Friday, 2016-02-26

*** sdake has quit IRC00:00
jamielennoxstevemar, morgan: also has to be bootstrap --os-bootstrap-admin-url to match other commands00:01
jamielennoxmorgan: not sure why you added the bootstrap part of that00:01
morganoriginally it didn't have -os and someone complained00:01
morganiirc00:01
jamielennoxos is unnecessary in cli!! but ok for consistency, but bootstrap seems redundant00:01
*** shoutm has quit IRC00:02
*** chlong_ has quit IRC00:03
stevemarjamielennox: we can modify it now and not deprecate :O00:03
jamielennoxstevemar: it's in use by at least devstack00:04
*** ayoung has quit IRC00:04
jamielennoxwe could do like a two week deprecation cycle00:04
jamielennoxbut i'm not sure it's worth the effort00:05
*** jorge_munoz has joined #openstack-keystone00:05
openstackgerritSteve Martinelli proposed openstack/python-keystoneclient: Support `truncated` flag returned by identity service  https://review.openstack.org/28016200:06
*** su_zhang_ has joined #openstack-keystone00:09
*** su_zhang has quit IRC00:09
*** jorge_munoz has quit IRC00:09
stevemarmorgan: why does the LDAP removal code depend on the in-process cache?00:12
morganstevemar: because i'm really lazy and don't want to battle rebases00:13
openstackgerritSteve Martinelli proposed openstack/keystone: Followup for LDAP removal  https://review.openstack.org/27719600:13
morganstevemar: and i want to force the issue on cache00:13
stevemarmorgan: i moved it to master00:13
morganlame00:13
stevemarmorgan: why lame :)00:14
morganthe second part was the important reason00:14
morganyou get LDAP things with cache00:14
morganduh00:14
morganat least when i started they conflicted otherwise00:14
stevemarmorgan: i pushed it through00:15
morganthe cache thing or the LDAP thing?00:15
morgancause...00:15
morgan:P00:16
morgani might cheer if you pushed the cache thing through00:16
*** shoutm_ has quit IRC00:20
*** shoutm has joined #openstack-keystone00:21
*** sdake has joined #openstack-keystone00:22
*** mylu has quit IRC00:35
*** sdake has quit IRC00:36
*** henrynash has joined #openstack-keystone00:42
*** ChanServ sets mode: +v henrynash00:42
*** mylu has joined #openstack-keystone00:43
*** mylu has quit IRC00:46
*** daemontool has quit IRC00:47
dimsstevemar : where is pydev_debug_host config option defined?00:49
morgandims: uhmmmmmmmm00:50
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: [WIP] Delay using threading.local() - Not ready for Review :)  https://review.openstack.org/28496500:52
*** ayoung has joined #openstack-keystone00:52
*** ChanServ sets mode: +v ayoung00:52
dimsah "pydev-debug-host"00:54
*** shoutm_ has joined #openstack-keystone00:56
openstackgerritBrad Pokorny proposed openstack/keystonemiddleware: Update documentation for running tests  https://review.openstack.org/28499700:57
*** RichardRaseley has quit IRC00:57
*** shoutm has quit IRC00:58
*** mylu has joined #openstack-keystone00:58
*** vilobhmm11 has quit IRC00:59
*** fpatwa_ has joined #openstack-keystone00:59
*** jasonsb has joined #openstack-keystone01:01
*** mylu has quit IRC01:03
*** fpatwa_ has quit IRC01:03
*** mylu has joined #openstack-keystone01:04
*** mylu has quit IRC01:06
*** ninag has quit IRC01:09
*** vilobhmm11 has joined #openstack-keystone01:10
roxanaghehi lhcheng, any strong opinions on the websso regions implementation on this patch https://review.openstack.org/#/c/279355/8 ?01:13
patchbotroxanaghe: patch 279355 - horizon - Add a configurable websso keystone url01:13
roxanaghelhcheng, I'm trying to see if we want a separate list like WEBSSO_REGIONS or we want to enhance the existing AVAILABLE_REGIONS list01:14
morganroxanaghe: oh hai01:14
morganroxanaghe: :) /me waves01:15
roxanaghehey morgan :)01:15
*** mylu has joined #openstack-keystone01:15
roxanaghehow's the coffee in Portland?01:15
*** EinstCrazy has joined #openstack-keystone01:16
morganamazing!01:16
*** mylu has quit IRC01:17
*** mylu has joined #openstack-keystone01:18
jamielennoxmorgan, stevemar: should bootstrap update endpoints that are already created but different?01:21
ayoungmorgan, so, as I rip out various revoke rules, the one that is now tripping me up is the roles.  I a user loses a role on a project, and they have no roles at the end, the token should be invalid.  If they have two roles, and lose one, when you validate the token, it should show the one role01:21
ayoungbut...01:22
*** davechen_afk is now known as grassy01:22
ayoungI'm modifying the test, and a role is deleted, but the token still has it at the end of the provider when validate is called01:22
*** davechen1 has joined #openstack-keystone01:22
ayoungit feels like a cache error01:22
ayoungshouldn't a delete or a grant invalidate the cache?01:23
*** mylu has quit IRC01:23
*** jasonsb has quit IRC01:25
*** arunkant_ has quit IRC01:25
openstackgerritDolph Mathews proposed openstack/keystone: Enable LDAP connection pooling by default  https://review.openstack.org/28500801:29
dolphmi assume LDAP connection pooling was only disabled by default because it was a new feature 3 or 4 releases ago? ^01:29
davechen1stevemar: replied to your comments for this bug - https://bugs.launchpad.net/keystone/+bug/1549705.01:30
openstackLaunchpad bug 1549705 in OpenStack Identity (keystone) "migrate DB failed due to password cannot be null" [Undecided,New] - Assigned to Dave Chen (wei-d-chen)01:30
*** davechen1 is now known as davechen01:30
davechenthis might just a sql issue, will dig into this.01:31
*** roxanaghe has quit IRC01:34
*** jasonsb has joined #openstack-keystone01:35
*** lhcheng has quit IRC01:38
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: [WIP] Delay using threading.local() - Not ready for Review :)  https://review.openstack.org/28496501:39
*** EinstCrazy has quit IRC01:40
*** mylu has joined #openstack-keystone01:41
*** su_zhang_ has quit IRC01:41
*** su_zhang has joined #openstack-keystone01:41
*** EinstCrazy has joined #openstack-keystone01:42
*** su_zhang has quit IRC01:45
*** dims has quit IRC01:49
*** chlong_ has joined #openstack-keystone01:49
*** gyee has quit IRC01:55
*** annasort has joined #openstack-keystone01:55
*** fangxu has quit IRC01:59
*** mylu has quit IRC02:00
*** csoukup has joined #openstack-keystone02:05
*** mylu has joined #openstack-keystone02:08
*** csoukup has quit IRC02:09
*** diazjf has joined #openstack-keystone02:10
*** diazjf has quit IRC02:13
*** jasonsb has quit IRC02:13
*** rk4n has quit IRC02:14
*** jasonsb has joined #openstack-keystone02:14
*** shoutm_ has quit IRC02:14
*** rk4n has joined #openstack-keystone02:14
ayoungmorgan, lbragstad, with fernet, once a token is passed in to validate, how are the roles on it populated?  Could that come out of cache somewhere?02:14
*** shoutm has joined #openstack-keystone02:15
*** igornsa has joined #openstack-keystone02:20
*** knikolla has joined #openstack-keystone02:21
*** igornsa has quit IRC02:26
*** henrynash has quit IRC02:29
*** jasonsb has quit IRC02:32
*** rk4n has quit IRC02:32
*** mylu has quit IRC02:34
*** fangxu has joined #openstack-keystone02:34
*** mylu has joined #openstack-keystone02:35
*** fangxu has quit IRC02:36
*** mylu has quit IRC02:39
*** browne has quit IRC02:39
*** dan_nguyen has quit IRC02:39
ayoungOK, yeah, it is coming out of persistence...02:39
*** vilobhmm11 has quit IRC02:40
*** david-lyle has quit IRC02:41
*** vilobhmm11 has joined #openstack-keystone02:42
*** fpatwa_ has joined #openstack-keystone02:44
*** fawadkhaliq has joined #openstack-keystone02:48
*** fpatwa_ has quit IRC02:50
dstaneki wrote a book chapter as a review comment :-D02:51
*** vilobhmm11 has quit IRC02:56
*** pushkaru has quit IRC03:05
stevemardstanek: if you're still up, want to take another whack at the truncated patch? https://review.openstack.org/#/c/280162/03:06
patchbotstevemar: patch 280162 - python-keystoneclient - Support `truncated` flag returned by identity service03:06
stevemardstanek: i appreciate your chapter03:06
*** D4RKS1D3 has quit IRC03:08
*** dims has joined #openstack-keystone03:10
*** knikolla has quit IRC03:15
*** ianw has quit IRC03:16
*** ianw has joined #openstack-keystone03:19
dstaneksure03:20
*** boris-42 has quit IRC03:24
dstanekstevemar: i disagree about the list traversal - it is definitely happening twice03:24
davechendstanek: nice, this chapter wrote on this patch - https://review.openstack.org/231289?03:24
dstanekstevemar: ...but it appears that the overhead of the function calls for small lists is slower than doing that03:25
dstanekdavechen: that's the one03:25
*** links has joined #openstack-keystone03:26
stevemardstanek: i also want to cut the new release tomorrow :P03:28
stevemardstanek: if that is an incentive :)03:28
*** fpatwa_ has joined #openstack-keystone03:29
dstanekstevemar: +2+A the truncated review03:31
dstanekstevemar: do you have any thoughts on the domain issue i brought up?03:31
stevemardstanek: i think they are legitimate issues03:31
stevemari don't think there is a rush to put that into M03:31
stevemarit should be an internal only change, ideally03:31
stevemarso i don't get why it needs to be in M03:32
*** fawadkhaliq has quit IRC03:32
dstaneki don't know either since it's not really interesting until the other patches merge too03:32
stevemaryeah, and i'm not eager about those either03:33
dstaneknot keen on un-refactoring03:34
*** csoukup has joined #openstack-keystone03:35
stevemardstanek: btw, did you have an opinion on the number of fishbowls/workrooms/meetups we should have in austin?03:35
stevemardstanek: last summit we have 7 / 3 / 203:35
stevemardstanek: dolphm seems to want fewer fishbowls03:36
stevemarwhich have the most amount of folks03:36
stevemari'm inclined to agree03:36
dstaneki would definitely agree. fishbowls are much less productive03:37
stevemari think fishbowls are great for introducing new features, but i think we have enough "features" to pick from at this point03:37
stevemarwe really just need workrooms to argue03:38
stevemar:)03:38
stevemari'll propose 3  / 8  /  203:38
stevemari think the fishbowls are handy to hear real feedback from ops03:39
stevemarboth nova and neutron had 0 workrooms, interesting03:41
dstanekthat sounds good to me. we should have some pretty broad topics for the fishbowls03:41
dstaneklots of fishbowls?03:41
stevemardstanek: yep, 14 for nova and 10 for neutron03:41
stevemarerr, 1203:41
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: Delay using threading.local() to fix check job failure  https://review.openstack.org/28496503:41
dstanekholy crap. i wonder why they are doing that. feels like the exact opposite of the reason that they are thinking about splitting off the dev summit03:42
stevemardstanek: swift OTOH went 2 fishbowls, 12 workrooms03:42
stevemaryeah03:42
stevemarweird03:42
*** browne has joined #openstack-keystone03:42
dstaneki have to find that article again so that i can look at the chart on a real screen.03:43
ayoungCan we own the unified policy session?03:44
stevemarayoung: we can have a general "let's fix authorization / policy session"03:44
ayoungstevemar, that should be fishbowl03:44
stevemarayoung: yep03:44
openstackgerritDave Chen proposed openstack/keystone: Remove the table attributes which have been dropped  https://review.openstack.org/28509503:45
ayoungstevemar  I think it needs to look something like this:03:45
stevemarayoung: we probably need a PCI/DSS fishbowl and a "what the hell are we doing with reseller" fishbowl03:45
ayoungwe are going to propose the top level roles, and the idea of implied roles03:46
ayoungeach of the services then need to come up with "workflows"  and the lowest level roles03:46
ayoungand then...when you create a service during install, the services upload their roles, including the inference rules03:46
ayoungshould be a decent split of responsibilities03:47
stevemarayoung: sure, i think a lot of that needs to be hashed up with other projects03:50
stevemarcause AFAICT, other projects will just do what we recommend03:50
stevemarwe have a lot more "todos" than "discussions" IMO03:50
*** markvoelker has quit IRC03:51
ayoungstevemar, the thing that the services need is an agreement on the set of roles that Keystone will provide.  Then they can say "THis API will expect the Auditor role" in their policy files and use inference rules to make that work03:52
stevemarayoung: yep, we also have a ton of technical debt we need to start paying down in both client and server03:57
stevemarwhich is why i'm leaning toward more work rooms03:57
ayoungstevemar, I'm paying some of that now03:58
stevemarayoung: we have a loooot, everywhere.03:58
*** shoutm_ has joined #openstack-keystone03:59
stevemarbut we more or less have a plan on those, just some details need ironing out03:59
stevemari'll propose 4 / 8 /203:59
ayoungOh...unified delegation03:59
ayoungthat is internal:  workroom03:59
*** shoutm has quit IRC04:01
ayoungstevemar, if I delete a role assignemt (Grant) and then self.assignment_api.get_roles_for_user_and_project and that roles shows up, it sounds like a caching problem. Right?04:06
*** jasonsb has joined #openstack-keystone04:08
*** richm has quit IRC04:10
openstackgerritEric Brown proposed openstack/keystone: Minor community doc edits  https://review.openstack.org/28509904:13
*** spandhe has quit IRC04:14
*** woodster_ has quit IRC04:16
*** brad[] has quit IRC04:17
openstackgerritMerged openstack/python-keystoneclient: Support `truncated` flag returned by identity service  https://review.openstack.org/28016204:18
stevemarayoung: could just still be cached, but yeah, it should be removed04:18
ayoungstevemar, still debugging. I think I was looking at the admin token, not the one being validated.  The auth  code is too complex.  I want to refactor it.04:19
ayoungAh...yep...validating token is using all cached data...04:19
ayoungok04:19
openstackgerritMerged openstack/keystonemiddleware: Update documentation for running tests  https://review.openstack.org/28499704:20
*** vilobhmm11 has joined #openstack-keystone04:25
*** Nirupama has joined #openstack-keystone04:28
openstackgerritJamie Lennox proposed openstack/keystone: Add identity endpoint creation to bootstrap  https://review.openstack.org/28510204:30
jamielennoxmorgan, stevemar: ^04:31
* jamielennox server patch dance04:31
*** shoutm_ has quit IRC04:36
*** shoutm has joined #openstack-keystone04:36
openstackgerritJamie Lennox proposed openstack/keystone: Add identity endpoint creation to bootstrap  https://review.openstack.org/28510204:38
*** vilobhmm11 has quit IRC04:39
*** vilobhmm11 has joined #openstack-keystone04:39
stevemardavechen: commented on https://review.openstack.org/#/c/285095/104:40
patchbotstevemar: patch 285095 - keystone - Remove the table attributes which have been dropped04:40
*** mylu has joined #openstack-keystone04:41
openstackgerritEric Brown proposed openstack/keystone: Minor edits to the configuration doc  https://review.openstack.org/28510504:46
morganjamielennox: sorry drink ing. Might not be in the right place to review.04:50
*** markvoelker has joined #openstack-keystone04:51
jamielennoxmorgan: was just a heads up when you have a minute04:55
ayoungmorgan, I'm having caching problems.  I've rewritten the token validation so that it rebuilds the token every time.  But when it validates after a grant delete, I still see the grant coming from04:56
ayoungroles = self.assignment_api.get_roles_for_user_and_project(04:56
ayoung                user_id, project_id)04:56
*** markvoelker has quit IRC04:56
ayoungjamielennox, you need that, don't you?  You can't add the endpoint until there is an identity endpoint.04:58
*** fawadkhaliq has joined #openstack-keystone04:58
*** shoutm_ has joined #openstack-keystone04:59
*** shoutm has quit IRC05:01
morganayoung: sure will look05:03
jamielennoxayoung: what context?05:03
jamielennoxayoung: from a client pespective i can't do that - but the terms are off05:03
morganSigh05:03
morganSo much beer05:03
ayoungjamielennox, I was looking at your patch05:04
jamielennoxi need to have an identity endpoint in the catalog before i can make most of the ansible work with the user/password that bootstrap created05:04
ayoungyou need an id endpoint in bootstrap don't you05:04
jamielennoxbecause create user, create role etc all need an identity endpoint in catalog05:04
morganayoung: you're approaching it right. Honestku05:04
ayoungmorgan, i've commented out a couple Memoize calls and still see the data...05:04
*** shoutm has joined #openstack-keystone05:04
ayoungI'm wondering if the user had the role assignemnt via two different means: direct and group ...  or something05:05
morganYeah05:05
ayoungmorgan, which makes this interesting.  if a user had the same role two ways before, and they lost one, the token would be revoked.  Now it won't be any different than it was before05:07
*** shoutm_ has quit IRC05:07
ayoungYEP...from group!@05:07
openstackgerritMerged openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/28502705:12
*** sdake has joined #openstack-keystone05:13
*** sdake has quit IRC05:23
openstackgerritMerged openstack/oslo.policy: Updated from global requirements  https://review.openstack.org/28505705:23
*** shoutm has quit IRC05:25
*** mylu has quit IRC05:25
openstackgerritDave Chen proposed openstack/keystone: Remove the table attributes which have been dropped  https://review.openstack.org/28509505:29
davechenstevemar: ;-)05:29
*** shoutm has joined #openstack-keystone05:30
*** fangxu has joined #openstack-keystone05:32
*** fangxu has quit IRC05:32
*** fangxu has joined #openstack-keystone05:33
*** mylu has joined #openstack-keystone05:35
openstackgerritMerged openstack/pycadf: Updated from global requirements  https://review.openstack.org/28506405:36
*** vilobhmm11 has quit IRC05:39
*** su_zhang has joined #openstack-keystone05:43
*** diazjf has joined #openstack-keystone05:58
*** spandhe has joined #openstack-keystone05:59
openstackgerritMerged openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/28506506:02
openstackgerritEric Brown proposed openstack/keystone: Minor edits to the developing doc  https://review.openstack.org/28512006:07
*** vilobhmm11 has joined #openstack-keystone06:09
openstackgerritMerged openstack/keystone: Followup for LDAP removal  https://review.openstack.org/27719606:19
openstackgerritEric Brown proposed openstack/keystone: Remove reference to legacy Ubuntu Precise  https://review.openstack.org/28512306:20
stevemardavechen: thanks! :)06:22
*** links has quit IRC06:26
*** fpatwa_ has quit IRC06:26
openstackgerritEric Brown proposed openstack/keystone: Minor edits to the installation doc  https://review.openstack.org/28512306:27
openstackgerritEric Brown proposed openstack/keystone: Minor edits to the installation doc  https://review.openstack.org/28512306:30
openstackgerritEric Brown proposed openstack/keystone: Minor edits to the installation doc  https://review.openstack.org/28512306:30
*** su_zhang has quit IRC06:34
*** su_zhang has joined #openstack-keystone06:35
*** dims has quit IRC06:37
*** lhcheng has joined #openstack-keystone06:38
*** ChanServ sets mode: +v lhcheng06:38
*** su_zhang has quit IRC06:39
openstackgerritayoung proposed openstack/keystone: Remove unneeded revocation events rebuild token on validation  https://review.openstack.org/28513406:40
*** josecastroleon has joined #openstack-keystone06:48
jamielennoxayoung: if you're still here, i don't think i need the get_roles_for_user_and_project06:49
*** markvoelker has joined #openstack-keystone06:53
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480406:55
openstackgerritJamie Lennox proposed openstack/keystone: Add identity endpoint creation to bootstrap  https://review.openstack.org/28510206:55
*** markvoelker has quit IRC06:57
*** shoutm_ has joined #openstack-keystone06:59
*** jasonsb has quit IRC07:00
*** shoutm has quit IRC07:01
*** lhcheng_ has joined #openstack-keystone07:05
*** rcernin has joined #openstack-keystone07:05
*** lhcheng has quit IRC07:08
*** chlong_ has quit IRC07:26
*** daemontool has joined #openstack-keystone07:31
*** shoutm_ has quit IRC07:31
*** diazjf has quit IRC07:33
*** tomoiaga has joined #openstack-keystone07:39
*** tomoiaga has quit IRC07:43
stevemardavechen: did you get a chance to look at https://bugs.launchpad.net/keystone/+bug/1549705 ?07:47
openstackLaunchpad bug 1549705 in OpenStack Identity (keystone) "migrate DB failed due to password cannot be null" [Undecided,New] - Assigned to Dave Chen (wei-d-chen)07:47
*** spandhe has quit IRC07:50
*** tomoiaga has joined #openstack-keystone07:51
*** mylu has quit IRC07:56
davechenstevemar: yes, i am still work on it.07:59
davechenstevemar: baically it works, and no major changes but i am struggled to write a testcase.08:00
stevemardavechen: you have a patch? post the code, lets take a look08:00
davechenstevemar: debug into the testcase, sigh...08:00
davechenjust add a new line there. :)08:01
stevemardavechen: ah, just made the password column nullable :)08:01
davechenstevemar: not that change.08:02
*** sdake has joined #openstack-keystone08:02
openstackgerritDave Chen proposed openstack/keystone: WIP - Fix the migration issue for the user with null password  https://review.openstack.org/28515208:02
davechenstevemar: since password was designed to be not allow to be null.08:03
davechenjust align with this patch - https://review.openstack.org/#/c/28374608:03
*** sdake has quit IRC08:04
davechenstevemar: so if the password is empty, don't try to insert to an entry into password table.08:04
*** josecastroleon has quit IRC08:05
*** csoukup has quit IRC08:06
*** belmoreira has joined #openstack-keystone08:08
*** josecastroleon has joined #openstack-keystone08:08
openstackgerritMerged openstack/keystone: Remove get_session and get_engine  https://review.openstack.org/28452108:10
*** browne has quit IRC08:11
openstackgerritMerged openstack/keystoneauth: Updated from global requirements  https://review.openstack.org/28502608:11
*** henrynash has joined #openstack-keystone08:11
*** ChanServ sets mode: +v henrynash08:11
davechenstevemar: what do you think? is that okay?08:11
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480408:13
stevemardavechen: looking08:14
davechenstevemar: get some sleep, i will fix the testcase and you can take a look when you wake up.08:15
stevemardavechen: this fails? self.assertTableCountsMatch(USER_TABLE_NAME, LOCAL_USER_TABLE_NAME)08:16
*** shoutm has joined #openstack-keystone08:18
davechenstevemar:  yep, i have no idea why it failed.08:21
davechenstevemar:  no such column: user.name [SQL: u'SELECT count(id) AS tbl_row_count \nFROM (SELECT user.id AS id, user.name AS name, user.extra AS extra, user.password AS password, user.enabled AS enabled, user.domain_id AS domain_id, user.default_project_id AS default_project_id \nFROM user)'].08:22
stevemardavechen: weird...08:24
davechenyep, it's still looking for the columns that have been dropped.08:26
*** fpatwa_ has joined #openstack-keystone08:27
*** shoutm has quit IRC08:29
*** shoutm_ has joined #openstack-keystone08:29
*** shoutm_ has quit IRC08:31
*** fpatwa_ has quit IRC08:31
*** daemontool has quit IRC08:35
*** daemontool has joined #openstack-keystone08:36
openstackgerrithenry-nash proposed openstack/keystone: Projects acting as domains  https://review.openstack.org/23128908:44
*** pnavarro has joined #openstack-keystone08:52
*** markvoelker has joined #openstack-keystone08:53
*** vilobhmm11 has quit IRC08:54
* stevemar pokes henrynash to comment on the project cascade patch08:55
*** fhubik has joined #openstack-keystone08:57
*** markvoelker has quit IRC08:57
marekdstevemar:09:06
marekda quick question09:06
marekdstevemar: jsut wanted to confirm that we cannot remove non private methods without any deprecations/warnings etc09:06
marekdstevemar: https://review.openstack.org/#/c/279162/52/keystone/auth/plugins/mapped.py -> line 21209:07
patchbotmarekd: patch 279162 - keystone - Shadow users - Shadow federated users09:07
marekdhenrynash: ^^09:08
stevemarmarekd: i think that differs from case to case, in this instance i don't see a harm in it...09:09
marekdaha09:09
marekdi thought bknudson was super strict about that.09:09
stevemarmarekd: no openstack project is using it: http://codesearch.openstack.org/?q=.*keystone.auth.plugins.*mapped&i=nope&files=&repos=09:10
marekdi know thath09:10
stevemarmarekd: well, within reason. this method seems like it should have been private in the first place09:10
marekdstevemar: another thing - https://review.openstack.org/#/c/279162/54/keystone/identity/shadow_backends/sql.py line 4709:11
patchbotmarekd: patch 279162 - keystone - Shadow users - Shadow federated users09:11
stevemarmarekd: BUT, theres no reason for the renaming that ron is doing :)09:11
marekdi am not going to repeat that by raising UserNotFound with unique_id only is not a best thing09:11
stevemarso i'd be OK to revert the change on principle that it is not necessary09:11
marekdbut i am not going to repeat it for the 3rd time.09:11
marekdso i will leave it to you as a PTL09:12
stevemarmarekd: the unique id in this case is the url safe version taht we guess?09:12
marekdno09:13
marekdit's some parameter from the assertion09:13
marekdcan be email09:13
marekdand whole federated user is identified by (proto, idp, unique_id) tuple09:13
marekdso my opinion on that is that  you are loosing information about which user didn't really exist09:14
*** rcernin has quit IRC09:14
stevemarmarekd: commented09:18
henrynashstevemar: will look shortly09:18
stevemarmarekd: right, it's normally the id from the assertion, or if we don't find one, we set it to the URL safe version of the name09:19
marekdstevemar: in fact i'd rather create another type of exception, sth like FederatedUserNotFound where one would put all 3 parameters (proto,idp,unique_id) and those would be included in the warning log message.09:19
marekdthen the operator will know that something went wrong for user logging from idp=A, protocol=B09:20
stevemarmakes sense09:21
stevemarmarekd: sigh, i go to bed09:21
marekdsure sure09:21
marekdsorry for bothering you so late09:21
stevemarmarekd: i am stuck configuring my google idp and keystone09:21
marekdthought you already did it in the past09:21
stevemarmarekd: for some reason the query parameter 'origin' is missing09:21
marekd:(09:21
stevemari did, i like to double check it before we ship m309:22
stevemari'm probably doing something silly09:22
stevemarmeeting in 6 hrs :\09:22
stevemargnite09:22
marekdwhat meeting?09:22
stevemaritnernal stuff and things09:22
marekdah,ok09:22
marekdsee ya then!09:22
* stevemar *salutes marekd*09:23
* marekd SIR, YES SIR!09:23
*** lhcheng has joined #openstack-keystone09:23
*** ChanServ sets mode: +v lhcheng09:23
*** lhcheng has quit IRC09:27
*** lhcheng_ has quit IRC09:27
*** jistr has joined #openstack-keystone09:27
*** rcernin has joined #openstack-keystone09:28
openstackgerritDave Chen proposed openstack/keystone: Fix migration issue for the user with null password  https://review.openstack.org/28515209:32
*** pnavarro has quit IRC09:35
*** pnavarro has joined #openstack-keystone09:35
*** fawadkhaliq has quit IRC09:37
*** fangxu has quit IRC09:41
*** fangxu has joined #openstack-keystone09:41
*** EinstCrazy has quit IRC09:55
*** davechen has left #openstack-keystone09:55
*** grassy is now known as davechen_afk09:56
*** rk4n has joined #openstack-keystone10:16
*** daemontool has quit IRC10:16
*** fpatwa_ has joined #openstack-keystone10:28
openstackgerritMerged openstack/keystone: Updated from global requirements  https://review.openstack.org/28502510:32
*** fpatwa_ has quit IRC10:32
openstackgerritMerged openstack/keystone: Move admin_token_auth before build_auth_context in sample paste.ini  https://review.openstack.org/28137210:32
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480410:34
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480410:35
*** markvoelker has joined #openstack-keystone10:54
*** markvoelker has quit IRC10:58
*** csoukup has joined #openstack-keystone11:02
*** rk4n has quit IRC11:06
*** henrynash has quit IRC11:06
*** rk4n has joined #openstack-keystone11:07
bjornarWhat is the type of the compute endpoint supposed to be? According to default_catalog.templates it is computev21, but "openstack compute service list" is not able to find this endpoint with status: publicURL endpoint for compute service not found11:10
*** rk4n has quit IRC11:12
*** rk4n has joined #openstack-keystone11:13
*** fhubik has quit IRC11:19
*** davechen has joined #openstack-keystone11:26
*** davechen1 has joined #openstack-keystone11:31
*** EinstCrazy has joined #openstack-keystone11:32
*** davechen has quit IRC11:33
*** rk4n has quit IRC11:36
*** rk4n has joined #openstack-keystone11:36
openstackgerritDave Chen proposed openstack/keystone: Fix the migration issue for the user with null password  https://review.openstack.org/28515211:38
samueldmqstevemar: hi, I am working on 243585 right now11:50
*** davechen1 has quit IRC11:53
openstackgerritMerged openstack/keystone: Minor community doc edits  https://review.openstack.org/28509912:03
*** rk4n has quit IRC12:04
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480412:04
*** fangxu has quit IRC12:09
*** fangxu has joined #openstack-keystone12:11
*** krotscheck_dcm is now known as krotscheck12:13
*** daemontool has joined #openstack-keystone12:14
samueldmqdstanek: hi, sorry I had gone afk yesterday12:17
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: API support for project cascade update  https://review.openstack.org/24358512:18
samueldmqdstanek: stevemar: I have updated the proposal for policy cascade enforcement in the docstring here12:19
samueldmqhttps://review.openstack.org/#/c/243585/25/keystone/common/controller.py12:19
patchbotsamueldmq: patch 243585 - keystone - API support for project cascade update12:19
samueldmqdstanek: stevemar: please let me know what you think about it, so I can update the code accordingly12:19
samueldmqayoung or anyone else willing to look at it too :)   ^12:20
*** sdake has joined #openstack-keystone12:29
*** raildo-afk is now known as raildo12:32
*** rk4n has joined #openstack-keystone12:34
samueldmqraildo: htruta: you may also want to take a look at https://review.openstack.org/#/c/243585/25/keystone/common/controller.py12:39
patchbotsamueldmq: patch 243585 - keystone - API support for project cascade update12:39
samueldmqraildo: htruta: the proposal in the comment12:39
*** markvoelker has joined #openstack-keystone12:40
*** markvoelker has quit IRC12:44
*** rk4n has quit IRC12:47
raildosamueldmq: I'll, thanks12:48
*** rk4n has joined #openstack-keystone12:51
*** pauloewerton has joined #openstack-keystone12:53
raildosamueldmq: wow... this is getting a way to be more complex that I thought =/ Would not it be simpler to follow the second suggestion from henrynash?12:53
samueldmqraildo: yes, the other option is way less complex, the question is whether that's what we want or not12:54
*** gordc has joined #openstack-keystone13:00
raildosamueldmq: we have the project context and we want to rescope the token for every subproject in the subtree. Follow this docstring, we need get the project token type, and then follow the same workflow for every subproject, right?13:03
samueldmqraildo: yes, exactly13:04
raildoon domain scoped token case, we can't perform this action, since the subprojects are not domains13:04
raildosamueldmq: doesn't make sense just get a project scoped token?13:05
samueldmqraildo: and if it fails, just try with the original token, that would pass in the case the policy was simply: "project_update": ""13:05
samueldmqraildo: ah, that you said above is only valid for project scoped tokens13:05
samueldmqraildo: domain scoped tokens do not change at all, we use the same token for all projects13:05
samueldmqraildo: this is point 1) in the docstring, point 2 is for project scope tokens13:06
raildosamueldmq: got it13:06
raildosamueldmq: yeap... I agree with this behaviour13:06
raildosamueldmq: if we are following the first suggestion, this is the best solution that we ahve13:06
samueldmqraildo: nice; I think this is the right way to go13:07
raildohave*13:07
samueldmqraildo: I will discuss with others before updating the code13:07
samueldmqraildo: now I am reviewing reseller13:07
samueldmqraildo: we need that in until MOnday13:07
raildosamueldmq: sure, no problem, htruta are not here, right now, but I'll talk with him asap13:07
samueldmqraildo: otherwise won't land in M313:07
raildosamueldmq: sure, dstanek reviewed this patch a lot yesterday13:09
raildothanks dstanek :P13:09
*** henrynash has joined #openstack-keystone13:09
*** ChanServ sets mode: +v henrynash13:09
samueldmqhenrynash: hi! good morning13:10
raildosamueldmq: henrynash is the perfect guy to see your comment on the update cascade patch :D13:10
henrynashsamuedlmq: hi…just looking the latest patch on cascade13:10
samueldmqhenrynash: perfect, I submitted it with the proposed approach in the docstring13:11
samueldmqhenrynash: here: https://review.openstack.org/#/c/243585/25/keystone/common/controller.py13:11
patchbotsamueldmq: patch 243585 - keystone - API support for project cascade update13:11
samueldmqhenrynash: meanwhile I am reviewing reseller13:11
raildosamueldmq: I'll be working on fernet tokens, but everything that you need about reseller/cascade, just ping me :)13:12
henrynashsamueldmq: ok (and on reseller- you will see that i have gone ahead an changed the V8 legacy wrapper to map calls back onto drive domain methods for those projects that are actingas domains)13:12
samueldmqraildo: perfect, thanks13:12
samueldmqhenrynash: yes, same reasoning as you did for domain roles, right?13:13
henrynashsasamueldmq: yes13:13
samueldmqhenrynash: perfect13:13
henrynashsamueldmq: note dstanek’s comment, that maybe (in retorspect, and now that we have only one V9 driver and a rquirement for backward driver comapability) we should have done a lot of this in the driver itself….I’m not yet sure…but mulling that idea13:14
*** daemontool has quit IRC13:15
*** daemontool has joined #openstack-keystone13:16
*** daemontool has quit IRC13:17
samueldmqhenrynash: ok, will look at that too13:18
*** daemontool has joined #openstack-keystone13:18
*** markvoelker has joined #openstack-keystone13:20
*** tomoiaga has quit IRC13:23
henrynashsamueldmq: added a comment to update/cascade….13:23
*** daemontool has quit IRC13:24
raildohenrynash: good point13:25
*** brad[] has joined #openstack-keystone13:25
samueldmqhenrynash: re-replied :)13:26
henrynashsamuedlmq: I think you were agreeding….is that right?13:28
samueldmqhenrynash: no, I don't care about the roles the user has in subprojects13:28
samueldmqhenrynash: what I want to ensure is that: 'user x also can perform the same operation on every subproject'13:29
samueldmqhenrynash: let me give you an example13:29
henrynashsamueldmq: so we agree on that,13:29
samueldmqhenrynash: "X -> Y" is a parent, child13:29
henrynashsamuedlmq: ok13:29
samueldmqhenrynash: user have role r1 on X and r2 on Y13:29
henrynashlet’s say user has roles r1 and r2 on Y13:30
samueldmqhenrynash: policy says : 'update_project': '(role:r1 and project_matches) OR (role:r2 and project_matches)'13:30
samueldmqhenrynash: the user can do cascade update on X13:30
samueldmqhenrynash: if user has roles r1 and r2 on Y it also works, but if he only has r2 it still works13:31
henrynashsamueldmq: hmm, I understand why you area saying what you are….I have to say I am uneasy about bascially expanding the token roles for sub projects….it just feels wrong13:32
samueldmqhenrynash: we are't exapnding the current token13:33
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Adds parent_id to project model in models.py  https://review.openstack.org/28530113:33
samueldmqhenrynash: we simulate a new token, new creds13:33
samueldmqhenrynash: as the user had effectivelly a token on the subproject on hands13:33
henrynashsamuelldmq: yep, agreed…..without a formal authz setp!!!!13:33
samueldmqhenrynash: exactly, this is like: 'if he had asked for a token in this subproject, he'd have this!'13:33
samueldmqhenrynash: so let's now check if he'd be authorized13:34
samueldmqhenrynash: I dont care about the roles/whatever he has in the subprojects, let's get it and try policy enforcement13:34
samueldmqhenrynash: so are we in agreement ?13:35
*** fawadkhaliq has joined #openstack-keystone13:36
henrynashsamuedlmq: I do understand your logic…..I don’t like that we are (effectively) issuing them a new one-time-use token…but without running with the auth/token code that might make other chekcs (e.g. nobody gets role Y during production hours)13:36
henrynashsamueldmq: so,no, I don;t think we are in ageement - we just hev different POV on this…..I’d liek ayoung to weigh in….he’s an expert in delgation or roels etc.13:37
samueldmqhenrynash: if token issuance (regardless workflow) uses the roles of a ?effective call to list_role_assignmetns, we're doing it right13:37
samueldmqhenrynash: if they do logic around the return of a ?effective call, I'd argue they're doing wrongly/bad code?13:38
samueldmqhenrynash: also considering only a subset of roles from the parent would make the api understanding still harder13:39
henrynashsamueldmq: I can certaily imagine peopel doing that……..and I wouldn’t call it wrong  - I agree nobody does today13:39
dstaneksamueldmq: sure i'll look13:40
henrynashsamuedlmq: it’s only a subset of roles form the orgional ones the tokn had….eg.g. a trust might have restricted roels in it (i.e. less than the roles the trstor has on that project)13:40
samueldmqhenrynash: for now, I'd explain that API as : 'cascade acts like the user asks a token for each project in the tree (with the same workflow) and tries to performe the operation project by project with its corresponding token'13:40
henrynashsamuedlmq: agreed that is the current proposal….let’s get ayoung’s view on this13:41
samueldmqhenrynash: for trusts, the user need to have trusts for every project in the subtree13:41
samueldmqhenrynash: sure13:41
samueldmqhenrynash: does trust work with inherited role assignments ?13:42
samueldmqhenrynash: and/or group assingmetns ?13:42
henrynashdstanek: see my coments regarding projects as a domain….maybe I am missing some other sublety…but I tink we are now provding backeard comaptibility13:42
henrynashsamuedlmq: not sure, I’d have to look!13:43
dstanekhenrynash: how does the thirdparty driver's create_domain get called?13:43
samueldmqdstanek: perfect, looking forward to see your view on it13:43
henrynashdtsanek: it’s in the v8legacy wrapper13:44
*** ninag has joined #openstack-keystone13:44
dstanekhenrynash: but that itself won't get called because manager.create_domain no longer calls driver.create_domain right?13:45
henrynashdstanek: but the wrapper project calls check teh call is for a project acting as a domain…and if so, calls the domain driver method13:45
samueldmqhenrynash: in the way you argued about ?cascade operations, we would be saying that ?cascade calls are designed to work with inherited role assignments13:46
samueldmqhenrynash: that way we only get subsets ... interesting, if we make that argument of inherited role assignmetns, it makes sense t me13:47
henrynashsamueldmq: it’s a bit liek we are saing cascade is an inherited trust down the tree13:48
henrynashsamuedlmq: i”m not 100% for this…just trying to work out hwy I feel uneasy about teh current proposal13:48
dstanekhenrynash: ok, i'll have to go over this again. this 'is_domain' makes my immediately want to refactor13:49
samueldmqhenrynash: cool, let's get dstanek and ayoung opinions on it13:50
dstaneksamueldmq: on something different?13:50
samueldmqdstanek: yes, on the ?cascade thing :)13:50
openstackgerritMichael Krotscheck proposed openstack/keystone: Moved CORS middleware configuration into oslo-config-generator  https://review.openstack.org/28530813:50
dstanekah, ok13:50
samueldmqdstanek: call it is_identity_container13:50
samueldmqdstanek: (on the is_dmain thing this time)) ^13:50
*** edmondsw has joined #openstack-keystone13:50
henrynashdstanek: i *think* we are nowing doing (effectively) what you would achieve by push all this into teh V9 driver….see my comment reply as to at least why we got to where we are!13:51
krotscheckmorgan: ^^ That seems to work. Can you take a look at it when you get a chance?13:52
samueldmqkrotscheck: nice, tjcocozz_ may want to test it again, as he had setup an env for that :)13:53
samueldmqtjcocozz_: :-)13:53
*** dims has joined #openstack-keystone13:54
*** daemontool has joined #openstack-keystone13:54
krotscheckNo worries.13:59
krotscheckNow all I need is for everyone to agree that this is the way we want it to work in Mitaka, and then get enough help to lnd it in the other 22 projects.14:00
samueldmqkrotscheck: 22 ? simple :)14:02
samueldmqkrotscheck: have you landed the first proposal on all of them already?14:02
*** henrynash has quit IRC14:02
*** richm has joined #openstack-keystone14:03
openstackgerritStuart McLaren proposed openstack/keystonemiddleware: Add python-memcached to requirements  https://review.openstack.org/28531514:06
* krotscheck slaps samueldmq with a large trout14:08
samueldmqhehe14:09
openstackgerritBrant Knudson proposed openstack/keystone: V2 operations create default domain on demand  https://review.openstack.org/28477814:10
*** EinstCrazy has quit IRC14:14
*** petertr7_away is now known as petertr714:15
*** daemontool has quit IRC14:16
*** therve has left #openstack-keystone14:16
*** daemontool has joined #openstack-keystone14:16
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: Delay using threading.local() to fix check job failure  https://review.openstack.org/28496514:16
krotscheckOn a related note, is trusted_dashboards still a thing?14:17
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: Delay using threading.local() to fix check job failure  https://review.openstack.org/28496514:18
*** daemontool_ has joined #openstack-keystone14:18
openstackgerritDolph Mathews proposed openstack/keystone: Enable LDAP connection pooling by default  https://review.openstack.org/28500814:19
*** jsavak has joined #openstack-keystone14:20
*** daemontool has quit IRC14:22
EmilienMayoung, stevemar: I need your science14:28
EmilienMhave you seen that already ? http://logs.openstack.org/76/284876/4/check/gate-puppet-keystone-puppet-beaker-rspec-dsvm-trusty/161cc03/console.html#_2016-02-26_11_27_31_95014:28
*** Nirupama has quit IRC14:29
EmilienMI think keystone.credential.backends.ldap.Credential does not work anymore, I might need to just use "ldap"14:32
*** sdake has quit IRC14:35
*** su_zhang has joined #openstack-keystone14:36
*** dansmith is now known as superdan14:36
*** lmiccini has joined #openstack-keystone14:39
*** knikolla has joined #openstack-keystone14:43
raildolbragstad: ayoung about a failed test on make fernet default provider...  there is a failed test "test_belongs_to_no_tenant" that was impacted with this change https://review.openstack.org/#/c/258650/26/keystone/token/provider.py14:48
patchbotraildo: patch 258650 - keystone - [WIP]Make fernet default token provider14:48
raildolbragstad: on token_belongs_to14:48
raildolbragstad: I want to know what is the expected behavior for fernet token on v2 api? This should work properly?14:49
lbragstadraildo checking14:52
*** woodster_ has joined #openstack-keystone14:54
*** fawadkhaliq has quit IRC14:55
*** slberger has joined #openstack-keystone14:56
*** daemontool_ has quit IRC15:01
*** jsavak has quit IRC15:01
*** jsavak has joined #openstack-keystone15:02
*** daemontool has joined #openstack-keystone15:05
*** sdake has joined #openstack-keystone15:05
*** jsavak has quit IRC15:06
*** jsavak has joined #openstack-keystone15:07
*** sigmavirus24_awa is now known as sigmavirus2415:07
openstackgerritMichael Krotscheck proposed openstack/keystone: Moved CORS middleware configuration into oslo-config-generator  https://review.openstack.org/28530815:08
krotscheckblah blah pep8 grumble grumble15:08
*** jsavak has quit IRC15:08
*** jsavak has joined #openstack-keystone15:09
*** jorge_munoz has joined #openstack-keystone15:32
*** henrynash has joined #openstack-keystone15:34
*** ChanServ sets mode: +v henrynash15:34
*** jsavak has quit IRC15:34
openstackgerritStuart McLaren proposed openstack/keystonemiddleware: Add python-memcached to requirements  https://review.openstack.org/28531515:34
*** timcline has quit IRC15:35
*** jsavak has joined #openstack-keystone15:37
*** roxanaghe has joined #openstack-keystone15:40
*** jsavak has quit IRC15:41
*** jsavak has joined #openstack-keystone15:42
*** belmoreira has quit IRC15:43
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Shadow federated users  https://review.openstack.org/27916215:47
*** sdake has quit IRC15:47
*** timcline has joined #openstack-keystone15:47
*** rderose has joined #openstack-keystone15:48
*** diazjf has joined #openstack-keystone15:49
*** spandhe has joined #openstack-keystone15:49
*** roxanaghe has quit IRC15:49
stevemarEmilienM: i don't think "keystone.credential.backends.ldap.Credential" ever existed..15:50
EmilienMyeah15:50
EmilienMstevemar: can you review https://review.openstack.org/#/c/285345/ please?15:51
patchbotEmilienM: patch 285345 - puppet-keystone - use stevedore names for driver / backends15:51
EmilienMit's puppet but you can easily see what I'm doing15:51
rderosestevemar dolphm can we talk about the unique_id and display_name fields for federated users15:51
*** josecastroleon has quit IRC15:51
stevemarEmilienM: yes sir15:51
EmilienMstevemar++15:51
stevemarrderose: sure, whats up15:51
rderosestevemar saw your comment regarding how the id is used (ID is a URL safe representation)15:52
rderosestevemar was planning on mapping the id to unique_id and name to display_name15:52
rderosestevemar can we change the meaning of id to be unique id?15:52
rderosestevemar or, what would you suggest?15:53
stevemarrderose: what's the user_id column for federated_users represent?15:53
*** spandhe has quit IRC15:54
dolphmstevemar: o/15:54
dolphmrderose: o/15:54
rderosestevemar: the foreign key to the id in the user table15:54
dolphmstevemar: the actual user ID presented to openstack15:54
*** diazjf has quit IRC15:55
stevemardolphm: rderose right -- the name coming ffrom the mapping backend is gonna be something like stevemar@ibm.com, and my ID will be some ibm id (123456)15:55
*** diazjf has joined #openstack-keystone15:55
stevemardolphm: rderose that ID doesn't really gel with openstack. i can't assign it roles and it's guaranteed to be unique (domains could assign the same numbers), and if i don't set up that mapping rule, we default the ID to be a url safe version of the name15:56
stevemarcause we something to stick in the token15:56
EmilienMdumb question: where is patchbot code? I want to use it15:58
dolphmstevemar: ++ so the user_id column can basically be a UUID, just like SQL users15:58
dolphmwhereas unique_id = 123456 and display_name=stevemar@ibm.com15:59
rderosestevemar: which it is, user_id is UUID15:59
rderosedolphm ++15:59
dolphmso your display name coming from the IdP could change, but that unique ID coming from that IdP via that protocol should always map to the same user_id16:00
openstackgerritTrevor McCasland proposed openstack/keystone: Add validation parameter "max_name_size"  https://review.openstack.org/28539316:01
dolphmEmilienM: just went looking for patchbot ... and i have no idea16:02
dolphmEmilienM: ask in -infra maybe?16:02
*** browne has joined #openstack-keystone16:02
*** jsavak has quit IRC16:03
*** jsavak has joined #openstack-keystone16:03
SamYapleayoung morgan wont the "no default domaon created with db_sync" cause alot of the same drama as the admin token thing did?16:04
morganEmilienM: notmyname's repo on github16:04
morganSamYaple: not with bknudson's second fix16:05
bknudsonno drama!!!!16:05
morgandolphm: ^ patchbot16:05
EmilienMmorgan: ok thx16:06
morganCalled "patches"16:06
SamYaplewhat was the second fix?16:06
SamYaplei may have missed that16:06
morganIt's a supybot plugin16:06
EmilienMhttps://github.com/notmyname/Patches16:06
morganEmilienM: yep16:06
rderosestevemar dolphm: so are we good with mapping the "id" to "unique_id" and "name" to "display_name"?16:07
rderosestevemar dolphm: and do we want to keep the same logic:16:07
rderosesetting the id to a url safe representation of the name16:07
dolphmrderose: the ID and name coming out of the mapping?16:07
rderosedolphm: yes16:07
*** daemontool has quit IRC16:07
dolphmrderose: link me to code before i say yes :)16:08
rderosehttps://review.openstack.org/#/c/279162/54/keystone/auth/plugins/mapped.py16:08
patchbotrderose: patch 279162 - keystone - Shadow users - Shadow federated users16:08
rderosestevemar dolphm: and do we want to keep this for setting the name:16:09
rderoseuser.get('name') or context['environment'].get('REMOTE_USER')16:09
rderose* display_name = user.get('name') or context['environment'].get('REMOTE_USER')16:10
*** ChanServ sets mode: +v topol_16:15
*** topol_ is now known as topol16:15
dolphmrderose: i don't understand all the conditional stuff going on in that method... stevemar, why would the mapping not return an ID?16:16
*** henrynash has quit IRC16:17
dolphmstevemar: marekd: left questions for you in https://review.openstack.org/#/c/279162/54/keystone/auth/plugins/mapped.py16:19
patchbotdolphm: patch 279162 - keystone - Shadow users - Shadow federated users16:19
dolphmstevemar: marekd: also, can one of y'all help write the test in https://review.openstack.org/#/c/284943/ -- i'm really hesitant to merge the "shadow federated users" patch without seeing support for local role assignments working16:20
patchbotdolphm: patch 284943 - keystone - Shadow users - Concrete role assignments for feder...16:20
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Concrete role assignments for federated users  https://review.openstack.org/28494316:22
*** dims has quit IRC16:22
*** pnavarro has quit IRC16:22
*** roxanaghe has joined #openstack-keystone16:23
marekddolphm: let me look16:24
rderosedolphm: regarding the conditional stuff, there are 2 conditions:16:27
rderose1. if "name" is not supplied, set it to "context['environment'].get('REMOTE_USER')" or "id"16:27
rderose2. if "id" is not supplied, then set it to the "name"16:27
ayoungSamYaple, so bknudson has a patch out that will create the default domain on demand.  I think it is a cool idea16:28
marekddolphm: in https://review.openstack.org/#/c/279162/54/keystone/auth/plugins/mapped.py i don't actually have any problem  (and never had) with changing the names of local variables in setup_username()16:28
patchbotmarekd: patch 279162 - keystone - Shadow users - Shadow federated users16:28
bknudsonayoung: SamYaple: https://review.openstack.org/#/c/284778/16:29
patchbotbknudson: patch 284778 - keystone - V2 operations create default domain on demand16:29
*** rk4n has quit IRC16:29
marekddolphm: if you are asking on why this logic was implemented in the first place (deriving user_id from user_name) the reason was that if the user_id was not specified in the mapping we had to come up with something. It was more like mimicing of 'classic' users creation where you may specify the name, but will not specify id as it was random generated user.16:30
ayoungEmilienM, ImportError: No module named ldap could be an RPM problem.  Did the python-ldap RPM dependency get dropped?16:30
EmilienMayoung: I ran Ubuntu16:30
ayoungEmilienM, shhh16:30
EmilienMand yes, the DEB is installed16:30
ayoungdon't ever admit that16:30
EmilienMayoung: it's upstream CI :-P16:30
ayoungha16:30
ayoungI didn't know we had an LDAP credential back end16:31
EmilienMbut yeah, don't tell my manager16:31
ayoungI don't think we do.16:31
*** rcernin has quit IRC16:31
*** jsavak has quit IRC16:32
*** jsavak has joined #openstack-keystone16:33
marekddolphm: rderose i am actually unsure how role assignments for fed users would work - after the first login an entry is created in the backend and until operator assigns some roles the user is powerless and can access literally nothing?16:33
marekdrderose: for the display_name - are you using it anywhere?16:33
rderosemarekd no, I'm not using display_name, I imagine it would be used in a UI or part of an API call16:35
ayoungEmilienM, I'm really puzzled.  I wrote all the LDAP backends m with the exception of the Role one that Henry wrote by splitting the assignment one. I never wrote an LDAP backend.  How is that even getting into the mix?16:35
marekdbecause from a short discussion with dolphm it looks that the rest of the keystone will always execute operation on backend.sql.User object and everybody would call User.name property16:35
ayoungI never wrote and LDAP credential backend that is16:35
marekdrderose: ^^16:35
marekdrderose: and AFAIR it can return proper name if the user is actually LocalUser and None otherwise.16:36
marekdwhich does not make sense to me since you wanted to unify all types of users.16:36
*** csoukup has quit IRC16:37
*** spandhe has joined #openstack-keystone16:38
rderosemarekd: regarding assigning roles, once the fed user is mapped to a user and has a user id, an admin can then assign roles to that user16:38
stevemardolphm: while looking at https://review.openstack.org/#/c/284943/ ... what about fixing the mapping engine to not blow up if there's no "group" found?16:38
patchbotstevemar: patch 284943 - keystone - Shadow users - Concrete role assignments for feder...16:38
ayoungraildo, OK...let's look16:39
marekdrderose: so, in the time before me logging for the first time and operators action i can do nothing16:39
*** daemontool has joined #openstack-keystone16:40
rderosemarekd correct, until you get your first unscoped token, the operator would not be able to assign you roles16:40
marekdunless some groups were assigned to myself as part of mapping process (mapping engine)16:41
rderosemarekd you still wouldn't be able to make local role assignments without an entry in the user table16:42
marekdrderose: i know16:42
marekdi just want to make sure you are not blocking it, or not going to for now at least.16:42
marekd:-)16:42
rderosemarekd :)16:42
marekdok, what about display_name?16:43
rderosemarekd yes, currently only LocalUser.name is used16:44
rderosemarekd, so you are right, name would return None for federated users16:44
SamYapleayoung: bknudson cool. thannks for the info16:44
*** gyee has joined #openstack-keystone16:44
*** ChanServ sets mode: +v gyee16:44
bknudsonSamYaple: can you try it out with your deployer?16:44
*** jasonsb has joined #openstack-keystone16:44
SamYaplebknudson: sure thing!16:44
marekdrderose: ok, but why can't we return display_name then?16:45
marekd(and why it's called display_name for federated users)16:45
rderosemarekd we can, we could just change the hybrid property to check for this16:45
marekdrderose: unless there is some logical reason for not doing this i'd simply do this.16:46
rderosemarekd but I was thought of display_name having a different meanting than username16:46
marekdlike?16:46
rderosemarekd display_name being more "Ron De Rose" and username being more "rderose"16:46
rderosedolphm: ^^ is that your understanding as well?16:47
rderosemarekd I think of display_name as the display-name in an identity store; which isn't typically the username16:51
marekdrderose: dolphm: I will leave this decision to Dolph, but my opinion is that you are already writing logic that will make others (Horizon etc) do if/else clauses and handle some strange corner cases with names. Either you unify all types of users and they all at least pretend to have similar set of attributes or you keep them separate and then it's ok to split attribute sets...16:51
* dolphm is reading back16:52
rderosemarekd I think it would make sense to have a display name attribute for localusers16:52
dolphm(the goal is fewer edge cases for other projects...)16:52
*** csoukup has joined #openstack-keystone16:53
marekdmy unserstanding of shadow users is that we must have >1 types of users but for all the other services thy don't really care and always see a user with an id.16:53
dolphmrderose: ah, can the expression for User.name basically be "local_user.name or federated_user.display_name" ?16:53
rderosedolphm: yes16:53
dolphmsort of left join a local user name, and then left join a federated display name otherwise16:53
dolphmrderose: that would be a good balance between existing behavior and not doing anything funky in the API (null names in the API are surely going to break something)16:54
dolphmmarekd: does that make sense?16:54
marekddolphm: yes, i didn get why it's not like that and what was the reason splitting localuser.name and feduser.display_name. Ron is explaining it right now.16:54
marekddolphm: i think so.16:54
rderosedolphm: okay16:55
dolphmrderose: we might also want to update the display_name we store on each authentication, in case it changes16:55
dolphmit should be reflected in horizon on next auth16:55
rderosedolphm: good point16:55
marekddolphm: ++16:55
ayoungjorge_munoz, dolphm, I'm not done yet but :   https://review.openstack.org/#/c/285134/  removes most of the revocation events.  The cost is that we can no longer cache token validations, but since those work with all cached data anyway, it should not be too expensive.16:56
patchbotayoung: patch 285134 - keystone - Remove unneeded revocation events rebuild token on...16:56
ayoungI'm going to split that up into two patches once I get it working16:56
marekdok i need to logout now, i shall look into that later on.16:57
dolphmayoung: interesting tradeoff16:57
ayoungand it should make your lives and lbragstad 's work on Fernet easier16:57
ayoungdolphm, yeah;  you need to do a liveness check on each field16:57
dolphmdstanek would also be interested ^16:57
ayoungif we always reassemble the token, we get that in place16:57
dolphmayoung: "need" :P16:57
ayoungI'm workiong on it.  I was up til 2 trying to get the tests to run, but then paid for it this morning16:58
lbragstadnonameentername ping - you around? I have a spec for MFA that was dependent on your TOTP implementation. I was curious if you've seen it? I just remember you saying that you were working on specs.16:58
dstanekdolphm: indeed, thanks for the heads up16:58
dolphmayoung: what if i'm totally willing to return stale tokens for 60 seconds, or something?16:58
dolphmeven after a domain has been disabled or whatever16:58
dolphmlbragstad: he's got a credential encryption spec up as an intermediary step16:59
ayoungdolphm, I think that would still require an additional change.  THe current just memoized the token validation resposne, not sure how long that is cached for16:59
dolphmlbragstad: i think it's WIP, last i looked16:59
ayoungit would also mess with a lot of tests16:59
ayoungI'd make it optional, and off by default to start,16:59
lbragstaddolphm nonameentername this is the one that i drafted a while back - https://review.openstack.org/#/c/272287/17:00
patchbotlbragstad: patch 272287 - keystone-specs - Add spec for multifactor authentication17:00
ayoung+101, -718that is how I like my patches....17:02
ayoungDIE LAVACODE DIE!17:02
ayoungJust think of the reduction when we finally remove PKI....17:02
*** jsavak has quit IRC17:02
jorge_munozayoung: So, those changes only check for operation in V3, are we not interested in reducing the revocation events in v2?17:02
ayoungjorge_munoz, its WIP17:03
ayoungI'll get V217:03
*** jsavak has joined #openstack-keystone17:03
ayoungI think that is what I'm hitting next17:03
*** henrynash has joined #openstack-keystone17:04
*** ChanServ sets mode: +v henrynash17:04
ayoung def test_v3_trust_token_get_token_fails(self):17:05
ayoungOK,  so I guess I am still debugging V3 failures...what is the rule there:  I can't do a token-for-token exchange with a trust token, I need to re-execute the trust?17:05
jorge_munozayoung: FYI I was testing this type of change using the tempest test and their run times. Checking if project and domain are enabled doesn’t really help too much with performance, maybe the reduction of deletegrates helps more.17:06
*** vilobhmm11 has joined #openstack-keystone17:07
stevemardolphm: rderose back17:07
rderosestevemar :)17:07
rderosestevemar: does the user_id make sense now? you were saying that it doesn't gel with openstack...17:08
ayoungjorge_munoz,  I think a lot will depend on useage patterns, but it should use all cached data, and not hit the backends.  But this will greatly simplify revocations, and we can further optimize afterwards, too17:09
*** dims has joined #openstack-keystone17:09
*** browne has quit IRC17:09
*** dims has quit IRC17:10
rderosestevemar I just want to kind of agree on 2 things:17:11
rderose1. we can map "id" and "name" from the mapped properties to "unique_id" and "display_name"17:11
rderoseAnd 2, do we want to keep this logic:17:12
rderosedolphm: regarding the conditional stuff, there are 2 conditions:17:12
rderose*. if "name" is not supplied, set it to "context['environment'].get('REMOTE_USER')" or "id"17:12
rderose*. if "id" is not supplied, then set it to the "name"17:12
rderosestevemar ^^ what do think?17:12
*** jasonsb_ has joined #openstack-keystone17:12
*** bknudson_ has joined #openstack-keystone17:12
*** ChanServ sets mode: +v bknudson_17:12
*** xek__ has joined #openstack-keystone17:13
*** spandhe has quit IRC17:13
stevemarEmilienM: finally commented17:14
*** rk4n has joined #openstack-keystone17:14
rderosestevemar: and just to clarify, unique_id is unique within the scope of the IdP17:15
*** pleia2_ has joined #openstack-keystone17:15
stevemarrderose: okay, i agree that it's unique to the idp, just sounds weird17:15
*** Trident has joined #openstack-keystone17:15
*** baffle___ has joined #openstack-keystone17:15
stevemarrderose: say i want to create a role assignment, do i create the role assignment with the unique_id or the user_id (a uuid)17:16
rderosestevemar yeah, I can see that.  we could change it17:16
rderosewith the user_id (uuid)17:16
*** spring_ has joined #openstack-keystone17:16
*** kfox1111_ has joined #openstack-keystone17:16
*** sshen_ has joined #openstack-keystone17:16
*** Nakato_ has joined #openstack-keystone17:17
rderosestevemar the unique_id is only used for identifying the federated user.  user_id would be the id used throughout keystone17:17
stevemarrderose: i think that's why marekd was mentioning to use a uuid instead of the unique id when raising the exception, someone can do a user lookup against that ID and see what it represents17:17
rderosebut if the user is not found, there wouldn't be a user_id17:18
*** rodrigod` has joined #openstack-keystone17:18
rderosestevemar ^17:18
rderosestevemar similar to get_user_by_user_name()17:18
*** jorge_munoz_ has joined #openstack-keystone17:19
rderosestevemar user is not found, exception is thrown with user_id=user_name17:19
*** BrAsS_mO- has joined #openstack-keystone17:19
stevemarrderose: if the user id is not found, we should return back the id that the user supplied?17:20
*** jasonsb has quit IRC17:20
*** timcline has quit IRC17:20
*** jorge_munoz has quit IRC17:20
*** edmondsw has quit IRC17:20
*** xek_ has quit IRC17:20
*** rodrigods has quit IRC17:20
*** miguelgrinberg has quit IRC17:20
*** ekarlso- has quit IRC17:20
*** jdennis has quit IRC17:20
*** Nakato has quit IRC17:20
*** anteaya has quit IRC17:20
*** krotscheck has quit IRC17:20
*** bknudson has quit IRC17:20
*** davechen_afk has quit IRC17:20
*** _fortis has quit IRC17:20
*** fpatwa has quit IRC17:20
*** iurygregory has quit IRC17:20
*** blogan has quit IRC17:20
*** sshen has quit IRC17:20
*** mkoderer__ has quit IRC17:20
*** arunkant has quit IRC17:20
*** BAKfr has quit IRC17:20
*** BrAsS_mOnKeY has quit IRC17:20
*** hughsaunders has quit IRC17:20
*** dolphm has quit IRC17:20
*** afazekas has quit IRC17:20
*** smurke has quit IRC17:20
*** pleia2 has quit IRC17:20
*** timburke has quit IRC17:20
*** bapalm has quit IRC17:20
*** Tridde has quit IRC17:20
*** lmiccini has quit IRC17:20
*** baffle has quit IRC17:20
*** kfox1111 has quit IRC17:20
rderosestevemar which is the unique_id17:20
*** krotscheck has joined #openstack-keystone17:20
*** jorge_munoz_ is now known as jorge_munoz17:20
*** su_zhang has quit IRC17:20
raildoayoung: sorry, I'm back17:20
*** afazekas has joined #openstack-keystone17:21
rderosestevemar: user doesn't supply a user_id17:21
*** miguelgrinberg_ has joined #openstack-keystone17:21
*** bapalm has joined #openstack-keystone17:21
*** dolphm has joined #openstack-keystone17:21
*** ChanServ sets mode: +o dolphm17:21
*** blogan has joined #openstack-keystone17:21
*** miguelgrinberg_ is now known as miguelgrinberg17:21
*** su_zhang has joined #openstack-keystone17:21
*** BAKfr has joined #openstack-keystone17:21
*** hughsaunders has joined #openstack-keystone17:21
*** mkoderer___ has joined #openstack-keystone17:21
*** dims has joined #openstack-keystone17:22
rderosestevemar: sorry for the confusion, we get the "id" from the mapped properties, which is actually the unique id within the scope of the IdP17:22
*** lmiccini has joined #openstack-keystone17:23
rderosestevemar: so the unique id is what we used to look up the user; if not found, exception with user_id = unique_id17:23
*** fpatwa has joined #openstack-keystone17:23
rderosestevemar: does that make sense?17:23
*** timburke has joined #openstack-keystone17:23
stevemarrderose: you gotta stop prefixing commits with "shadow users - "17:23
stevemar:)17:23
stevemarhmm17:23
stevemarmarekd: good point17:24
stevemarrderose: i meant you, not marekd17:24
stevemarokay, keep it like that for now then17:24
raildoayoung: lbragstad I added a comment here about it: https://review.openstack.org/#/c/258650/26/keystone/token/provider.py17:25
patchbotraildo: patch 258650 - keystone - [WIP]Make fernet default token provider17:25
rderosestevemar I stop the prefix, is it causing problems?17:25
*** su_zhang has quit IRC17:25
*** iurygregory has joined #openstack-keystone17:26
*** ekarlso- has joined #openstack-keystone17:27
*** edmondsw has joined #openstack-keystone17:27
*** jsavak has quit IRC17:28
*** arunkant has joined #openstack-keystone17:28
*** jdennis has joined #openstack-keystone17:28
*** anteaya has joined #openstack-keystone17:28
*** jsavak has joined #openstack-keystone17:28
*** rderose has quit IRC17:29
*** timcline has joined #openstack-keystone17:29
*** wasmum has joined #openstack-keystone17:30
*** _fortis_ has joined #openstack-keystone17:30
*** rk4n has quit IRC17:30
samueldmqhenrynash: just left a couple of initial comments on patch 23128917:31
patchbotsamueldmq: https://review.openstack.org/#/c/231289/ - keystone - Projects acting as domains17:31
*** rderose has joined #openstack-keystone17:31
samueldmqhenrynash: will keep reviewing; I posted them so we can start discussing/fixing17:31
*** sdake has joined #openstack-keystone17:34
*** _fortis_ is now known as _fortis17:35
*** vilobhmm11 has quit IRC17:38
samueldmqayoung: hi, I'd like to see your view on patch 24358517:38
patchbotsamueldmq: https://review.openstack.org/#/c/243585/ - keystone - API support for project cascade update17:38
samueldmqayoung: basically on the docstring at https://review.openstack.org/#/c/243585/25/keystone/common/controller.py17:38
patchbotsamueldmq: patch 243585 - keystone - API support for project cascade update17:38
samueldmqayoung: and the discussions round it17:38
samueldmqaround*17:39
stevemarrderose: no problems, just friendly banter :)17:39
rderosestevemar :)17:39
stevemarrderose: same way you don't have to put *everything* as WIP until it's absotely perfect17:39
stevemarbrb, gettin foodS!17:40
ayoungsamueldmq, in a bit...heads down atthe moment17:40
samueldmqayoung: kk17:40
*** smurke has joined #openstack-keystone17:41
samueldmqstevemar: bon apetit17:42
*** fhubik has joined #openstack-keystone17:47
*** fhubik has quit IRC17:48
*** jistr has quit IRC17:49
*** su_zhang has joined #openstack-keystone17:53
*** dan_nguyen has joined #openstack-keystone17:55
*** browne has joined #openstack-keystone17:56
*** spandhe has joined #openstack-keystone17:57
*** vilobhmm11 has joined #openstack-keystone17:59
*** jasonsb_ has quit IRC18:00
*** jsavak has quit IRC18:01
*** vilobhmm11 has quit IRC18:02
henrynashsamueldmq: thx18:04
*** rodrigod` is now known as rodrigods18:04
*** su_zhang has quit IRC18:06
samueldmqhenrynash: np, I still need to review the tests, doing in a bit18:07
*** dims is now known as dimsum__18:09
*** petertr7 is now known as petertr7_away18:11
*** RichardRaseley has joined #openstack-keystone18:11
EmilienMstevemar: thanks18:13
*** su_zhang has joined #openstack-keystone18:16
kfox1111_um, was just trying to move services out to its own domain...18:16
*** clenimar has quit IRC18:16
kfox1111_keystone_authtoken doesn't seem to support setting user domain and project domain?18:16
*** roxanagh_ has joined #openstack-keystone18:19
kfox1111_whats the difference between user and admin_user in keystone_authtoken?18:22
*** roxanaghe has quit IRC18:23
*** vilobhmm11 has joined #openstack-keystone18:23
*** vilobhmm11 has quit IRC18:23
*** vilobhmm11 has joined #openstack-keystone18:23
kfox1111_ah. old style vs new style config.18:23
*** rderose has quit IRC18:24
*** henrynash has quit IRC18:26
*** rk4n has joined #openstack-keystone18:27
*** su_zhang has quit IRC18:28
*** su_zhang has joined #openstack-keystone18:29
*** spzala has joined #openstack-keystone18:30
*** bjornar__ has joined #openstack-keystone18:30
*** lhcheng has joined #openstack-keystone18:33
*** ChanServ sets mode: +v lhcheng18:33
*** pushkaru has joined #openstack-keystone18:34
*** vilobhmm11 has quit IRC18:37
*** knikolla has quit IRC18:40
*** knikolla has joined #openstack-keystone18:40
*** vilobhmm11 has joined #openstack-keystone18:41
*** rodrigods has quit IRC18:49
*** rodrigods has joined #openstack-keystone18:50
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Show unexpected error that was unexpected :)  https://review.openstack.org/28549518:50
*** fangxu has quit IRC18:54
*** agireud has quit IRC18:55
*** agireud has joined #openstack-keystone18:57
*** rderose has joined #openstack-keystone18:58
SamYaplebknudson_: your patch does not seem to be doing what I would expect it to do (when applied my deployer still breaks and needs an explict keystone-bootstrap call to create domain)18:59
SamYaplebknudson_: but i havent debuged it yet, it looks like it should19:00
bknudson_SamYaple: what operation is it failing on?19:00
*** vilobhmm11 has quit IRC19:00
*** rk4n has quit IRC19:00
*** vilobhmm11 has joined #openstack-keystone19:01
SamYaplebknudson_: so initial bootstrap we do in kolla via a python script we have via an admin token19:02
SamYaplethats still breaking19:02
ayoungstevemar, going to suggest we have one working session with the installers:  invite in the Kolla and puppet-keystone folks to work with us on basic setup, install, and configuration issues19:02
SamYapleim looking into why19:02
*** petertr7_away is now known as petertr719:02
*** su_zhang has quit IRC19:03
marekdstevemar: rderose what i was mentioning to use all three attributes when user was not found.19:04
*** su_zhang has joined #openstack-keystone19:04
marekdstevemar: rderose but since i seem to cause troubles and others dont see it required i am not going to do it anymore.19:04
rderosemarekd :)19:05
marekdmy point is just: if you identify fed user by a tuple (idp, proto,unique_id) keep doing this when you raise an exception saying who is missing in the database.19:05
*** RichardRaseley has quit IRC19:05
SamYaplebknudson_: yea i think i see the issue19:06
SamYapleeven though we are explictly specifying the v2.0 api, the keystone client is still sending it to v3 autodetected api i think19:07
stevemarayoung: good call19:07
*** su_zhang has quit IRC19:08
samueldmqstevemar: hey19:11
stevemarsamueldmq: hey19:11
bknudson_SamYaple: that sounds messed up19:11
samueldmqstevemar: so, need your view on cascade & reseller19:11
*** su_zhang has joined #openstack-keystone19:11
stevemarsamueldmq: gimmie the recap19:11
rodrigodsayoung, stevemar, ++19:11
SamYaplebknudson_: might be. im digging into it. ill save you my random musing while doing so ;)19:12
samueldmqstevemar: basically to confirm our plan still works19:12
samueldmqstevemar: reseller just needs a cople of updates, I am reviewing that19:13
samueldmqstevemar: I am also updating cascade thing19:13
*** jed56 has quit IRC19:13
samueldmqstevemar: our plans are still to get them until Monday right ?19:13
*** su_zhang has quit IRC19:15
*** wasmum has quit IRC19:15
*** su_zhang has joined #openstack-keystone19:15
*** dimsum__ has quit IRC19:16
*** petertr7 is now known as petertr7_away19:17
samueldmqstevemar: and if we don't, what's the plan? get them to rc or N (worst case I don't believe to be necessary)?19:20
SamYaplebknudson_: no its hitting v2.0, confirmed19:20
SamYaplekeystone_client.tenants.create(tenant_name=project_name)19:20
SamYaple*** NotFound: Could not find domain: default (HTTP 404) (Request-ID: req-8b01232f-7cf8-4762-91b1-8d6928a1538c)19:20
SamYapleperhaps i misunderand the purpose of the patch19:21
SamYaple?19:21
bknudson_SamYaple: hmm, that should be taken care of with https://review.openstack.org/#/c/284778/3/keystone/resource/controllers.py line 10019:21
patchbotbknudson_: patch 284778 - keystone - V2 operations create default domain on demand19:21
bknudson_I'll try it out in a few minutes. I just wrote the test!19:22
SamYaplebknudson_: let me validate that line has changed in the running keystone deploy19:22
boltRj #openstack-horizon19:24
*** wasmum has joined #openstack-keystone19:25
openstackgerritBrant Knudson proposed openstack/keystone: Fix doc build warnings  https://review.openstack.org/28550719:25
SamYaplebknudson_: disregard!19:26
SamYaplepatch didnt properly apply19:26
SamYapleall is well19:26
bknudson_SamYaple: great, thanks for trying it out19:26
SamYapleyea thanks for the patch, now lets get it merged before people notice!19:26
*** spzala has quit IRC19:34
*** petertr7_away is now known as petertr719:36
*** porunov has joined #openstack-keystone19:38
stevemarsamueldmq: i'm not inclined to introduce a massive change like reseller into the RC period, it can go into N19:41
stevemarsamueldmq: i don't understand the rush to squeeze that into M, can you explain why?19:42
ayoungself.v3_create_token(scoped_token, expected_status=http_client.INTERNAL_SERVER_ERROR)  500?   http://git.openstack.org/cgit/openstack/keystone/tree/keystone/tests/unit/test_v3_federation.py#n203919:42
ayoungstevemar, its been malingereing for ove a year now19:42
ayoungbut I have a feeling a few things will Miss Mitaka19:43
stevemarayoung: the specific last patch doesn't provide any benefit AFAICT, just a restructure of internal data19:43
ayoungstevemar, I'm just jumping in here...hadn't looked at it.19:44
stevemarayoung: i feel cascade delete/update will make it, we can even shove it what we have now and deal with policy as a bug, meh19:44
ayoungcool19:44
stevemarayoung: i'm talking about this one for reseller: https://review.openstack.org/#/c/231289/19:44
patchbotstevemar: patch 231289 - keystone - Projects acting as domains19:44
*** aginwala has joined #openstack-keystone19:44
ayoungstevemar, according to nkinder , LDAP doesn't even support tree delete without a special control.  It makes you go node by node19:44
ayoungstevemar, yeah...nice to have, not need to have I think19:45
stevemarayoung: ldap for resource is nuked anyway, but that's a good reference point19:45
ayoungstevemar, nah, I am just using that as a comparison other for the project tree.19:45
ayoungI need food19:46
stevemarand shadow users i'm testing now, but running into config issues with federation as a whole19:46
stevemarayoung: go eat!19:46
stevemarayoung: understood19:46
ayoungstevemar, I just find it funy that we have federation unit tests that expect a 50019:46
ayoungsee above19:46
stevemar=\19:47
stevemarayoung: see last nights technical debt convo, we need better error messages for federation work flow19:47
*** vilobhmm11 has quit IRC19:47
*** vilobhmm111 has joined #openstack-keystone19:48
*** erhudy has joined #openstack-keystone19:48
openstackgerritTrevor McCasland proposed openstack/keystone: Add validation parameter "max_name_size"  https://review.openstack.org/28539319:48
openstackgerritAlexander Makarov proposed openstack/keystone: WIP/DNM Closure table for HMT  https://review.openstack.org/28552119:50
*** gordc has quit IRC19:51
openstackgerritMerged openstack/keystone: Delay using threading.local() to fix check job failure  https://review.openstack.org/28496519:51
*** jorge_munoz has quit IRC19:52
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480419:55
*** rk4n has joined #openstack-keystone19:58
*** spandhe has quit IRC19:58
*** spzala has joined #openstack-keystone20:02
*** aginwala has quit IRC20:02
openstackgerritSteve Martinelli proposed openstack/keystone: Fix the migration issue for the user with null password  https://review.openstack.org/28515220:05
*** aginwala has joined #openstack-keystone20:06
*** spzala has quit IRC20:06
*** spzala has joined #openstack-keystone20:06
stevemarbknudson_: can you look @ https://review.openstack.org/#/c/285152/4 ?20:07
patchbotstevemar: patch 285152 - keystone - Fix the migration issue for the user with null pas...20:07
openstackgerritMerged openstack/keystone: Enable LDAP connection pooling by default  https://review.openstack.org/28500820:07
bknudson_stevemar: I'll add it to my list20:08
stevemarbknudson_: thank you20:12
*** spandhe has joined #openstack-keystone20:13
openstackgerritOpenStack Proposal Bot proposed openstack/keystone: Updating sample configuration file  https://review.openstack.org/28480420:17
*** alejandrito has joined #openstack-keystone20:20
*** henrynash has joined #openstack-keystone20:22
*** ChanServ sets mode: +v henrynash20:22
*** yarkot_ has joined #openstack-keystone20:22
*** gordc has joined #openstack-keystone20:23
openstackgerritJamie Lennox proposed openstack/keystone: Add identity endpoint creation to bootstrap  https://review.openstack.org/28510220:25
*** yarkot_ has quit IRC20:26
*** spzala has quit IRC20:27
*** su_zhang has quit IRC20:27
*** su_zhang has joined #openstack-keystone20:28
*** spzala has joined #openstack-keystone20:28
*** spzala has quit IRC20:28
stevemarjamielennox: go to sleep20:28
*** rk4n has quit IRC20:31
*** su_zhang has quit IRC20:32
*** pushkaru has quit IRC20:33
*** aginwala has quit IRC20:42
*** roxanagh_ has quit IRC20:42
*** dims has joined #openstack-keystone20:48
*** annasort has quit IRC20:54
*** aginwala has joined #openstack-keystone20:54
*** dave-mccowan has quit IRC20:56
*** pauloewerton has quit IRC20:57
*** fesp has joined #openstack-keystone20:58
*** petertr7 is now known as petertr7_away21:01
*** petertr7_away is now known as petertr721:02
*** su_zhang has joined #openstack-keystone21:05
openstackgerrithenry-nash proposed openstack/keystone: Projects acting as domains  https://review.openstack.org/23128921:06
henrynashsamuedlmq, ayoung, dstanek: latest version of projects as a domain patch availlable with all suggested fixes so far….21:07
ayounghenrynash, cool21:07
ayounghenrynash, I'm busy doing unspeakable things to the token validation process21:07
*** pgbridge has quit IRC21:08
samueldmqhenrynash: nice, I will take another look21:08
henrynashayoung: and more power to you, sir21:08
*** yarkot_ has joined #openstack-keystone21:13
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Shadow federated users  https://review.openstack.org/27916221:14
*** admin0 has joined #openstack-keystone21:15
*** alejandrito has quit IRC21:16
admin0guys . i am not a developer, but an operator .. can keystone ( only keystone) be upgraded from say icehouse => liberty, keeping the icehouse cluster/region working .. and opening up the possibility to add region2 in liberty ?21:16
*** rderose has quit IRC21:17
samueldmqhenrynash: and we still need someone else's opinion on ?cascade thing :(21:20
stevemarwhy is mod_auth_openidc eating my assertion data? :X21:21
stevemaradmin0: i think you may be better off asking the question in #openstack-operators21:21
stevemaror on the mailing list21:22
admin0which specific mailing list ?21:22
stevemari think all the devs will want to say "yes!"21:22
admin0the general one ?21:22
admin0:D21:22
stevemaradmin0: there's an operator one21:22
stevemaradmin0: http://lists.openstack.org/pipermail/openstack-operators/21:22
*** henrynash has quit IRC21:23
*** fangxu has joined #openstack-keystone21:23
* admin0 still could not find the search archives button 21:25
*** rk4n has joined #openstack-keystone21:27
samueldmqstevemar: ayoung: would like to get your view on patch 24358521:28
patchbotsamueldmq: https://review.openstack.org/#/c/243585/ - keystone - API support for project cascade update21:28
samueldmqso we can update it to a potential final version :)21:28
ayoungsamueldmq, and I would like to figure out the Freaking Federation token flow21:28
ayoungwhy do we have test that check that we throw a 500?21:29
ayoungGAH21:29
ayoungand what did I do to break that21:29
*** yarkot_ has quit IRC21:29
stevemarsamueldmq: will do21:29
samueldmqayoung: sound sodd21:30
stevemarsamueldmq: huh? i thought it was updated :\21:30
samueldmqayoung: odd*21:30
samueldmqstevemar: almost, just need a decision until I send a new patchset21:30
samueldmqstevemar: you just need to read the doc in https://review.openstack.org/#/c/243585/25/keystone/common/controller.py21:30
patchbotsamueldmq: patch 243585 - keystone - API support for project cascade update21:30
stevemarsamueldmq: yeah, reading it now21:30
samueldmqstevemar: and the suggestion henry raised tehre21:31
*** roxanaghe has joined #openstack-keystone21:31
*** jorge_munoz has joined #openstack-keystone21:34
*** ninag has quit IRC21:36
*** aginwala has quit IRC21:36
*** henrynash has joined #openstack-keystone21:36
*** ChanServ sets mode: +v henrynash21:36
*** fesp has quit IRC21:37
*** henrynash has quit IRC21:37
*** fesp has joined #openstack-keystone21:38
openstackgerritMonty Taylor proposed openstack/python-keystoneclient: Revert "Support `truncated` flag returned by identity service"  https://review.openstack.org/28554921:39
*** agireud has quit IRC21:41
*** jamielennox is now known as jamielennox|away21:43
*** agireud has joined #openstack-keystone21:43
stevemarbreton: ^ :(21:44
*** porunov has quit IRC21:45
*** browne has quit IRC21:46
*** pushkaru has joined #openstack-keystone21:48
*** browne has joined #openstack-keystone21:49
*** rk4n has quit IRC22:01
*** petertr7 is now known as petertr7_away22:03
*** aginwala has joined #openstack-keystone22:07
openstackgerritayoung proposed openstack/keystone: Remove unneeded revocation events rebuild token on validation  https://review.openstack.org/28513422:10
*** knikolla has quit IRC22:11
admin0where can i find  good tests of keystone ( without installing all openstack components ) — so that i can be assured it works22:14
admin0like install juno,test ..  upgrade to kilo .. test again, upgrade to liberty .. test again ..are those tests defined ?22:15
*** browne has quit IRC22:17
*** browne has joined #openstack-keystone22:24
*** su_zhang has quit IRC22:32
*** su_zhang has joined #openstack-keystone22:32
*** su_zhang has quit IRC22:39
*** su_zhang has joined #openstack-keystone22:39
*** lhcheng has quit IRC22:43
*** lhcheng has joined #openstack-keystone22:46
*** ChanServ sets mode: +v lhcheng22:46
*** aginwala has quit IRC22:46
*** aginwala has joined #openstack-keystone22:49
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Shadow federated users  https://review.openstack.org/27916222:51
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Concrete role assignments for federated users  https://review.openstack.org/28494322:55
*** gordc has quit IRC22:56
*** rk4n has joined #openstack-keystone22:58
*** fesp has quit IRC22:59
*** lhcheng has quit IRC23:01
*** aginwala has quit IRC23:06
*** lhcheng has joined #openstack-keystone23:06
*** ChanServ sets mode: +v lhcheng23:06
*** dims has quit IRC23:07
*** sigmavirus24 is now known as sigmavirus24_awa23:08
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Shadow federated users  https://review.openstack.org/27916223:10
*** daemontool_ has joined #openstack-keystone23:10
openstackgerritRon De Rose proposed openstack/keystone: Shadow users - Concrete role assignments for federated users  https://review.openstack.org/28494323:10
*** aginwala has joined #openstack-keystone23:13
*** daemontool has quit IRC23:13
*** rk4n has quit IRC23:15
*** rk4n has joined #openstack-keystone23:16
*** ccard_ has joined #openstack-keystone23:16
*** ccard__ has quit IRC23:19
openstackgerritSam Leong proposed openstack/keystoneauth: Auth plugin for X.509 tokenless authz  https://review.openstack.org/28390523:19
*** pushkaru has quit IRC23:21
*** slberger has left #openstack-keystone23:31
*** dims has joined #openstack-keystone23:34
*** rk4n has quit IRC23:34
*** spandhe has quit IRC23:35
*** jorge_munoz has quit IRC23:39
*** edmondsw has quit IRC23:39
*** erhudy has quit IRC23:40
*** rk4n has joined #openstack-keystone23:45
*** rk4n has quit IRC23:47
*** spandhe has joined #openstack-keystone23:47
*** aginwala has quit IRC23:52
*** sdake has quit IRC23:53
*** sdake_ has joined #openstack-keystone23:53
*** aginwala has joined #openstack-keystone23:55

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!