
*** daemontool has joined #openstack-keystone02:13
*** su_zhang has joined #openstack-keystone02:23
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updated from global requirements  https://review.openstack.org/27723102:39
openstackgerritOpenStack Proposal Bot proposed openstack/keystoneauth: Updated from global requirements  https://review.openstack.org/27723202:39
*** oomichi has quit IRC02:43
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/27282502:43
*** daemontool has quit IRC02:47
*** samueldm1 has quit IRC02:47
*** erlarese has quit IRC02:49
*** roxanagh_ has joined #openstack-keystone02:52
*** roxanagh_ has quit IRC02:56
*** roxanagh_ has joined #openstack-keystone02:58
*** roxanagh_ has quit IRC03:09
*** dims has joined #openstack-keystone03:13
*** mylu has quit IRC03:17
*** mylu has joined #openstack-keystone03:17
*** roxanagh_ has joined #openstack-keystone03:20
*** roxanagh_ has quit IRC03:20
*** roxanagh_ has joined #openstack-keystone03:20
*** gildub has quit IRC03:25
*** mylu has quit IRC03:27
*** mylu has joined #openstack-keystone03:28
*** mylu has quit IRC03:29
*** mylu has joined #openstack-keystone03:31
*** mylu has quit IRC03:32
*** mylu has joined #openstack-keystone03:34
*** mylu has quit IRC03:35
*** dims has quit IRC03:35
*** mylu has joined #openstack-keystone03:36
*** daemontool has joined #openstack-keystone03:38
ayoungjamielennox, do you have code I could build on to do the client part of implied roles?03:41
jamielennoxayoung: i was away all last week so i haven't had a chance to re-test the patch with the new routes03:41
jamielennoxayoung: though i saw it got merged03:41
ayoungjamielennox, can I have your test code? I assume it is the core of what the client needs.03:42
jamielennoxayoung: i can give you the script i was using, but i don't think it will help any more that just copying similar code from the other managers03:42
*** dims has joined #openstack-keystone03:42
ayoungOK03:42
ayoungjust wanted to make sure I wasn't duplicating.03:42
ayoungI tested a live server with curl.03:42
ayoungOh, by the way, I used Kolla to set it up. Its the future03:42
ayoungansible and docker03:42
ayoungKept me from having to reproduce the setup myself03:43
ayoungimaginge devstack, but each service running in a container instead of a screen window.  Keeps you from polluting your system03:44
jamielennoxayoung: i had a go at kolla - for whatever reason something got in the way of me using it properly03:44
jamielennoxi'm guessing it wsa something transient and i tried it at a bad time03:44
ayoungjamielennox, I spent some time in #kolla with the devs and there were certainly gotchas03:44
ayoungI had them walk me through it, and there is at least one bug in flight03:45
ayoungplus I had to briefly disable selinux, and I am not certain I accept their rationale for it, but I'll look deeper into that this week03:45
ayoungI shut off everything but keystone and mysql, so I didn;t trip over the nova issues, but those will be a show stopper on Fedora03:46
*** EinstCrazy has joined #openstack-keystone03:46
jamielennoxayoung: oh? i would have thought selinux support would be one of the best parts about kolla03:47
jamielennoxcause you just label the whole container and be done03:47
ayoungI was able to reenable it once the container was running, but they do something as a non-root user out of paranoia03:48
ayoungand its just backwards afaict03:48
ayoungbut it was only when launching  the container, once it was up and running I reenabled enforcing and it ran fine03:48
jamielennoxhttp://paste.openstack.org/show/484619/ is what i had - or the last copy i can find03:48
jamielennoxi can't find it on disk, but first hit in my history03:49
ayoungjamielennox, Cool, I'll give that a run.03:50
ayoungI think I can hack out the client side tomorrow,03:50
ayoungalthough ,we have snow coming, and thie kids will be home...maybe later than tomorrow.03:51
*** shoutm_ has joined #openstack-keystone03:51
*** EinstCrazy has quit IRC03:51
*** shoutm has quit IRC03:53
*** shoutm has joined #openstack-keystone03:54
*** shoutm_ has quit IRC03:57
*** gildub has joined #openstack-keystone03:58
*** esp has joined #openstack-keystone04:03
notmorganayoung: have fun snow-wise04:07
notmorganstevemar: https://review.openstack.org/#/c/275327/04:07
ayoungnotmorgan, I'm hoping to get out on the X-country skis.04:07
notmorganayoung: nice04:07
notmorganayoung: i am hoping to swing out to NH later this month for snowboarding w/ friends04:07
ayoungExcellent!04:08
ayoungWhereabouts?04:08
*** dims has quit IRC04:08
notmorganno idea. have to check w/ friends are living, they move down from Bangor maine04:08
notmorganso, not sure where they are now04:08
ayoungnotmorgan, If the snow hits like it is suppose to tomorrow, there should be a pretty good base.04:09
ayoungIts been warm04:09
notmorganyeah04:09
ayoungwe hd a bunch on Friday (no school) and more tomorrow (no school again)04:09
notmorganayoung: should be a quick review: https://review.openstack.org/#/c/276079/ - just needs a second pair of eyes (basically do a migrate before and after and compare schema)04:10
notmorgan(clean migrate that is)04:10
notmorganeach time.04:11
ayoungnotmorgan, ugh...not a quick one04:11
notmorganjamielennox: so, session deprecation, if we make it warn once - [e.g. on import] that will work (in KSC) but we can warn on each-and-every instantiation04:12
notmorganayoung: i did the migrate to 2 different DBs04:12
notmorganthen mysqldump --skip-opt <db> > file04:12
ayoungnotmorgan, and all the tests run...04:12
ayoungah....04:12
notmorganthen diff -u <file1 from pre-squash> then <file2_post_squash>04:12
notmorganno testing needed, just keystone-manage- db_sync04:13
notmorganwe know the tests pass, gate has said so :)04:13
ayoungnotmorgan, OK... I can accept that04:13
ayounglet me look at the final migration for a visual to not be a rubber stamp...04:14
notmorganyep.04:14
*** links has joined #openstack-keystone04:14
*** mylu has quit IRC04:15
ayoungOK...so now git thinkgs 67 is a renamed 44, but with some changes...that is heartening04:15
notmorganyeah. :)04:15
*** mylu has joined #openstack-keystone04:16
ayoung+ can get behind that one04:16
notmorgani already made sure steve covered the issues with the squash before +2ing it04:17
ayoungnotmorgan, I want to build functional test based on Kolla.  I think it is better approach than devstack for LDAP and alternative live databases and the like04:17
notmorganwhatever is the functional base, it should be something zuul knows how to do04:18
notmorgannot something encoded in our unit tests04:18
notmorganor whatever.04:18
notmorganyou can have a helper script, but zuul should be leveraged not "tox -e<thing>"04:18
notmorganif i am not mis-reading what you're proposing04:19
ayoungnotmorgan, so, I think that will work.  I'm still learning Kolla, but it is setting up everything using ansible, and there are a handful of scripts for kicking things off that part part of kolla04:19
ayoungpretty sure tox is only used for Kolla testing.04:19
ayounger, unit testing04:20
notmorganright04:20
notmorganas it should be04:20
notmorganwe should be moving restfultestcase -> something like you're describing, not conintuing with the pattern.04:20
notmorganit'll mean we have to hang onto eventlet for a bit longer until dstanek finishes the other thing or you get this new thing working04:21
ayoungWe should talk with the Kolla team at the summit, and see if we can make some headway on this.  I think that we could get tests for SAML and LDAP04:21
notmorganbut not eventlet in production-y things.04:21
ayoungNope.04:21
ayoungthis was all Keystione Apache HTTPD04:21
ayoungKolla is docker.  You Run keystone in its own container04:21
notmorganright, once we get this thing or dstanek's thing working to eliminate the in-process eventlet server for testing, we'll be in better shape04:22
ayoungah...I didn't know he was working on that, but not surprised.04:22
notmorganhe is working on the test-case spinning up an isolated keystone instance when needed not "on every testcase"04:22
notmorganand in it's own process, so it doesn't need to be eventlet04:23
* notmorgan tries to figure out how to roll authcontext, url_normalize, and json_body into the main service_objects now04:24
notmorganthat'll make our pipeline basically <oslo_things> <keystone>04:24
notmorganand we get to define things in code instead of paste-ini awfulness04:25
*** david-lyle has quit IRC04:30
*** dstanek has quit IRC04:31
*** spandhe has joined #openstack-keystone04:32
*** dstanek has joined #openstack-keystone04:33
*** ChanServ sets mode: +v dstanek04:33
jamielennoxnotmorgan, ayoung: sorry wasn't paying attention04:34
ayoungjamielennox, NP...I'm really just writing up my notes on running Kolla thing right now.  We can discuss later this week.04:34
jamielennoxwhy should kolla mean anything about eventlet?04:34
jamielennoxi'm told it's fairly normal to use httpd within a container04:35
*** jidar_ has joined #openstack-keystone04:38
*** jidar has quit IRC04:38
*** ktychkova has quit IRC04:38
*** ktychkova_ has joined #openstack-keystone04:38
*** jidar_ is now known as jidar04:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Mark the ExtensionRouter deprecated  https://review.openstack.org/27728004:44
*** david-lyle has joined #openstack-keystone04:45
ayoungjamielennox, I was confused.  Kolla does HTTP.  It was the functional testing holding us on Eventlet the way it is written now04:53
*** Nirupama has joined #openstack-keystone04:57
*** spandhe has quit IRC05:14
stevemarayoung: i need some ldap expertise on this patch: https://review.openstack.org/#/c/228644/05:26
stevemarnotmorgan: if you're around, this one can be punted through: https://review.openstack.org/#/c/264475/05:26
notmorganstevemar: moment, almost done refactoring things so we have authcontextmiddleware, jsonbody, and url_normalizer built-in05:27
*** roxanagh_ has quit IRC05:35
*** roxanagh_ has joined #openstack-keystone05:36
*** roxanagh_ has quit IRC05:37
*** roxanagh_ has joined #openstack-keystone05:37
notmorganstevemar: our circular dependencies for imports is awful05:41
*** Nirupama has quit IRC05:43
*** roxanagh_ has quit IRC05:44
*** spandhe has joined #openstack-keystone05:49
*** su_zhang has quit IRC05:50
openstackgerritMerged openstack/keystoneauth: Updated from global requirements  https://review.openstack.org/27723205:51
*** lhcheng has quit IRC05:55
*** Nirupama has joined #openstack-keystone05:56
*** mylu has quit IRC05:58
stevemarnotmorgan: they are awful06:21
*** nkinder has joined #openstack-keystone06:23
*** petertr7_away has quit IRC06:25
*** petertr7_away has joined #openstack-keystone06:26
*** petertr7_away is now known as petertr706:26
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Imported Translations from Zanata  https://review.openstack.org/27551706:30
*** nkinder has quit IRC06:39
*** su_zhang has joined #openstack-keystone06:44
*** roxanagh_ has joined #openstack-keystone06:44
openstackgerritSteve Martinelli proposed openstack/keystone: Mark the ExtensionRouter deprecated  https://review.openstack.org/27728006:48
*** roxanagh_ has quit IRC06:50
*** esp has quit IRC06:53
*** daemontool has quit IRC06:53
*** daemontool has joined #openstack-keystone06:54
*** EinstCrazy has joined #openstack-keystone06:56
*** gildub has quit IRC06:56
*** daemontool has quit IRC06:58
*** lhcheng has joined #openstack-keystone07:01
*** ChanServ sets mode: +v lhcheng07:01
*** EinstCrazy has quit IRC07:02
*** chlong has quit IRC07:03
*** oomichi has joined #openstack-keystone07:12
*** belmoreira has joined #openstack-keystone07:14
*** jbell8 has joined #openstack-keystone07:15
stevemarnotmorgan: that enginefacade change, oyyyy07:24
openstackgerritMerged openstack/keystone: Set deprecated_reason on deprecated config options  https://review.openstack.org/26447507:28
openstackgerritMerged openstack/keystone: squash migrations - kilo  https://review.openstack.org/27607907:28
*** jbell8 has quit IRC07:29
*** jbell8 has joined #openstack-keystone07:29
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/26947907:30
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/26947907:31
*** jbell8 has quit IRC07:37
*** jbell8 has joined #openstack-keystone07:38
*** nkinder has joined #openstack-keystone07:44
*** roxanagh_ has joined #openstack-keystone07:47
*** roxanagh_ has quit IRC07:52
*** Nirupama has quit IRC07:53
*** jaosorior has joined #openstack-keystone07:57
*** jbell8 has quit IRC08:04
*** sinese has joined #openstack-keystone08:04
*** jbell8 has joined #openstack-keystone08:05
*** jaosorior has quit IRC08:05
*** Nirupama has joined #openstack-keystone08:07
*** rcernin has joined #openstack-keystone08:09
*** jaosorior has joined #openstack-keystone08:13
*** shoutm_ has joined #openstack-keystone08:17
*** shoutm has quit IRC08:19
*** su_zhang has quit IRC08:21
odyssey4menotmorgan ayoung what LDAP/SAML testing are you looking to do? OpenStack-Ansible already has functional testing in place and it's a short step to do either - I'm already working on a functionally tested gate with a DSBE, and we already have configs in place for SAML too so it'll be easy enough to do a gate test there too.08:24
*** spandhe has quit IRC08:29
openstackgerritMerged openstack/keystone: Imported Translations from Zanata  https://review.openstack.org/27551708:31
*** shoutm_ has quit IRC08:32
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/26947908:33
*** jistr has joined #openstack-keystone08:33
*** jistr is now known as jistr|sick08:33
*** shoutm has joined #openstack-keystone08:33
*** fhubik has joined #openstack-keystone08:42
*** fhubik is now known as fhubik_brb08:43
*** chlong has joined #openstack-keystone08:48
openstackgerritSteve Martinelli proposed openstack/keystone: add a test that uses trusts and implies roles  https://review.openstack.org/27731908:48
*** roxanagh_ has joined #openstack-keystone08:49
*** fhubik_brb is now known as fhubik08:50
*** shoutm_ has joined #openstack-keystone08:50
*** shoutm has quit IRC08:51
*** roxanagh_ has quit IRC08:54
*** jaosorior has quit IRC08:57
*** EinstCrazy has joined #openstack-keystone09:01
*** openstackgerrit has quit IRC09:02
*** openstackgerrit has joined #openstack-keystone09:02
*** josecastroleon has quit IRC09:03
*** jaosorior has joined #openstack-keystone09:03
*** fhubik is now known as fhubik_brb09:06
*** EinstCrazy has quit IRC09:06
*** fhubik_brb is now known as fhubik09:12
*** tomoiaga has joined #openstack-keystone09:15
tomoiagaBefore I start to write a simple auth plugin, I can't seem to find any information related to this, maybe someone can help. Is there a way to use an "cloud admin" token to generate a token for a normal user ? (impersonation mainly)09:18
*** fhubik is now known as fhubik_brb09:29
*** mhickey has joined #openstack-keystone09:34
*** shoutm has joined #openstack-keystone09:43
*** shoutm_ has quit IRC09:45
marekdtomoiaga: are you talkin about ADMIN_TOKEN ?09:45
*** fhubik_brb is now known as fhubik09:49
*** mvk has joined #openstack-keystone09:50
*** roxanagh_ has joined #openstack-keystone09:50
*** roxanagh_ has quit IRC09:55
*** mariusv has joined #openstack-keystone09:58
*** henrynash has joined #openstack-keystone09:59
*** ChanServ sets mode: +v henrynash09:59
*** jbell8 has quit IRC10:00
*** josecastroleon has joined #openstack-keystone10:00
*** jbell8 has joined #openstack-keystone10:01
tomoiagamarekd: I am hoping that I may be able, using an admin token (a token for a user with admin privileges over a tenant, trying to avoid the ADMIN_TOKEN) I may be able to issue a token for another user (as if the user were to log in with his credentials). Users login to my system and I want to issue tokens for them (right now I just scope my "admin" token to a project "belonging" to a user).10:02
bretonthere are trusts with redelegation10:04
tomoiagaif anyone knows cPanel for example, it allows you to do that. I am sure there are other sistems out there allowing the same thing. This exists to allow someone to easily integrate.10:04
*** richm has joined #openstack-keystone10:05
tomoiagabreton: the way I understand trusts, is that it requires the user to actually login with his openstack credentials before being able issue any actions on behalf of an "admin" or some other user. I may be wrong. I'll try to read more abot redelegation10:06
marekdtomoiaga: breton is right10:08
marekdtomoiaga: so admin needs to authenticate.10:09
marekdtomoiaga: but in general trusts, maybe oauth2 should be what you are looking for.10:10
marekdwhy would you always allow users to impersonate other users?10:10
tomoiagamarekd: indeed, oauth2 or finally integrate my system and openstack with ldap for example, should be the "right" thing to do (federation in the end). However, I am trying something simpler. I have my system with users already in place (it's a Django app, and…) and I can store openstack credentials for an "admin" (which may be bad, but let's go with it). Users log in to my system and should be able to issue api calls to openstack with10:14
tomoiagaI may be wrong in trying to avoid too much the federation support in openstack10:18
bretonfederation is simple10:19
bretonespecially for your use case10:20
tomoiagabreton: I'll dig a little deeper. My problem is that Django doesn't seem to have support for what I need, unless I install third party apps or do federation in a better way (ldap, and all). I guess I am just tired of installing too many daemons and "complicate" the setup.10:21
tomoiagabreton, marekd: thank you!10:24
openstackgerritRudolf Vriend proposed openstack/keystone: Adds user_description_attribute mapping support to the LDAP backend  https://review.openstack.org/27687310:26
*** gildub has joined #openstack-keystone10:28
marekdtomoiaga: federation?10:31
marekdtomoiaga: it's still not you are looking for as far as I understand your use case10:31
notmorganmarekd: oh hai10:33
marekdnotmorgan: bonjour, monsieur Morgan!10:34
marekdwhat's up?10:34
notmorganodyssey4me: the LDAP/SAML testing needs to be built into the gate jobs. the SAML one should have a SAML2 provider and also check the k2k SAML2 auth. it's not a small amount of work or "easy to just do via ansible"10:34
notmorganmarekd: late night work :P10:34
marekdnotmorgan: :(10:35
marekdodyssey4me: he's right10:35
notmorganalso happy to have ditched apple... sitting on an apple laptop, and the fact that "24 hour clock is disabled by language/region settings" makes me sad.10:36
marekdnotmorgan: why would it make you sad?10:36
notmorganmarekd: thanks apple for disabling an opt-in option because "users are too dumb to read 24 hour clock"10:36
marekdnotmorgan: i mean, it's sad when machine tries to be smarter thei its users but..did it really bother you? I thought you have 12h (and am/pm) clocks in the US...10:37
notmorganmarekd: it's idiotic to disable an option based on regional settings like currency notation/language10:37
notmorganmarekd: i use 24 hr clocks for everything, have for years10:37
marekdnotmorgan: and how are you feeling with ubuntu vs MacOSX?10:37
marekdnotmorgan: in fact i starter to think about getting MacBook10:38
marekdi've never had any10:38
notmorganmarekd: ubuntu is actually, imo, more usable except when it comes to some minor things10:38
notmorganx1-carbon w/ 15.10 on it is damn nice10:38
notmorgan:)10:38
notmorganthough next install might be debian vs ubuntu10:38
marekduh, why debian10:38
notmorganfor $opensource$ reasons10:38
marekdwhat's ubuntu doing wrong?10:39
notmorganand depending on how unity 8 ends up10:39
marekdi have debian and ubuntu on desktop and laptops10:39
marekdactually ended up with some problems with debian10:39
marekdbut i was using testing branch10:39
notmorganlike i said, might change10:39
marekdbecause....no for kernel 2.6 or something :P10:39
notmorganmarekd: so.. doyou have a little code review bandwidth?10:39
marekdi do10:40
notmorganwoo10:40
odyssey4menotmorgan I don't expect that would would be easy to do, necessarily... I'm just saying that we already have a multi-node keystone testing job setup - it may be *relatively* simple to setup a specific gate test for it10:40
marekdodyssey4me: oh, that's interesting10:40
odyssey4mewe're splitting out our keystone role anyway, so we'll be able to setup keystone-specific gate tests on the role - and perhaps keystone could make use of the role repo for testing purposes too10:41
notmorganhttps://review.openstack.org/#/c/272007/ https://review.openstack.org/#/c/274489/ (<--- and if you're brave the rest of the chain), and https://review.openstack.org/#/c/274085/10:41
odyssey4meI'd like the role test to implement tempest tests as far as possible, so some help to make that happen would be great.10:41
notmorganodyssey4me: right. we have multinode but we need an LDAP server populated with sane things [we don't have that and don't do write-ldap via keystone anymore], and the SAML2 providers are either highly synthetic or hard to automate setup, see populated interesting info10:42
marekdnotmorgan: starred them, let me just finish patch i am working on and i will get straight to your patches10:42
odyssey4meI'll check with cloudnull when he's online how far he is with the role repo split, as that will make work like this far simpler.10:42
notmorganmarekd: the deprecation whole chain is a bit dense.10:42
notmorganmarekd: the user/admin_crud move should also be non-controversial10:42
marekdnotmorgan: okay10:42
notmorganodyssey4me: aye.10:43
notmorganmarekd: i almost have a patchset ready for merging authcontextmiddleware, token_auth, json_body, and url_normalizer into the __call__ function of the router class, so we reduce the things in our paste pipleline significantly10:44
notmorganlike... 3 items per pipeline: sizelimit request_id [api_admin|api_public|service_v3]10:45
notmorganit's MUCH cleaner10:45
marekdnotmorgan: oh, nice10:45
marekdi am going to finish filters for service providers soon (i hope so)10:45
marekdit's a pain in the back....10:45
notmorganour filtering code is brain-breaking complex10:45
notmorgannext fix will be to break out @protected and @filterprotected decorators10:46
notmorganso we stop trying to do magic10:46
marekdyeah, there is definitely too much of magic10:46
notmorganand just call .enforce where we *should* be callint it10:46
notmorgancalling it*10:46
*** shoutm_ has joined #openstack-keystone10:46
notmorganthat should ease some of the next steps in newton10:47
marekdnotmorgan: hm, ever wondered on how to make DB calls across managers within a db transaction?10:47
notmorganmarekd: don't.10:47
marekdnotmorgan: why, it's just..."you don do this that way"10:47
notmorganmarekd: validate once, if it is valid assume it is valid, if you're across managers the backends are not the same.10:47
notmorganso you can't enforce transactionality, you can ensure only atomicity within a single manager/backend10:48
marekdnotmorgan: ah, multi backend stuff10:48
notmorganyep10:48
*** shoutm has quit IRC10:48
notmorganso if i need to get a user, i check the user exists and then if i need to act in assignment, i have to assume the user data is valid, it can race10:49
marekdwell, i can see it's resolved in the manager/controller level10:49
marekdwhich clearly exposes us to data races.10:49
notmorganonly sortof10:49
marekdwhy sortof?10:49
notmorganright10:49
notmorgansortof resolved10:49
notmorganbecause of races10:49
notmorgan:)10:49
notmorgandata races are fine, if we have some orphaned data because of it, really we can write something to do cleanup10:50
notmorganthe worst thing we get is either an erroneous failure because data wasn't yet populated [rare], or orphaned data that is useless because we use auto-gen ids mostly10:51
notmorganboth are safe.10:51
notmorganin most cases.10:51
*** roxanagh_ has joined #openstack-keystone10:51
notmorganand if they aren't we should make sure they are10:51
marekdsure10:51
*** e0ne has joined #openstack-keystone10:53
marekdnotmorgan: what's actually json home for?10:55
notmorganallows for discoverability10:55
*** roxanagh_ has quit IRC10:55
notmorganbetter than random thing we built outselves10:55
notmorganit's one of those "standards we can use"10:56
marekdyeah10:56
marekdbut where do i see it?10:56
notmorganon like /10:56
marekdor how to use that discoverability10:56
notmorganit's all of our "what is here" things10:56
notmorganwe used to have a home-grown-ish-thing10:56
*** lhcheng has quit IRC10:59
*** fhubik is now known as fhubik_brb11:00
*** pnavarro has joined #openstack-keystone11:06
marekdnotmorgan: hm, i thought V2 is gonna be deprecated except for authentication.11:07
notmorganmarekd: it will be11:07
notmorganmarekd: this is moving the extensions into the core so we have a cleaner pipeline11:07
notmorgans/willbe/is?11:08
notmorganit will make code removal better since we'll just drop the code.11:08
marekdnotmorgan: hm, ok, makes sense.11:08
marekdhad some dissonance in my head..11:09
notmorganyeah, it's one of those odd things11:09
marekdwhy bother about the code that's gonna dissapear soon11:09
notmorganbut basically we'd need to maintain the paste entries11:09
openstackgerrithenry-nash proposed openstack/keystone: Projects acting as domains  https://review.openstack.org/23128911:09
notmorganand i'm trying to consolidate us down to bascially 1 entry in paste for all of keystone11:10
notmorganso it's impossible to "break11:10
notmorgan" things by accident11:10
notmorganor by removing the wrong things/reordering11:10
notmorganif it's part of keystone, it's in the main api entry11:10
notmorganthe only exception is S3/EC2 for "legal" reasons11:10
notmorganwhich you'll see how i addressed11:11
notmorganas you go down that chain...11:11
*** pnavarro has quit IRC11:17
*** pnavarro has joined #openstack-keystone11:18
*** rcernin has quit IRC11:19
openstackgerritRudolf Vriend proposed openstack/keystone: Adds user_description_attribute mapping support to the LDAP backend  https://review.openstack.org/27687311:20
marekdnotmorgan: ok, goona go for lunch11:21
marekdgonna11:21
notmorganmarekd: enjoy!11:21
*** rcernin has joined #openstack-keystone11:22
*** pnavarro has quit IRC11:22
marekdthanks!11:23
*** rcernin has quit IRC11:25
bretonnotmorgan: what have you decided at midcycle on https://bugs.launchpad.net/bugs/1513541 ? Do we fix the issue in tempest with sleep()?11:25
openstackLaunchpad bug 1513541 in OpenStack Identity (keystone) "Support sub-second accuracy in Fernet's creation timestamp" [Medium,Won't fix]11:25
breton*have we decided11:25
breton(ok, you, I was not there)11:25
notmorganbreton: we are keeping the sleep and dropping subsecond everywhere11:25
notmorganhttps://review.openstack.org/#/c/275497/11:25
*** rcernin has joined #openstack-keystone11:26
bretonnotmorgan: should we drop https://review.openstack.org/#/c/243742/ then?11:30
notmorgani think lbragstad is planning to drop that11:30
*** jistr|sick has quit IRC11:37
*** fhubik_brb is now known as fhubik11:40
*** jaosorior has quit IRC11:41
*** jaosorior has joined #openstack-keystone11:43
*** jbell8 has quit IRC11:48
*** jbell8 has joined #openstack-keystone11:51
*** roxanagh_ has joined #openstack-keystone11:52
*** vgridnev has joined #openstack-keystone11:55
*** roxanagh_ has quit IRC11:56
*** GB21 has joined #openstack-keystone11:58
henrynashnotmorgan: I know you feel the need to reimplent the protected/filterprotect decorator approach - fyi, further to our previous conversation, I don’t think any of the callbacks actually check policy in code…they just marshal data to be passed back into oslo.policy11:59
notmorganhenrynash: not reimplement, breakit so we stop the callback madness12:00
notmorganhenrynash: basically go back to the old-style where we just call .enforce where we need it12:00
henrynashnotmorhan: why is it maddness12:00
notmorganhenrynash: impossible to follow/understand.12:00
*** mvk has quit IRC12:00
henrynashnotmorgan: you mean like pythn in general?12:00
notmorganhenrynash: there is maybe you who can debug anything in it if it occurs12:00
notmorganhenrynash: so the callback thing was added because we didn't have enough insight into the scope check12:01
notmorganhenrynash: right?12:01
notmorgando you own X12:01
henrynashnotmorgan: so not opposed to an alternative implemtantion…infact my orgional one didn’t use decorators, but the PTL of the moment (no, not you!) felt decorators where a better approach12:01
notmorganthe original @protected was fine, but when we went down the path of the callback and re-implmenting the check wholesale makes understanding very hard12:02
notmorganso my view is stop with the decorator madness.12:02
henrynashnotmorgan: basically yes, some scope checks need more info than others, which may not be simply teh entities passed into teh API12:02
notmorgancall .enforce when you need to.12:02
notmorgandon't pass callbacks in, don't make complext decorators that behave differently [massively so] depending on incantations12:03
henrynashnotmorgan: are you suggesting we won’t call enfoce somethimes?12:03
notmorganwe already don't12:03
notmorganwhere we don't decorate12:03
notmorgani'm looking at it from the perspective of we want to ensure we call enforce. that is fine12:04
notmorganwe should have a decorator that says "did we enforce"12:04
notmorganbut we shouldn't have to guess when/how/why enforcement was call with what values by chasing into "was this a filter thing, was this a callback, what does the callback reimplment different than normal enforce"12:04
notmorganetc12:04
notmorganbasically: when you have the data you need to enforce, call .enforce12:05
henrynashnotmorgan: so my concern is that if we ahve a mixture of enforce in our code vs enforce in policy, it will be an even bigger mess12:05
notmorganwe simply will call .enforce like today against policy12:05
notmorganinstead of a decorator caling it12:05
notmorganthen we have clear code paths to work on the next level of changes with policy as we define them12:06
notmorganbut frankly, i've spend hours looking at the decorators and it is never clear what the enfrocement should be doing.12:06
henrynashnotmorgan: OK, so I’m fine with if we want to move away from decoaration, as long as that doesn’t implictely make the deiscison as to whether we shold be adding checks in our code vs poicy12:06
notmorganmeaning, i don't trust this to be maintainable in the long term12:06
notmorganhenrynash: one code path for enforcement, one for filtering12:06
notmorgandon't reimplement enforcement code in callbacks12:07
notmorganthat is my only goal here12:07
*** vgridnev has quit IRC12:07
notmorganno change in functionality12:07
notmorganchanges in functionality [i still am not sold on external checks but i'm waiting for the spec before we change that]12:07
notmorganwill be based on the spec samuel and ayoung are working on [with your input]12:07
*** dims has joined #openstack-keystone12:07
henrynashnotmorgan: ok, got it…and remember that we do actually todau sye callbacks in both filterproetcted and protected12:08
henrynash(today use callbacks…12:08
notmorganthe callbacks are the core of the issue imnsho12:08
notmorganand it isn't your fault, you hit the request perfectly12:08
notmorganit's just stupidly hard to follow/write code for/enhance/maintain12:08
henrynashnotmorgan: ok, understand your goal, I’m fine with that12:08
* notmorgan is doing all the 'this is bad in keystone, lets fix it' code.12:09
notmorganat the moment12:09
notmorgansince it seems like everyone else is busy with "Features"12:09
henrynashcool12:09
notmorganalso, look at the fix for EC2 / S312:10
notmorganit should solve your needs. but without EC2 auth, heat cfn is broken12:10
notmorganftw12:10
notmorganftr*12:10
notmorganor was it brant's needs.12:10
henrynashnotmorgan: I think brant/brad, but there is an issue there, yes12:11
* notmorgan is awake far too late to know what anyone is complaining about atm :P12:11
henrynashwas gonna say, what the hell is the time there…..up celebrating teh superbowl?12:11
notmorganhenrynash: no. just insomnia12:12
notmorganit's 041212:12
notmorganalmost time i'd wake up anyway12:12
henrynashouch12:12
notmorgani'm also going to move the enforcement strictly out to keystone.common.policy_enforce12:13
notmorganso it's not lumped into keystone.policy.<backend> oddly12:13
*** vgridnev has joined #openstack-keystone12:13
henrynashsoudns fine12:13
notmorganand i almost have a patch to roll authcontext, jsonbody, url normalizer, and token_auth into one entry in the pipeline12:14
notmorganthe main keystone entry12:14
notmorganso someone can't "break" keystone by accident by reordering things / omitting them12:14
notmorganour pipelines will be size_limit(oslo), request_id(oslo), [pblic_api|admin_api|service_v3]12:15
notmorgandoesn't prevent new middleware, just prevents breaking.12:15
*** jaosorior has quit IRC12:17
*** dims has quit IRC12:20
*** gildub has quit IRC12:21
*** dims has joined #openstack-keystone12:22
openstackgerritRudolf Vriend proposed openstack/keystone: Adds user_description_attribute mapping support to the LDAP backend  https://review.openstack.org/27687312:27
*** gordc has joined #openstack-keystone12:30
openstackgerritMerged openstack/keystone: Add in TRACE logging for the manager  https://review.openstack.org/27408512:32
*** mvk has joined #openstack-keystone12:33
*** GB21 has quit IRC12:33
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/26947912:35
*** krotscheck_dcm is now known as krotscheck12:39
*** erlarese has joined #openstack-keystone12:43
*** mdavidson has joined #openstack-keystone12:43
*** jed56 has joined #openstack-keystone12:44
*** jaosorior has joined #openstack-keystone12:46
*** shoutm_ has quit IRC12:46
*** shoutm has joined #openstack-keystone12:49
*** jaosorior has quit IRC12:51
*** roxanagh_ has joined #openstack-keystone12:53
*** roxanagh_ has quit IRC12:58
*** shoutm has quit IRC12:58
*** daemontool has joined #openstack-keystone13:01
*** pnavarro has joined #openstack-keystone13:02
*** dikonoor has joined #openstack-keystone13:04
*** EinstCrazy has joined #openstack-keystone13:05
*** jbell8 has quit IRC13:05
*** jbell8 has joined #openstack-keystone13:06
*** krotscheck has quit IRC13:06
*** EinstCrazy has quit IRC13:09
openstackgerritMerged openstack/keystone: Move user and admin crud to core  https://review.openstack.org/27448913:10
*** rudolfvriend has joined #openstack-keystone13:10
*** jbell8 has quit IRC13:12
*** jbell8 has joined #openstack-keystone13:13
openstackgerritMorgan Fainberg proposed openstack/keystone: Move v3->v2 compat static methods  https://review.openstack.org/27737913:13
openstackgerritMorgan Fainberg proposed openstack/keystone: Move v3->v2 compat static methods  https://review.openstack.org/27737913:15
*** krotscheck has joined #openstack-keystone13:18
*** links has quit IRC13:20
*** jbell8 has quit IRC13:27
*** edmondsw has joined #openstack-keystone13:32
openstackgerritjaveme proposed openstack/python-keystoneclient: Encode the url parameters for base.CrudManager  https://review.openstack.org/25415413:34
*** ninag has joined #openstack-keystone13:41
*** permalac has joined #openstack-keystone13:44
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/26947913:48
*** su_zhang has joined #openstack-keystone13:56
*** jsavak has joined #openstack-keystone14:01
*** jsavak has quit IRC14:07
*** Nirupama has quit IRC14:09
*** jsavak has joined #openstack-keystone14:10
*** jaosorior has joined #openstack-keystone14:11
*** jsavak has quit IRC14:14
*** jsavak has joined #openstack-keystone14:14
*** jaosorior has quit IRC14:21
*** jaosorior has joined #openstack-keystone14:21
*** bdossant has joined #openstack-keystone14:22
*** tomoiaga has left #openstack-keystone14:26
*** su_zhang has quit IRC14:28
*** GB21 has joined #openstack-keystone14:28
*** peter-hamilton has joined #openstack-keystone14:34
*** jsavak has quit IRC14:35
*** jsavak has joined #openstack-keystone14:36
*** jbell8 has joined #openstack-keystone14:39
*** jbell8 has quit IRC14:41
*** jbell8 has joined #openstack-keystone14:43
*** superdan is now known as dansmith14:45
*** henrynash has quit IRC14:48
lbragstadstevemar do you know where in the keystone api docs it says that we have to return a 404 when validating a token that doesn't have roles?14:53
*** EinstCrazy has joined #openstack-keystone14:57
*** henrynash has joined #openstack-keystone14:58
*** ChanServ sets mode: +v henrynash14:58
*** bdossant has quit IRC14:59
*** vgridnev has quit IRC14:59
*** sigmavirus24_awa is now known as sigmavirus2415:01
openstackgerritLance Bragstad proposed openstack/keystone: Return 404 instead of 401 for tokens w/o roles  https://review.openstack.org/27743615:01
openstackgerritLance Bragstad proposed openstack/keystone: Return 404 instead of 401 for tokens w/o roles  https://review.openstack.org/27743615:02
*** EinstCrazy has quit IRC15:04
*** slberger has joined #openstack-keystone15:05
lbragstadstevemar have you confirmed this one? https://bugs.launchpad.net/keystone/+bug/154165715:08
openstackLaunchpad bug 1541657 in OpenStack Identity (keystone) "Scoped OS-FEDERATION token not working" [Undecided,New]15:08
*** nkinder has quit IRC15:09
lbragstadstevemar it's targeted to mitaka-3 but it doesn't have any priority or importance set15:09
*** nkinder has joined #openstack-keystone15:10
*** Nirupama has joined #openstack-keystone15:16
*** timcline has joined #openstack-keystone15:21
*** vgridnev has joined #openstack-keystone15:23
*** Nirupama has quit IRC15:23
*** spandhe has joined #openstack-keystone15:37
*** clenimar has joined #openstack-keystone15:37
*** GB21 has quit IRC15:38
*** jsavak has quit IRC15:40
stevemarlbragstad: i haven't confirmed it yet, it's on my list, but haven't had a chance yet15:41
*** phalmos has joined #openstack-keystone15:41
stevemarlbragstad: if it's real, it's a regression, so that's why i have it marked to m315:41
lbragstadstevemar gotcha15:41
*** rcernin has quit IRC15:42
*** doug-fish has joined #openstack-keystone15:42
notmorganlbragstad: i don't think we say a token can't have roles15:44
notmorganlbragstad: anywhere. i just know horizone/nothing else works with no roles15:44
*** jbell8 has quit IRC15:44
*** spandhe has quit IRC15:45
*** jsavak has joined #openstack-keystone15:48
*** links has joined #openstack-keystone15:49
*** jsavak has quit IRC15:54
openstackgerritMerged openstack/keystone: Updated from global requirements  https://review.openstack.org/27723115:55
*** links has quit IRC15:57
*** jsavak has joined #openstack-keystone15:58
*** vgridnev has quit IRC15:59
stevemarnotmorgan: lbragstad fernet still behave the same as UUID, even if it's not documented anywhere16:00
stevemarit's become what people expect16:01
dolphmlbragstad: unscoped tokens don't have roles -- unscoped tokens should not raise 40416:01
*** pushkaru has joined #openstack-keystone16:02
*** vgridnev has joined #openstack-keystone16:03
*** topol_ is now known as topol16:06
*** BAKfr has quit IRC16:07
*** sinese has quit IRC16:12
*** belmoreira has quit IRC16:12
stevemardolphm: good morning sir!16:12
dolphmstevemar: /salute16:13
stevemarfew more weeks til feature freeze!16:14
stevemar~21 more days til feature freeze!16:16
*** stevemar changes topic to "21 more days til feature freeze! | Mitaka-3: https://launchpad.net/keystone/+milestone/mitaka-3 | See you at the midcycle!"16:16
dstaneklbragstad: is this something you are currently working on? https://bugs.launchpad.net/keystone/+bug/126875116:17
openstackLaunchpad bug 1268751 in OpenStack Identity (keystone) "Potential token revocation abuse via group membership" [High,Triaged] - Assigned to Lance Bragstad (lbragstad)16:17
*** stevemar changes topic to "21 more days til mitaka-3 feature freeze - please prioritize reviews accordingly! | Mitaka-3: https://launchpad.net/keystone/+milestone/mitaka-3"16:17
dstanekhenrynash: are you still working on this? https://bugs.launchpad.net/keystone/+bug/151703816:18
openstackLaunchpad bug 1517038 in OpenStack Identity (keystone) "API-based Domain config method could temporarily show partial update" [High,Triaged] - Assigned to Henry Nash (henry-nash)16:18
*** clenimar has quit IRC16:19
dstanekdolphm: is there anything on the keystone side that needs to be done for https://bugs.launchpad.net/keystone/+bug/1473567 ?16:20
openstackLaunchpad bug 1473567 in OpenStack Identity (keystone) "Fernet tokens fail tempest runs" [High,In progress] - Assigned to Dolph Mathews (dolph)16:20
dolphmlbragstad: ^16:20
openstackgerritMorgan Fainberg proposed openstack/keystone: Move s3 Extension to core  https://review.openstack.org/27497316:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Move EC2 extension to core  https://review.openstack.org/27528016:21
*** Ephur has joined #openstack-keystone16:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Deprecate admin_token_auth  https://review.openstack.org/27544316:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Followup for LDAP removal  https://review.openstack.org/27719616:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Mark the ExtensionRouter deprecated  https://review.openstack.org/27728016:22
openstackgerritMorgan Fainberg proposed openstack/keystone: Move v3->v2 compat static methods  https://review.openstack.org/27737916:22
notmorgandolphm: any remaining outstanding concerns here: https://review.openstack.org/#/c/272007/ ?16:25
dolphmnotmorgan: nope, i just have not run the code16:26
stevemarnotmorgan: why does v3->v2 compat depend on the other patches16:26
notmorganstevemar: because it's deep in the chain of this squash the pipeline16:26
stevemaroh, i guess there is one related change keystone/compat/aws/ec2/_ec2_core.py16:26
notmorganstevemar: all of the *contrib->core has to happen before the next step which is roll the "required middleware" into the base router16:27
dstanekstevemar: we may be down to only medium and lower bugs by m316:29
notmorganstevemar: i am ~2-3 patches from having this whole chain done.16:30
*** esp has joined #openstack-keystone16:30
notmorganstevemar: and our pipeline will look like "size_limit request_id service_v3"16:30
*** vgridnev has quit IRC16:31
notmorgandstanek: ^16:31
*** browne has joined #openstack-keystone16:31
*** vgridnev has joined #openstack-keystone16:31
*** vgridnev has quit IRC16:31
dstaneknotmorgan: ?16:32
*** pnavarro has quit IRC16:32
stevemardstanek: notmorgan figures you like small pipelines16:32
notmorgandstanek: what we discussed before16:32
notmorgandstanek: rolling everything up into a single entry in paste16:32
dstanekstevemar: notmorgan: ah, yes16:32
notmorgandstanek: hopefully it makes it easier to restructure things going forward for flask/etc/whatever16:33
*** spzala has joined #openstack-keystone16:34
*** esp has quit IRC16:37
*** diazjf has joined #openstack-keystone16:39
permalachello guys.16:41
*** clenimar has joined #openstack-keystone16:41
permalacthe HA config from the documentation looks like is missing something. http://docs.openstack.org/ha-guide/controller-ha-keystone.html16:41
permalacam I missing something?16:42
*** spandhe has joined #openstack-keystone16:43
*** bill_az has joined #openstack-keystone16:43
*** nkinder has quit IRC16:44
*** jgriffith_away is now known as jgriffith16:45
dstanekpermalac: what's missing?16:46
permalacit's like I have to install the keystone again, I don't see how to move the working one to the HA without touching to many config files.16:48
*** gyee has joined #openstack-keystone16:48
*** ChanServ sets mode: +v gyee16:48
*** vivekd has joined #openstack-keystone16:48
dstanekpermalac: i imagine you just add your existing keystone to pacemaker, but i have no idea. i don't know who maintains that document from the docs group16:50
*** mhickey has quit IRC16:50
*** rudolfvriend has quit IRC16:50
*** fhubik is now known as fhubik_brb16:51
dstanekpermalac: i think the thing to take away there is to make sure you update the endpoint urls16:51
*** su_zhang has joined #openstack-keystone16:52
permalacI will read more, and check it out.16:52
*** pnavarro has joined #openstack-keystone16:53
dstanekpermalac: you would change those 'creates' to 'updates'16:54
*** sinese has joined #openstack-keystone16:54
permalacUnderstood16:57
permalacI was not seeing it.16:57
permalacdstanek, thanks.16:57
*** fhubik_brb is now known as fhubik16:59
*** jgriffith is now known as jgriffith_away17:00
*** jsavak has quit IRC17:01
*** permalac has quit IRC17:02
*** jgriffith_away is now known as jgriffith17:04
*** jsavak has joined #openstack-keystone17:05
*** dikonoor has quit IRC17:05
*** su_zhang has quit IRC17:05
openstackgerritDavid Stanek proposed openstack/keystone: Fixes a language issue in a release note  https://review.openstack.org/27749617:09
*** jsavak has quit IRC17:09
*** jsavak has joined #openstack-keystone17:10
*** esp has joined #openstack-keystone17:10
*** fhubik has quit IRC17:13
*** dims has quit IRC17:14
*** lhcheng has joined #openstack-keystone17:17
*** ChanServ sets mode: +v lhcheng17:17
*** richm has quit IRC17:18
*** browne has quit IRC17:19
*** cgalan has joined #openstack-keystone17:20
stevemardstanek: dolphm notmorgan poke to close a bug: https://review.openstack.org/#/c/228644/17:21
*** lhcheng_ has joined #openstack-keystone17:21
*** cgalan has quit IRC17:21
henrynashdstanek: so I still have https://bugs.launchpad.net/keystone/+bug/1517038 on my list, haven’t implemneted yet, but have a plan!17:22
openstackLaunchpad bug 1517038 in OpenStack Identity (keystone) "API-based Domain config method could temporarily show partial update" [High,Triaged] - Assigned to Henry Nash (henry-nash)17:22
stevemargyee: you know by opening bugs in osc, you agree to fix them, right? ^_^17:22
*** lhcheng has quit IRC17:23
*** sinese has quit IRC17:24
stevemarhenrynash: whats the deal with https://blueprints.launchpad.net/keystone/+spec/assignment-inherit-rule17:24
dstanekstevemar: looking now17:25
dstanekhenrynash: sounds good. if you need help i can help on bug day this friday17:25
henrynashstevemar: so I’m not sure we should do this _ I’m not convinced that the gain of introucing a more standard inheritance model will outweigh the potential confusion of having two models!17:26
*** timcline has quit IRC17:26
stevemarhenrynash: yeah, definitely want to avoid confusion17:26
henrynashstevemar: we already moved the inheriatnce to core17:27
stevemarhenrynash: it's enabled by default right17:27
gyeestevemar, yes sir, patches coming today :)17:27
stevemargyee: \o/17:27
henrynashstevemar: have to check that….I think that was changed, yes17:27
henrynashstevemar: yep, enabled by default17:28
stevemarhenrynash: so then what's left to do? :)17:28
henrynashstevemar: nothing really for movingto core17:28
*** jsavak has quit IRC17:28
stevemarhenrynash: it's already moved to core17:28
henrynashstevemar: yes, sorry, that’s what I meant17:29
stevemarhenrynash: so... done?17:29
henrynashstevemar: I think we’ll just close this one..I’ll add a note about the alternate inheriatnce model and potential confusio17:29
stevemarhenrynash: sounds great - add as much info as possible, i think its very muddled17:30
*** sinese has joined #openstack-keystone17:30
*** mylu has joined #openstack-keystone17:30
henrynashstevemar: actually, I think this spec gets abandoned, since we did the move to core as part of the blanket bp17:31
stevemarhenrynash: even better, we can mark it as obsolete17:31
*** dims has joined #openstack-keystone17:32
*** vgridnev has joined #openstack-keystone17:35
*** mvk has quit IRC17:39
notmorganstevemar: i vote we make keystone API v4 tomorrow17:40
notmorganstevemar: so we can fix everything we did wrong in v317:40
notmorgansince clearly no one is using v317:40
dstanekstevemar: had to back track the openldap code into its module and finally into openldap calls17:43
*** boris-42 has quit IRC17:43
*** e0ne has quit IRC17:46
openstackgerritTom Cocozzello proposed openstack/keystone: Test list project hierarchy is correct for a large tree  https://review.openstack.org/27751217:50
henrynashayoung: I fixed up most of your concerns with https://review.openstack.org/#/c/261870/ if you’ve got time to check you’re happy, that would be great17:50
openstackgerritTom Cocozzello proposed openstack/keystone: Test list project hierarchy is correct for a large tree  https://review.openstack.org/27751217:51
*** fawadkhaliq has joined #openstack-keystone17:56
*** jasonsb has quit IRC17:58
*** daemontool has quit IRC17:58
*** daemontool has joined #openstack-keystone17:58
*** sigmavirus24 is now known as sigmavirus24_awa17:59
*** agireud has quit IRC18:00
*** su_zhang has joined #openstack-keystone18:00
*** su_zhang has quit IRC18:01
*** agireud has joined #openstack-keystone18:02
*** vivekd_ has joined #openstack-keystone18:03
*** petertr7 is now known as petertr7_away18:03
*** vivekd has quit IRC18:05
*** timcline has joined #openstack-keystone18:05
*** vivekd_ is now known as vivekd18:05
*** browne has joined #openstack-keystone18:05
*** petertr7_away is now known as petertr718:08
*** doug-fish has quit IRC18:08
*** doug-fish has joined #openstack-keystone18:09
*** daemontool has quit IRC18:09
*** daemontool_ has joined #openstack-keystone18:09
*** jsavak has joined #openstack-keystone18:12
*** doug-fish has quit IRC18:13
*** jsavak has quit IRC18:16
lbragstaddstanek ah - I'm don't think I've seen that bug before?18:17
lbragstaddstanek it was assigned to me though18:17
*** petertr7 is now known as petertr7_away18:17
*** su_zhang has joined #openstack-keystone18:17
*** mylu has quit IRC18:24
krotscheckNeed some advice from cores on the headers listed here. https://review.openstack.org/#/c/241317/9/etc/keystone-paste.ini18:28
krotscheckA review comment was made that the various X-509 headers ar enot actually needed, and don't really exit the middleware layer. Is that true?18:29
notmorgankrotscheck: right now most of the headers are stripped out by keystonemiddleware18:31
notmorgankrotscheck: X-Subject-Token, X-Auth-Token, X-OpenStack-Request-Id i think are the ones you need.18:31
lbragstadayoung ping18:31
*** mylu has joined #openstack-keystone18:32
lbragstadayoung does my last comment here make sense with what you detailed in comment #28 - https://bugs.launchpad.net/keystone/+bug/126875118:32
openstackLaunchpad bug 1268751 in OpenStack Identity (keystone) "Potential token revocation abuse via group membership" [High,Triaged] - Assigned to Lance Bragstad (lbragstad)18:32
*** jsavak has joined #openstack-keystone18:33
krotschecknotmorgan: Coolio, thanks18:33
notmorgannp18:33
*** mylu has quit IRC18:33
*** pnavarro has quit IRC18:33
openstackgerritMichael Krotscheck proposed openstack/keystone: Added CORS support to Keystone  https://review.openstack.org/24131718:34
krotscheckLet's see if that works....18:34
notmorganedmondsw: answered your question. in short yes, v2 only now, will have a fix to create a proper v3 router class a bit further down the chain.18:37
notmorganedmondsw: but it's the same as what we do today fwiw.18:37
notmorganjust as a separate paste entry18:37
edmondswyeah18:38
notmorganedmondsw: i've been trying to "replicate today logic" then "fix to better logic"18:38
notmorganwhen doing these changes18:38
edmondswmakes sense18:38
edmondswmight through a TODO in there, though?18:38
notmorgani was planning on rolling a fix in a couple hours ;)18:39
edmondswok then :)18:39
notmorganfelt like a TODO would be meaningless if it just is replaced 5 patches down the chain later ;)18:39
lbragstadnotmorgan reviewed - https://review.openstack.org/#/c/275497/118:39
edmondswwell, the meaning would have been to avoid this discussion :)18:39
edmondsw:p18:40
notmorganedmondsw: heh18:40
notmorganlbragstad: can you do the edit? happy to if you can't.18:40
henrynashdavchen, samueldmq: fancy sharpening those new core-teeth on domain-specific roles? Patch chain starts here: https://review.openstack.org/#/c/261870/18:40
lbragstadnotmorgan sure18:41
notmorganlbragstad: cool.18:41
openstackgerritJorge Munoz proposed openstack/keystone: Fix trust redelegation tests  https://review.openstack.org/27323218:41
openstackgerritJorge Munoz proposed openstack/keystone: Add tests for trust using impersonation  https://review.openstack.org/27327918:41
henrynashdavechen: see above18:41
*** spandhe has quit IRC18:42
lbragstadstevemar i need your expert opinion on https://bugs.launchpad.net/keystone/+bug/150665318:44
openstackLaunchpad bug 1506653 in OpenStack Identity (keystone) "Retrieving either a project's parents or subtree as_list does not work" [Medium,Confirmed] - Assigned to Lance Bragstad (lbragstad)18:44
lbragstadhtruta and raildo-afk can also weigh in on that, too ^18:44
*** e0ne has joined #openstack-keystone18:44
lbragstadjorge_munoz you have a patch to fix https://bugs.launchpad.net/keystone/+bug/1532280 right?18:45
openstackLaunchpad bug 1532280 in OpenStack Identity (keystone) "Fernet trust token is still valid when trustee's domain is disabled." [Medium,In progress] - Assigned to Lance Bragstad (lbragstad)18:45
*** clenimar has quit IRC18:46
*** mylu has joined #openstack-keystone18:48
jorge_munozlbragstad: Yes, but its only fix if we move forward with doing explicit enable checks for disabled domains. Currently done throu revocation records.18:48
*** spandhe has joined #openstack-keystone18:49
*** jsavak has quit IRC18:52
stevemarnotmorgan: lets just abandon v3 and add domains to v218:53
*** jsavak has joined #openstack-keystone18:53
notmorganstevemar: lets go with V1!18:53
david-lyle\o/18:53
stevemarnotmorgan: see, david-lyle agrees18:53
david-lyle:P18:53
edmondswlbragstad, I would argue that the API needs to change, not just the docs... there needs to be some way for the caller to distinguish between 1) no parents and 2) lack access to that information18:53
david-lylethe lesson to learn is openstack can't support increasing API versions, period18:54
edmondswe.g., we could return the project ids and just not the other info they don't have access to.18:54
edmondswreally it's pretty odd that we have these two parents query params18:55
*** su_zhang has quit IRC18:55
david-lyleour governance model is not equipped to handle such things as moving forward18:55
lbragstadhtruta raildo-afk thoughts on what edmondsw said?18:56
*** su_zhang has joined #openstack-keystone18:56
david-lylefree for all === mess for all18:56
edmondswit would be a lot better API design to return the parents_as_list format all the time, but then when you don't have access to information beyond the id just return the id field alone... in the same format, not in the parents_as_ids format18:56
* david-lyle sits back down18:56
*** su_zhang has quit IRC18:58
*** peter-hamilton has quit IRC18:58
*** jsavak has quit IRC18:59
*** jsavak has joined #openstack-keystone19:00
*** sigmavirus24_awa is now known as sigmavirus2419:02
*** EinstCrazy has joined #openstack-keystone19:04
*** petertr7_away is now known as petertr719:08
*** EinstCrazy has quit IRC19:09
*** spandhe has quit IRC19:13
*** doug-fish has joined #openstack-keystone19:16
*** jgriffith is now known as jgriffith_away19:16
*** su_zhang has joined #openstack-keystone19:18
*** doug-fish has quit IRC19:21
*** mylu has quit IRC19:22
*** doug-fish has joined #openstack-keystone19:22
*** esp has left #openstack-keystone19:22
*** spandhe has joined #openstack-keystone19:24
*** dan_nguyen has joined #openstack-keystone19:26
*** BAKfr has joined #openstack-keystone19:30
stevemardavid-lyle: you're not exactly far off dude19:33
*** BAKfr has quit IRC19:37
*** mylu has joined #openstack-keystone19:39
*** fawadkhaliq has quit IRC19:40
*** jbell8 has joined #openstack-keystone19:41
*** mylu_ has joined #openstack-keystone19:41
*** mylu has quit IRC19:42
*** BAKfr has joined #openstack-keystone19:44
*** jbell8 has quit IRC19:45
*** jbell8 has joined #openstack-keystone19:46
*** jsavak has quit IRC19:50
*** jsavak has joined #openstack-keystone19:51
*** sinese has quit IRC19:53
*** sinese_ has joined #openstack-keystone19:53
*** daemontool_ has quit IRC19:56
*** jsavak has quit IRC19:57
*** jsavak has joined #openstack-keystone19:58
*** ninag has quit IRC20:00
*** ninag has joined #openstack-keystone20:02
*** woodster_ has joined #openstack-keystone20:02
*** mylu_ has quit IRC20:02
*** maxabidi has joined #openstack-keystone20:03
*** vgridnev has quit IRC20:05
*** ninag has quit IRC20:06
*** daemontool has joined #openstack-keystone20:10
*** jgriffith_away is now known as jgriffith20:13
*** gildub has joined #openstack-keystone20:14
*** esp has joined #openstack-keystone20:14
stevemarayoung: token created from trust... that should include all the roles of a 'prior role'?20:17
openstackgerritSteve Martinelli proposed openstack/keystone: add a test that uses trusts and implies roles  https://review.openstack.org/27731920:18
stevemarayoung: ^20:18
*** mylu has joined #openstack-keystone20:20
*** su_zhang has quit IRC20:21
*** esp has quit IRC20:21
*** mhickey has joined #openstack-keystone20:23
*** pgbridge has joined #openstack-keystone20:24
*** henrynash has quit IRC20:25
*** mylu has quit IRC20:26
*** su_zhang has joined #openstack-keystone20:28
*** mylu has joined #openstack-keystone20:28
*** ajayaa has joined #openstack-keystone20:29
*** henrynash has joined #openstack-keystone20:29
*** ChanServ sets mode: +v henrynash20:29
*** su_zhang has quit IRC20:33
*** su_zhang has joined #openstack-keystone20:33
*** vivekd_ has joined #openstack-keystone20:37
*** mylu has quit IRC20:38
ajayaaHi guys. Is there an opposite of l in pdb?20:39
ajayaaI want to go up in the file while debugging.20:39
*** vivekd has quit IRC20:40
*** vivekd_ is now known as vivekd20:40
*** ninag has joined #openstack-keystone20:44
*** ninag_ has joined #openstack-keystone20:46
*** jbell8 has quit IRC20:48
*** ninag has quit IRC20:48
*** roxanaghe has quit IRC20:50
*** jbell8 has joined #openstack-keystone20:50
*** su_zhang has quit IRC20:50
*** dims_ has joined #openstack-keystone20:51
*** ninag_ has quit IRC20:51
ayoungstevemar, good question.  I think it should.20:51
*** ninag has joined #openstack-keystone20:52
*** dims has quit IRC20:52
ayoungstevemar, I could actually see that one going either way, but all implied roles from a prior role is the most sensible20:52
openstackgerritMerged openstack/keystone: Support multiple URLs for LDAP server  https://review.openstack.org/22864420:55
*** mylu has joined #openstack-keystone21:03
*** mylu has quit IRC21:03
openstackgerritSteve Martinelli proposed openstack/keystone: add a test that uses trusts and implies roles  https://review.openstack.org/27731921:03
*** henrynash has quit IRC21:04
stevemarajayaa: no idea, https://docs.python.org/2/library/pdb.html docs?21:05
stevemarayoung: at the midcycle, you mentioned it should have all the implied roles in the token21:07
stevemarayoung: you can re-use this bug (https://bugs.launchpad.net/keystone/+bug/1539240) or create a new one, i don't know how to fix it, but I slapped up a test21:08
openstackLaunchpad bug 1539240 in OpenStack Identity (keystone) "create tests for trusts and implied roles" [Low,In progress] - Assigned to Steve Martinelli (stevemar)21:08
*** petertr7 is now known as petertr7_away21:08
ayoungstevemar, I saw a comment that said the token only has one role, not three21:09
stevemarayoung: yep21:09
ayoungand that shows that the trust expansion for implied roles is not happening, is that how you read it?21:09
stevemaryep21:09
ayoungOK, not surprised.  I can take that21:09
ayoungstevemar, I need to work on the client pieces for implied roles, too.  I'll stay on the whole effort.21:10
stevemarayoung: OK, i will change the description of that bug and assign it to you, and mark my patch as a partial fix... 1 sec21:11
ayoungstevemar, nah, lets split it21:11
stevemarayoung: alright21:12
ayoungyours addresses one issue, and we should track that, too21:12
*** petertr7_away is now known as petertr721:12
stevemarayoung: okay, review the patch and open a new bug for role expansion for trusts (target it to mitaka-3)21:14
stevemarayoung: on a somewhat related note... just a heads up that you also have https://bugs.launchpad.net/keystone/+bug/1541540 assigned to you21:14
openstackLaunchpad bug 1541540 in OpenStack Identity (keystone) "Implied role "root_role" config needs to be expanded" [High,Triaged] - Assigned to Adam Young (ayoung)21:14
*** henrynash has joined #openstack-keystone21:16
*** ChanServ sets mode: +v henrynash21:16
openstackgerritMerged openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/27282521:17
*** su_zhang has joined #openstack-keystone21:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Move EC2 extension to core  https://review.openstack.org/27528021:26
openstackgerritMorgan Fainberg proposed openstack/keystone: Move v3->v2 compat static methods  https://review.openstack.org/27737921:26
openstackgerritMorgan Fainberg proposed openstack/keystone: Deprecate admin_token_auth  https://review.openstack.org/27544321:26
openstackgerritMorgan Fainberg proposed openstack/keystone: Move s3 Extension to core  https://review.openstack.org/27497321:26
openstackgerritMorgan Fainberg proposed openstack/keystone: Roll up JSON_BODY middleware to always be applied  https://review.openstack.org/27757021:26
*** su_zhang has quit IRC21:26
*** dims has joined #openstack-keystone21:26
openstackgerritMorgan Fainberg proposed openstack/keystone: Followup for LDAP removal  https://review.openstack.org/27719621:26
openstackgerritMorgan Fainberg proposed openstack/keystone: Mark the ExtensionRouter deprecated  https://review.openstack.org/27728021:26
*** dims_ has quit IRC21:29
*** jsavak has quit IRC21:30
*** su_zhang has joined #openstack-keystone21:30
stevemarhenrynash: fyi, adam is taking a look at the bug21:31
*** jsavak has joined #openstack-keystone21:31
henrynashstevemar: ok..I had a cursor look at the code, and it looked ok...21:32
stevemarhenrynash: were you going to debug the problem or the test?21:32
henrynashstevemar: the problem21:32
*** henrynash has quit IRC21:33
stevemarhenrynash: up to you, i already talked to ayoung about it21:33
*** timcline has quit IRC21:33
openstackgerritMerged openstack/pycadf: Adding ironic api specific audit map configuration  https://review.openstack.org/27553821:33
*** henrynash has joined #openstack-keystone21:34
*** ChanServ sets mode: +v henrynash21:34
*** henrynash has quit IRC21:34
*** jsavak has quit IRC21:36
*** jsavak has joined #openstack-keystone21:37
ayoungstevemar, you didn't open the bug for "trust does not expand implied roles" right?21:37
ayoungAh..you checked the trust...I want to confirm that myself,21:38
*** jaosorior has quit IRC21:38
openstackgerritSteve Martinelli proposed openstack/keystone: include sample config file in docs  https://review.openstack.org/27757421:41
stevemarbknudson_: ^21:42
stevemarayoung: correct, haven't opened the bug yet21:42
stevemarayoung: yeah, i checked the trust and token, i think i tested things correctly *shrugs*21:42
stevemardhellmann: ^ if that works, i'll consider removing the config file we have checked into the repo21:43
dhellmannstevemar : let me know if you run into trouble with it21:45
stevemarroger that21:45
openstackgerritMorgan Fainberg proposed openstack/keystone: Roll up TOKEN_AUTH middleware  https://review.openstack.org/27758021:50
ayoungstevemar, nah, the trust should show one, the token multple.  Just ran your version..about to edit21:50
ayoungstevemar, ah, I misread.  Yeah. that looks like you tested correctly21:51
*** sinese_ has quit IRC21:51
*** dan_nguyen has left #openstack-keystone21:58
*** boris-42 has joined #openstack-keystone21:58
*** jsavak has quit IRC22:01
*** jsavak has joined #openstack-keystone22:03
*** e0ne has quit IRC22:03
*** daemontool_ has joined #openstack-keystone22:03
*** timcline has joined #openstack-keystone22:04
*** ninag has quit IRC22:05
*** petertr7 is now known as petertr7_away22:05
*** daemontool has quit IRC22:06
*** timcline has quit IRC22:07
*** timcline has joined #openstack-keystone22:08
*** jgriffith is now known as jgriffith_away22:10
*** jsavak has quit IRC22:10
*** dan_nguyen has joined #openstack-keystone22:11
*** jaosorior has joined #openstack-keystone22:12
*** mhickey has quit IRC22:14
*** jsavak has joined #openstack-keystone22:16
*** jgriffith_away is now known as jgriffith22:17
*** mylu has joined #openstack-keystone22:19
*** jsavak has quit IRC22:19
*** mylu has quit IRC22:21
*** phalmos has quit IRC22:23
*** jsavak has joined #openstack-keystone22:25
*** esp has joined #openstack-keystone22:25
*** jsavak has quit IRC22:26
notmorganayoung: i disagree with the CMS driven root_role thing22:29
notmorganayoung: pretty strongly, and definely the way it's implemented now22:29
notmorganayoung: asking people to use the API, change the config, and then restart keystone would have gotten a -1 before it started gating if I had gotten to it.22:30
ayoungnotmorgan, I hear you, but others feel just as strongly tyhe other way22:30
notmorganayoung: by ID is incorrect22:30
ayoungit was a fail safe22:30
notmorganand it shouldn't be a single role22:31
ayoungnotmorgan, that we can change22:31
notmorganit needs to be by name and a list if it's in the config.22:31
ayoungwhy did I do by id...22:31
ayoungtrying to remember...22:31
notmorganbut i still disagree with carrying yet-another-bad-config-option-that-most-people-wont-set22:31
notmorganayoung: easier.22:31
ayoungno22:31
*** dims has quit IRC22:31
ayoungname makes sense, there was a reaon22:32
notmorganbecause lookup by name hits implied roles too?22:32
*** timcline has quit IRC22:32
notmorganand this can't be an implied role22:32
*** esp has quit IRC22:32
*** lhcheng has joined #openstack-keystone22:32
*** ChanServ sets mode: +v lhcheng22:32
*** lhcheng_ has quit IRC22:32
notmorganalso... what happens if someone changes the value after setting the role as implied?22:32
ayoungnotmorgan, no, that is name....22:32
notmorganthis will need to block this role at runtime from appearing in an implied role.22:32
ayoungthe config option is by name, and it is set by default22:32
ayoungthat works now, too22:33
notmorganit must have been id in a previous patch22:33
notmorganok, so then please make it a listopt22:33
notmorganand i'll grump about it to myself22:33
ayoungnotmorgan, is that sufficient?22:33
ayoungI'm willing to work with you here.  This is a security matter, so I need to be dilligent, but I am pragmatic, and openminded22:34
* notmorgan views most of the opts that are like this as just plain terrible. but this ship has sailed.22:34
*** mylu has joined #openstack-keystone22:34
ayoungnotmorgan, its a bit of a bootstrap problem.  We might be able to work around this by locking things down in the bootstrap phase22:35
notmorganso, from a security standpoint this doesn't buy you much22:35
notmorganif someone has access to change the role, they can assign it directly22:35
ayoungnotmorgan, what I was shooting for was "you can't get admin via an inf\erence rule"22:35
notmorgannot really a big win.22:35
notmorganbut like i said, make it a listopt and i'll grump to myself instead of harping on this22:36
ayoungconsidereing we only have 2 roles today, I think it was important enough to cover22:36
notmorganthe single-role isn't really very useable.22:36
ayoungI'm fine with that22:36
notmorganthere are many deploys that want to protect support roles22:36
ayoungso long as that is sufficient22:36
*** diazjf has quit IRC22:36
*** lhcheng has quit IRC22:37
notmorganayoung: like i said, i disagree, but there is only so much i am willing to argue for in depth. i'll take "more functional" over arguing this should be an API thing22:37
* notmorgan has enough fish to fry22:37
ayoungnotmorgan, I think I was going to try for MultiStrOpt or whatever it was, and was afraid of getting it wrong.  Will that work for you instead of list?22:38
*** lhcheng has joined #openstack-keystone22:38
*** ChanServ sets mode: +v lhcheng22:38
*** cdcasey has joined #openstack-keystone22:38
notmorganayoung: i'd prefer list tbh22:38
notmorganmultistropt sucks from a CMS perspective22:38
notmorgansince it's the same key over and over22:38
ayoungnotmorgan, or, if what you want is for us to enforce it at the API level, I can do that instead, and make it so it works for many, and we can just leave this as is and quietly ignore it until auditors pop in to check22:39
notmorganbut i guess we need to use it because roels can have ',' in it22:39
notmorgannah, don't put the extra API thing in.22:39
ayoungOK22:39
notmorganso multistropt22:39
ayoungok...can you comment that on the bug so we have record?22:39
notmorganwell the original bug sait to make it plural. i didn't update the description22:40
notmorganwas more of a done22:40
cdcaseyI have a question about logging22:41
ayoungGAH! Something overwrote my vpn config22:41
*** doug-fish has quit IRC22:41
cdcaseyIs there a simple way, through configuration or otherwise, to add a user name to relevant log entries so it's easy to tell who did what?22:42
*** mylu has quit IRC22:42
notmorganayoung: ouch22:44
ayoungnotmorgan, nah, its something else...22:44
bknudson_hackers22:44
*** doug-fish has joined #openstack-keystone22:44
ayoungWarning: password for 'vpn.secrets.Xauth password' not given in 'passwd-file' and nmcli cannot ask without '--ask' option.22:44
*** mylu has joined #openstack-keystone22:44
ayoungI think it is just getting confused;  it is supposed to pop up a dialog to let me put in the OTP (which it does) but then  loses it.22:45
*** doug-fis_ has joined #openstack-keystone22:46
ayoungThe name org.freedesktop.NetworkManager.vpnc was not provided by any .service files22:47
ayoungAh...rpm missing, I bet...22:47
*** doug-fish has quit IRC22:48
*** doug-fis_ has quit IRC22:50
*** dims_ has joined #openstack-keystone22:51
*** ayoung has quit IRC22:53
*** clenimar has joined #openstack-keystone22:54
notmorganbknudson_: ++22:55
*** EinstCrazy has joined #openstack-keystone22:58
*** doug-fish has joined #openstack-keystone22:59
*** lhcheng has quit IRC23:03
*** esp has joined #openstack-keystone23:03
*** lhcheng has joined #openstack-keystone23:03
*** ChanServ sets mode: +v lhcheng23:03
*** doug-fish has quit IRC23:03
cdcaseyi'm guessing not23:03
*** doug-fish has joined #openstack-keystone23:04
*** jsavak has joined #openstack-keystone23:04
*** sigmavirus24 is now known as sigmavirus24_awa23:04
notmorgancdcasey: not really, sorry23:04
notmorganstevemar: so, almost have the next two of these done.23:04
cdcaseynotmorgan that's what I figured, thanks.23:05
*** EinstCrazy has quit IRC23:05
notmorganbknudson_: i think i've addressed the legal concern and clearly documented so someone doesn't roll it back in and break you until/unless the legal stuff is changed23:05
*** pushkaru has quit IRC23:05
bknudson_notmorgan: thanks!23:05
notmorganbknudson_: and ran a few tests so, it looks like it works as expected23:05
*** pushkaru has joined #openstack-keystone23:06
*** jaosorior has quit IRC23:06
openstackgerritMerged openstack/keystone: Fixes a language issue in a release note  https://review.openstack.org/27749623:06
notmorganbknudson_: also it sets forth a pattern if we have more compat code that can work in a similar way [if needed], but anythin outside of the compat tree, i'll say "no" to23:06
bknudson_let's not have more compat code.23:07
notmorganbknudson_: +++++23:07
notmorganbknudson_: but if we do for some strange reason... we have this pattern setup23:07
*** daemontool_ has quit IRC23:07
*** esp has quit IRC23:07
*** ayoung has joined #openstack-keystone23:09
*** ChanServ sets mode: +v ayoung23:09
*** spzala has quit IRC23:09
*** jsavak has quit IRC23:10
*** pushkaru has quit IRC23:11
*** vivekd has quit IRC23:12
*** doug-fish has quit IRC23:14
*** doug-fish has joined #openstack-keystone23:14
*** dims_ has quit IRC23:14
*** doug-fish has quit IRC23:15
*** doug-fish has joined #openstack-keystone23:15
*** slberger has left #openstack-keystone23:16
openstackgerritMorgan Fainberg proposed openstack/keystone: Roll up AUTH_CONTEXT_MIDDLEWARE middleware  https://review.openstack.org/27760723:19
notmorganstevemar: ^ that was painful.23:19
*** dims_ has joined #openstack-keystone23:19
notmorganbknudson_: ^ that one should make it easier to start collapsing the logic down between our "required" middlewares23:20
openstackgerritDina Belova proposed openstack/keystone: Integrate OSprofiler in Keystone  https://review.openstack.org/10336823:23
*** doug-fish has quit IRC23:23
*** ajayaa has quit IRC23:24
*** gordc has quit IRC23:24
openstackgerritClenimar Filemon Sousa proposed openstack/keystone: Avoid wrong deletion of domain assignments  https://review.openstack.org/27570623:24
*** doug-fish has joined #openstack-keystone23:26
*** doug-fish has quit IRC23:27
*** cdcasey has quit IRC23:27
*** doug-fish has joined #openstack-keystone23:28
openstackgerritBrant Knudson proposed openstack/keystone: Text schema  https://review.openstack.org/27760823:28
*** can8dnSix has joined #openstack-keystone23:36
*** doug-fish has quit IRC23:38
jamielennoxnotmorgan: ideally i would have like to get the auth_token middleware dep in there and base it on that23:39
notmorganjamielennox: either direction is going to be horrific to rebase23:40
jamielennoxyea, that's fine23:40
*** doug-fish has joined #openstack-keystone23:40
jamielennoxthey're both working to the same goal more or less23:40
notmorganalso, the middleware rollups slow our tests WAY down23:40
notmorganbecause we actually are testing the stack properly on the restful tests.23:41
notmorganrather than short-circuting things23:41
notmorganor my laptop is cranky23:41
notmorgan[also possible]23:41
notmorganjamielennox: if we land the request-cache one, that'll speed it back up23:41
notmorganjamielennox: but also force a rebase23:41
jamielennoxnotmorgan: did you propose that?23:42
notmorganjamielennox: https://review.openstack.org/#/c/272007/23:42
notmorganjamielennox: and https://review.openstack.org/#/c/277198/2 but that one is pending some info from dhellmann23:42
jamielennoxnotmorgan: you've been busy23:42
notmorganjamielennox: and we landed the nova ksc->ksa and novaclient->ksa23:43
notmorganjamielennox: next is novaclient to OCC23:43
jamielennoxyep, those i saw23:43
jamielennoxi don't care so much about that one23:43
notmorganjamielennox: and then if we can get cinder, barbican, and glance over to KSA i can do evil things once we land request.local in ksm23:43
notmorganjamielennox: erm thread.local23:43
jamielennoxprefer to make people switch to osc23:43
notmorganjamielennox: we need to use OCC [this is for lib. use]23:43
notmorganso novaclient is v3 compat23:44
jamielennoxwait - why do the libs care23:44
notmorganbecause shade consumes them this way23:44
notmorganfor example23:44
jamielennoxgah, i've really never like the way OCC is done23:44
notmorganand we need ksc to get using ksa.23:44
jamielennoxit should just be cloud_config.get_session(name=XXX) or similar23:44
notmorganso i can do evil evil things.23:44
jamielennoxthen pass that to client creation23:44
jamielennoxi don't like that OCC took that over23:44
notmorganwell KSA is way way too low level23:45
notmorganand has restrictions that occ doesn't [notably oslo_config, etc]23:45
notmorgansomething had to fill the mid-ground23:45
*** doug-fish has quit IRC23:46
openstackgerritMorgan Fainberg proposed openstack/keystone: Rollup URL_NORMALIZER middleware  https://review.openstack.org/27761523:46
notmorganjamielennox: ^ boom. all our middleware rolled up and out of the pipeline.23:47
notmorganand then we need to go through and do speed-cleanup again.23:47
notmorgan=/23:47
notmorganbut it's progress.23:47
*** can8dnSix has quit IRC23:48
notmorganjamielennox: "pipeline = sizelimit request_id service_v3" <---- soooooo much better23:49
jamielennoxnotmorgan: why does the request cache stuff depend on dogpile?23:50
notmorganjamielennox: because i use dogpile to capture the data.23:50
*** doug-fish has joined #openstack-keystone23:50
*** doug-fish has quit IRC23:50
notmorgananywhere we memoize we capture the request23:50
*** doug-fish has joined #openstack-keystone23:50
notmorganit means it's always acting on anything we already would want to cache.23:51
notmorganand happens behind the scenes23:51
jamielennoxoh, you've installed like a full cache layer23:51
notmorganyep23:51
notmorganit adds a 2nd tier of cache, closer to the request23:51
jamielennoxthat's ugly, but effective23:52
notmorganat the cost of a little cpu.23:52
notmorganonce we trim the revoke code, we can move to json serialize23:52
notmorganand drop msgpack there23:52
jamielennoxmaybe not that ugly, just not at all what i was thinking23:52
notmorgani tried to make it as close to the business logic as i could23:53
notmorganso we got the most benefit of the offload23:53
jamielennoxyea, it does a good job of not actually changing the way the code works23:53
jamielennoxbut what is the advantage there of a per-request cache as opposed to simply a working big general cache?23:54
*** doug-fish has quit IRC23:54
notmorganit's guaranteeing we at least get one-off check that X item is what it says it is23:55
notmorganthe advantage vs memcache is the lack of socket + tcp + serialization23:55
notmorganit's just serialization/deserialize23:55
notmorganfwiw, i've seen ~5-15min improvements on gate jobs w/ it23:55
notmorganand that is with full memcache caching enabled too23:56
notmorganit artificially limits the number of times a request can ask the backend for a specific bit of data. long term, it should be able to be removed, but we have a long way to go before that.23:56
jamielennoxok, so it's cutting out the time to memcache23:57
notmorganand socket overhead23:57
jamielennoxwhy msgpack?23:57
notmorganrevoketree is a trainwreck23:57
jamielennoxoh, this was the faster than deepcopy thing?23:57
jamielennoxagreed23:57
notmorganit's slower than deepcopy in some cases23:57
notmorganit is faster in others23:57
notmorgandeepcopy is very very unreliable23:57
notmorganif we make revoke tree go away, then we can json serialize,23:58
notmorganavg time for json was 7usec23:58
jamielennoxbut why serialize?23:58
notmorganyou need to buffer between what is handed back to the request23:58
notmorganotherwise errant code could do .get_domain(default)['id'] = 'omg23:58
notmorgan'23:58
jamielennoxright - ok, so it's still just an instead of deepcopy thing23:59
*** browne has quit IRC23:59
notmorganand now for the rest of that request the cached value is modified and defualt_domain is 'omg'23:59
notmorganyep.23:59
jamielennoxok23:59
notmorgandeepcopy was 30usec on avg iirc23:59
notmorganmsgpack was 60usec23:59
notmorganbut... deepcopy was anywhere from 13usec to 150usec23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!