Friday, 2016-06-17

*** ddieterly has joined #openstack-keystone00:05
dstanekayoung: are you going to be messing with ipa...?00:09
*** adrian_otto has quit IRC00:09
ayoungdstanek, nope00:09
ayoungdstanek, I hope not00:09
ayoungdstanek, ipa server seems to be down.  Restarting the processes00:11
ayoungdstanek, I think a package upgrade failed.00:12
*** roxanaghe has joined #openstack-keystone00:17
*** aratus has quit IRC00:17
dstanekayoung: coolio00:18
*** roxanaghe has quit IRC00:21
ayoungdstanek, something wrong with the server.  I see this in journalctl trying to start the httpd instance00:21
ayoung Unregistered Authentication Agent for unix-process:10168:9529 (system bus name :1.28, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UT00:21
ayoungand its not SELinux either00:22
ayoung(98)Address already in use: AH00072: make_sock: could not bind to address [::]:44300:24
ayoung(98)Address already in use: AH00072: make_sock: could not bind to address 0.0.0.0:44300:24
*** ddieterly has quit IRC00:25
*** ddieterly has joined #openstack-keystone00:28
ayoungdstanek, jamielennox I could continue to troubleshoot, or I could reinstall..I might do the latter, and get rippowam working with Centos Again...after family time00:30
jamielennoxayoung: whatever you like00:30
dstanekayoung: i have nothing on there worth saving or that i can't recreate easily00:31
dstanekayoung: enjoy the family time00:31
*** ddieterly has quit IRC00:42
*** ddieterly has joined #openstack-keystone00:51
*** sdake has joined #openstack-keystone00:58
*** sdake has quit IRC01:14
*** sdake has joined #openstack-keystone01:16
*** roxanaghe has joined #openstack-keystone01:17
*** jsavak has joined #openstack-keystone01:20
*** EinstCrazy has joined #openstack-keystone01:21
*** roxanaghe has quit IRC01:22
*** sdake_ has joined #openstack-keystone01:22
jamielennoxstevemar: so, any chance you've seen https://review.openstack.org/#/c/330329/01:24
patchbotjamielennox: patch 330329 - keystone-specs - Reservations (a working title)01:24
*** sdake has quit IRC01:24
openstackgerritSam Leong proposed openstack/keystoneauth: Auth plugin for X.509 tokenless authz  https://review.openstack.org/28390501:27
*** ddieterly has quit IRC01:42
*** jsavak has quit IRC01:48
iurygregory_Hi jamielennox, sorry to bother you. I have question about the keystone middleware configuration, can i set auth_url or just auth_uri (they are the same?)01:51
iurygregory_i'm following http://docs.openstack.org/developer/keystonemiddleware/middlewarearchitecture.html01:51
jamielennoxiurygregory_: they're not quite the same but in practice you'll probably want to set them to the same thing01:52
iurygregory_oh so i can set both?01:52
jamielennoxiurygregory_: auth_uri ends up in the headers of 401 Unauthenticated responses01:52
jamielennoxand points to a public discoverable keystone base (so no prefix)01:52
*** ddieterly has joined #openstack-keystone01:53
jamielennoxauth_url is where the service user is going to authenticate to01:53
jamielennoxso depending how you're set up auth_url is internal URL and auth_uri is public01:53
iurygregory_tks jamielennox =)01:54
jamielennoxnp01:54
*** jorge_munoz_ has joined #openstack-keystone01:56
*** jorge_munoz has quit IRC01:57
*** jorge_munoz_ is now known as jorge_munoz01:57
ayoungjamielennox, what is the difference? I've had trouble distinguishing to people in the past01:58
ayoungI still don't understand the difference between url  and uri01:58
jamielennoxayoung: auth_uri ends up in "WWW-Authenticate: Keystone uri=%s" header01:59
jamielennoxthat's its only job01:59
ayoungjamielennox, and what is that meant to do?01:59
ayoungtell someone where they need to go to authenticate?01:59
jamielennoxheh, yea, it gets added to all 401 responses and then i'm pretty sure everyone ignores it02:00
ayoungjamielennox, so, they should be the same thing, then, right?02:02
ayoungI mean, we say that the Keystone server that you authenticate against is the one that nova is going to use to validate the token02:02
jamielennoxayoung: depends, most people use an internal URL for auth_url but auth_uri would get exposed to the public02:02
ayoungand the version should match02:02
ayoungah02:02
jamielennoxthere should be no version in auth_uri02:02
ayoungso auth_uri=main auth_url=admin in v2.0 speak02:03
jamielennoxyea02:03
jamielennoxmore or less02:03
ayoungBlog post.  You want to write it or shall I?02:03
ayoungI'm bascially just going to edit this convo...02:04
jamielennoxideally we could default it way better than that, like auth.get_endpoint('identity', interface='public')02:04
jamielennoxbut that gets funny02:04
jamielennoxmm, blog, i haven't written one of those for a while02:04
*** dan_nguyen has quit IRC02:07
jamielennoxayoung: so i'm looking for someone to tell me my reservations thing won't work02:08
ayoungjamielennox, ?02:08
jamielennoxhttps://review.openstack.org/#/c/330329/02:08
patchbotjamielennox: patch 330329 - keystone-specs - Reservations (a working title)02:08
jamielennoxayoung: cause to me it solves token timeouts and probably dynamic policy02:08
ayoungjamielennox, reading02:12
ayoungA reservation is therefore singlue use replacement for a token for interservice02:13
ayoungcommunication but that only authenticates the bearer to perform a specific02:13
ayoungoperation and any flow on operations.02:13
ayoungignroring the tpyo for a moment...this sounds like a single use trust02:13
ayoungjamielennox, yep, I think I like02:14
jamielennoxyea, i've been thinking about it for a while, but it was a fairly quite write up02:15
ayoungjamielennox, so, essentially a reservation is like a trust but stored in fernet format, and created on the fly when a user requests something from (e.gh.) Nova that spans multiple services02:16
iurygregory_we can still use admin_tenant_name in the keystone_authtoken section? (in my mind project_name is a replace for this)02:16
*** sdake has joined #openstack-keystone02:16
ayoungiurygregory_, tenant is dead long live project02:16
jamielennoxayoung: kind of a single use trust, but it's not something a project establishes on purpose02:16
jamielennoxayoung: it's just done for them intead of token validation and isn't stored in the db02:16
jamielennoxso yea, more or less02:16
ayoungjamielennox, so would we have reservation templates?02:17
iurygregory_ayoung, yeah i know is just because the docs point that it's possible to use XD02:17
jamielennoxiurygregory_: it will still work but it's an old config option and you should probably update it if you're going through it02:17
jamielennoxayoung: templates?02:17
ayoungmaybe a mapping from "if I call create_vm user the create_vm reservation template" say?02:17
ayounglike a 'fill in the blanks" trust02:17
*** ddieterly has quit IRC02:17
ayoungI, state your name, do hereby grant to nova the right to mount my partition from cinder02:18
jamielennoxayoung: so i don't see it as template02:18
iurygregory_jamielennox, tks i'm providing a patch for puppet-keystone with keystonemiddleware valid options =)02:18
*** roxanaghe has joined #openstack-keystone02:18
ayoungjamielennox, here's a dumb idea02:18
*** sdake_ has quit IRC02:19
jamielennoxmy initial thought is that nova (eg) would provide the url that it's hitting, and if you passed the reservation it wouldn't recheck policy02:19
ayoungwhat if keystone auth passed the requested operation on to keystone when getting a token, and that token was the reservation, too02:19
jamielennoxbut i don't think that would work02:19
ayoungthere are two expirys02:19
ayoungone is for the user, and the other is for the reservation02:19
jamielennoxayoung: i see passing reservation as a replacement for passing a token02:19
jamielennoxayoung: because we can't validate a token that has expired at all - api limitations02:19
jamielennoxthis was the initial problem and why we couldn't just accept a buffer time02:20
ayoungwe can if we don't call it a token, though02:20
jamielennoxayoung: well if it's not a token we can do what we like02:20
jamielennoxa reservation would be valid for like 15 minutes from time of creation02:20
jamielennoxand validatable for that period02:20
jamielennoxthat's the only thing you would validate and any information you need from the token would get copied into the reservation02:21
ayoungwait02:21
ayoung15 minutes? I thought they were for long running tasks?02:21
jamielennoxhow long do you want?02:21
ayounghell, we have operations that take over an hour02:21
ayoungthe whole image upload thing02:21
ayoungwas it snapshot?02:22
jamielennoxso by default nothing can handle that02:22
jamielennoxi would be ok with making that longer but one of the issues raised on the service users spec is that it cant be unlimited02:22
ayoungwhen nova validates a token, it can get back a reservation02:22
*** roxanaghe has quit IRC02:23
jamielennoxi was thinking 15 minutes was greater than almost all http timeouts and would therefore sufice02:23
ayoungthe thing I don't like about that is the user has no control at that point what roles Nova would get, so the user should ideally limit them in the intial token creation02:23
jamielennoxayoung: the roles would be copied from the token02:24
ayoungwhich was this spec https://review.openstack.org/#/c/186979/02:24
patchbotayoung: patch 186979 - keystone-specs - Tokens with subsets of roles02:24
jamielennoxyep, i remember that one02:25
jamielennoxso this wouldn't have any effect on that02:25
jamielennoxbecause the reservation would have the same roles as the token did02:25
ayoungSo, I like this, but I think you are going to have trouble selling it to morgan. I'll back you up.  I think we can do this02:26
jamielennoxayoung: i don't think notmorgan will be that hard really02:26
ayoungits an additional step in token validation:  "here is the token you use for the next step"02:26
ayounghe wants "validate at the edges only"02:26
ayoungwhich I really don't like02:26
jamielennoxayoung: right - but it's transparent to the user so we only need to fix the services02:27
jamielennox"only"02:27
ayoungI'm less concerned with Nova than Trove Sahara, and other *aaS02:27
ayoungwe can even do this in the keystone middleware02:27
jamielennoxright, there's no way i'm doing this on an individual basis, i was working on context etc to pass all this around automatically already02:27
jamielennoxayoung: yep, like 90% keystonemiddleware02:28
ayoungso, you said this might solve dynamic policy?02:28
jamielennoxthe service would only need to forward the reservation id instead of the token02:28
ayoungjust call it a new token02:28
ayoungreally, it is just a token with an extended lifespan02:28
jamielennoxtoo overloaded, and it'll have a different format02:28
ayoungdoes it really need a different format?02:29
jamielennoxthis makes it so users deal with tokens, services deal with reservations02:29
jamielennoxayoung: it'll be almost the same but it means we don't have to keep some of the rules about tokens around02:29
jamielennoxlike not extending lifetimes and rescoping etc02:29
jamielennoxjust easier to be its own concept02:29
jamielennoxayoung: so dynamic policy02:29
jamielennoxayoung: when you request a reservation you send the user's token, the service's token and the operation they are trying to perform02:30
ayoungah, so the user would do this up front?02:30
jamielennoxayoung: keystone denies creating a reservation if the user isn't allowed to, based on polic02:30
jamielennoxy02:30
ayoungor would nova?02:30
jamielennoxkeystone controls policy02:30
ayoungyeah, but start from the CLI doing openstack server create ....02:31
ayoungI have no token, what happens there?02:31
jamielennoxayoung: when auth_token middleware gets a token it would try to transform it into a resrevation02:31
jamielennoxso the reservation creation happens on the service side the first time a token is received02:31
jamielennoxonce you have a reservation you can ditch the user token02:32
jamielennoxthat gives you edge validation because service to service will use reservations02:32
ayoungah, but there is a problem:  you have to trust the service to tell you what operation the user is trying to perform02:32
jamielennoxusers will have no ability to create reservations, that would be service only02:32
ayoungif I want to kill a server, it could cheat and ask for a reservation to create a server02:32
*** ddieterly has joined #openstack-keystone02:33
jamielennoxayoung: so in practice that would be done via auth_token middleware, but yes that is open for exploit02:33
ayoungI mean, auth_token would do the right thing, but the service would not necessarily run an unmodified auth_token02:33
jamielennoxhowever it's still a hundred times better than now02:33
ayoungagreed.02:33
jamielennoxbecause you're using the user's token the service could still only ask for a reservation the user could actually do02:33
jamielennoxand it can't store it for later02:34
ayoungso, lets make it implicit.  When the service user validates the token, if it passes in the operation, we grant it a reservation02:34
ayoungto lock down in the future, we can have a rule that says "the reservation has the same roles or less than the token origianlly granted"02:34
ayoungso if we really need to make it secure, we can still have the user request a token with a specific subset of roles02:35
jamielennoxright, though in practice i don't know how you'd scale it back02:35
ayoungsdo if create VM is a different role than delete, and they send dlete, the reservation for create would be denied02:35
jamielennoxayoung: yep, users deal with tokens, this wouldn't affect them at all02:35
ayoungOK, I'll call your mechanism here "necessary but not sufficient" and say that it is a big step forward02:35
jamielennoxright, now i have no answers how to manage all that02:36
jamielennoxwe are still going to have the same problem of all the services wanting to provide their own default policies02:36
jamielennoxand i have no idea how to collate it all and all the rules you would need to say that "fetch_an_image" is a valid sub operation of "create_a_vm"02:37
jamielennoxhowever _if_ we can figure that out we get all the things you are looking for02:37
jamielennox"what can this user do"02:37
jamielennoxdynamic policy, centralized policy02:37
ayoungits ok. this is progress02:37
jamielennoxnot to mention audit essentially would get centralized into keyston e02:38
jamielennoxayoung: anyway, i'm trying to figure out anything i've missed or any reason it wouldn't work02:40
ayoungjamielennox, it sounds sane to me02:41
ayoungthat may be "Damned by faint praise" though02:41
jamielennoxayoung: meh, praise comes if/when it's implemented and works - i just don't want to do a whole bunch of work and then figure out it's not going to work02:42
*** adrian_otto has joined #openstack-keystone02:45
*** ddieterly has quit IRC02:48
*** jamielennox is now known as jamielennox|away03:03
*** gyee has quit IRC03:07
ayoungjamielennox|away, http://adam.younglogic.com/2016/06/auth_uri-vs-auth_url/03:10
*** jamielennox|away is now known as jamielennox03:19
*** roxanaghe has joined #openstack-keystone03:19
jamielennoxayoung: lol, quick and dirty03:19
*** iurygregory_ has quit IRC03:19
jamielennoxi like it03:19
ayoung:)03:19
*** dan_nguyen has joined #openstack-keystone03:21
*** richm has quit IRC03:23
*** roxanaghe has quit IRC03:24
stevemarjamielennox: nice bug clean up03:24
jamielennoxstevemar: swatting the easy ones03:25
stevemarjamielennox: it's appreciated nonetheless03:25
*** markvoelker has quit IRC03:47
*** GB21 has joined #openstack-keystone04:02
*** lamt has quit IRC04:11
*** links has joined #openstack-keystone04:20
*** rha_ has joined #openstack-keystone04:29
*** rha has quit IRC04:29
jamielennoxstevemar: where should we send things like: https://bugs.launchpad.net/keystonemiddleware/+bug/158039704:32
openstackLaunchpad bug 1580397 in keystonemiddleware " s3token config with auth URI" [Undecided,New]04:32
jamielennoxit looks like it was auto created because of the DocImpact flag, but it seems dumb to have DocImpact open bugs in the same proejct04:33
*** dan_nguyen has quit IRC04:34
stevemarjamielennox: we should triage the bug by adding content to it, enough so the docs team can make a change, then re-assign04:35
stevemarjamielennox: or we submit a patch to docs04:35
*** tqtran has quit IRC04:36
jamielennoxstevemar: https://review.openstack.org/#/c/330329/ - because i'm trying to make people read it04:42
patchbotjamielennox: patch 330329 - keystone-specs - Reservations (a working title)04:42
*** markvoelker has joined #openstack-keystone04:47
*** sdake_ has joined #openstack-keystone04:50
*** markvoelker has quit IRC04:52
*** sdake has quit IRC04:53
*** GB21 has quit IRC04:53
*** roxanaghe has joined #openstack-keystone05:19
*** roxanagh_ has joined #openstack-keystone05:20
*** roxanaghe has quit IRC05:23
*** roxanagh_ has quit IRC05:25
*** browne has joined #openstack-keystone05:25
*** links has quit IRC05:27
*** sdake has joined #openstack-keystone05:27
*** links has joined #openstack-keystone05:28
*** sdake_ has quit IRC05:31
*** GB21 has joined #openstack-keystone05:34
stevemarjamielennox: hehe  "In which he ponders"05:35
*** sdake_ has joined #openstack-keystone05:38
*** sdake has quit IRC05:41
*** sdake_ has quit IRC05:50
*** belmoreira has joined #openstack-keystone06:06
*** browne has quit IRC06:07
*** nisha_ has joined #openstack-keystone06:21
*** rcernin has joined #openstack-keystone06:23
*** david-lyle has quit IRC06:26
*** pcaruana has joined #openstack-keystone06:29
*** sheel has joined #openstack-keystone06:50
*** ebarrera has joined #openstack-keystone07:10
*** tesseract has joined #openstack-keystone07:10
*** henrynash_ has joined #openstack-keystone07:11
*** ChanServ sets mode: +v henrynash_07:11
*** hogepodge has quit IRC07:12
*** adrian_otto has quit IRC07:15
*** henrynash_ has quit IRC07:17
*** nisha_ has quit IRC07:21
*** roxanaghe has joined #openstack-keystone07:22
*** GB21 has quit IRC07:23
*** roxanaghe has quit IRC07:27
*** dmk0202 has joined #openstack-keystone07:32
*** dmk0202 has quit IRC07:33
*** EinstCra_ has joined #openstack-keystone07:38
*** amoralej|off is now known as amoralej07:39
*** EinstCrazy has quit IRC07:40
*** nisha_ has joined #openstack-keystone07:42
*** EinstCra_ has quit IRC07:43
*** EinstCrazy has joined #openstack-keystone07:43
*** rcernin has quit IRC07:45
*** GB21 has joined #openstack-keystone07:49
*** yolanda has joined #openstack-keystone07:55
*** zzzeek has quit IRC08:00
*** zzzeek has joined #openstack-keystone08:00
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add domain functional tests  https://review.openstack.org/32959808:03
*** rcernin has joined #openstack-keystone08:10
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: [WIP] Testing latest u-c  https://review.openstack.org/31843508:10
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: [WIP] Testing latest u-c  https://review.openstack.org/31843508:10
*** nisha_ has quit IRC08:21
*** nisha_ has joined #openstack-keystone08:21
*** redrobot has quit IRC08:21
*** jlvillal has quit IRC08:22
*** jlvillal has joined #openstack-keystone08:22
*** henrynash_ has joined #openstack-keystone08:22
*** ChanServ sets mode: +v henrynash_08:22
*** Daviey_ has quit IRC08:23
*** roxanaghe has joined #openstack-keystone08:23
*** Daviey has joined #openstack-keystone08:23
*** redrobot has joined #openstack-keystone08:24
*** redrobot is now known as Guest3155308:24
*** dmk0202 has joined #openstack-keystone08:27
*** roxanaghe has quit IRC08:28
*** daemontool has joined #openstack-keystone08:28
*** nisha_ has quit IRC08:35
*** bj0rnar has joined #openstack-keystone08:36
*** mkrcmari__ has joined #openstack-keystone08:36
*** rmstar has joined #openstack-keystone08:36
*** jlvillal has quit IRC08:37
*** woodburn has quit IRC08:39
*** henrynash_ has quit IRC08:39
*** rodrigods has quit IRC08:40
*** ebarrera has quit IRC08:40
*** rodrigods has joined #openstack-keystone08:41
*** henrynash_ has joined #openstack-keystone08:41
*** harlowja_ has quit IRC08:41
*** jlvillal has joined #openstack-keystone08:42
*** daemontool_ has joined #openstack-keystone08:42
*** anteaya has quit IRC08:42
*** mvk_ has quit IRC08:42
*** rmstar_ has quit IRC08:42
*** ekarlso has quit IRC08:42
*** woodburn has joined #openstack-keystone08:42
*** bj0rnar- has quit IRC08:43
*** mdavidson has quit IRC08:43
*** tlbr has quit IRC08:43
*** henrynash has quit IRC08:43
*** xek has quit IRC08:43
*** xek has joined #openstack-keystone08:43
*** mtreinish has quit IRC08:44
*** daemontool has quit IRC08:44
*** tlbr has joined #openstack-keystone08:44
*** mdavidson has joined #openstack-keystone08:44
*** anteaya has joined #openstack-keystone08:45
*** ebarrera has joined #openstack-keystone08:45
*** mtreinish has joined #openstack-keystone08:46
*** tpeoples has quit IRC08:47
*** tpeoples has joined #openstack-keystone08:49
*** ekarlso has joined #openstack-keystone08:51
*** EinstCrazy has quit IRC08:55
*** EinstCrazy has joined #openstack-keystone08:59
openstackgerritMerged openstack/keystone: Use http_proxy_to_wsgi from oslo.middleware  https://review.openstack.org/32741809:00
*** EinstCra_ has joined #openstack-keystone09:06
*** EinstCrazy has quit IRC09:09
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: WIP - oidc: fix OpenID Connect authorization code grant_type  https://review.openstack.org/33000609:10
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: move scope into _OidcBase  https://review.openstack.org/33046309:10
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: WIP - oidc: add discovery document support  https://review.openstack.org/33046409:10
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: WIP - oidc: remove grant_type argument  https://review.openstack.org/33046509:10
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: refactor unit tests  https://review.openstack.org/33096609:10
*** openstackgerrit has quit IRC09:18
*** openstackgerrit has joined #openstack-keystone09:18
*** alex_xu has quit IRC09:26
*** alex_xu has joined #openstack-keystone09:28
*** mjb has quit IRC09:48
*** mjb has joined #openstack-keystone09:55
*** mjb has quit IRC09:56
*** zengchen has quit IRC09:58
*** mjb has joined #openstack-keystone09:59
*** openstackgerrit has quit IRC10:03
*** openstackgerrit has joined #openstack-keystone10:03
*** ashokt has quit IRC10:05
*** rcernin has quit IRC10:05
*** GB21 has quit IRC10:09
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: [WIP] Testing latest u-c  https://review.openstack.org/31843510:10
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: WIP - oidc: add discovery document support  https://review.openstack.org/33046410:12
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: WIP - oidc: remove grant_type argument  https://review.openstack.org/33046510:12
*** roxanaghe has joined #openstack-keystone10:24
*** roxanaghe has quit IRC10:29
*** Daviey has quit IRC10:29
*** Daviey has joined #openstack-keystone10:29
*** henrynash has joined #openstack-keystone10:37
*** ChanServ sets mode: +v henrynash10:37
*** GB21 has joined #openstack-keystone10:40
*** bunting has left #openstack-keystone10:41
*** permalac has joined #openstack-keystone10:47
*** hogepodge has joined #openstack-keystone10:54
*** henrynash has quit IRC10:58
*** GB21 has quit IRC10:59
*** GB21 has joined #openstack-keystone11:06
openstackgerritMikhail Nikolaenko proposed openstack/keystone: Validate impersonation in trust redelegation  https://review.openstack.org/33004511:20
*** roxanaghe has joined #openstack-keystone11:25
*** amoralej is now known as amoralej|lunch11:26
*** roxanaghe has quit IRC11:29
*** bjornar_ has joined #openstack-keystone11:31
*** rcernin has joined #openstack-keystone11:47
*** EinstCra_ has quit IRC11:53
*** nisha_ has joined #openstack-keystone11:54
*** nisha_ has quit IRC11:55
*** EinstCrazy has joined #openstack-keystone11:57
*** jsavak has joined #openstack-keystone11:58
*** EinstCra_ has joined #openstack-keystone12:00
*** EinstCrazy has quit IRC12:02
*** EinstCrazy has joined #openstack-keystone12:03
*** dave-mccowan has joined #openstack-keystone12:04
*** markvoelker has joined #openstack-keystone12:04
*** dmk0202 has quit IRC12:05
*** EinstCra_ has quit IRC12:06
*** jdennis has quit IRC12:10
*** EinstCra_ has joined #openstack-keystone12:11
*** rreimberg has joined #openstack-keystone12:11
*** EinstCra_ has quit IRC12:11
*** EinstCra_ has joined #openstack-keystone12:13
*** EinstCrazy has quit IRC12:14
*** ddieterly has joined #openstack-keystone12:16
*** jsavak has quit IRC12:18
samueldmqmorning keystone12:21
*** EinstCra_ has quit IRC12:21
*** GB21 has quit IRC12:23
*** roxanaghe has joined #openstack-keystone12:26
*** ddieterly has quit IRC12:26
*** jdennis has joined #openstack-keystone12:29
*** roxanaghe has quit IRC12:30
*** pauloewerton has joined #openstack-keystone12:34
*** jsavak has joined #openstack-keystone12:34
*** edmondsw has joined #openstack-keystone12:34
*** jsavak has quit IRC12:38
*** jsavak has joined #openstack-keystone12:39
*** lamt has joined #openstack-keystone12:39
shewlessastanek: thanks. I got federation working with testshib! I am encountering a weird problem on first login which I think is a bug. will try and grab some logs later on12:40
*** rreimberg has left #openstack-keystone12:41
*** gordc has joined #openstack-keystone12:46
amakarovayoung, o/12:51
*** ddieterly has joined #openstack-keystone12:53
openstackgerritLiam Young proposed openstack/keystone: Correct domain_id and name constraint dropping  https://review.openstack.org/32985513:01
*** amoralej|lunch is now known as amoralej13:03
*** ddieterly has quit IRC13:11
*** mwheckmann has joined #openstack-keystone13:14
*** jefrite has quit IRC13:19
*** andreykurilin has joined #openstack-keystone13:23
*** roxanaghe has joined #openstack-keystone13:27
*** henrynash has joined #openstack-keystone13:31
*** ChanServ sets mode: +v henrynash13:31
*** roxanaghe has quit IRC13:31
amakarovdstanek, hi! Are you here?13:34
*** richm has joined #openstack-keystone13:37
amakarovdstanek, I want to change assignment driver and your code stops the tests. How can I replace a driver for _assert_backends() to pass? https://github.com/openstack/keystone/blob/master/keystone/tests/unit/test_backend_ldap.py#L5013:38
*** ddieterly has joined #openstack-keystone13:38
*** Dinesh_Bhor has quit IRC13:45
*** links has quit IRC13:46
dstanekamakarov: that just ensures that the backends that are supposed to be loaded are loaded13:48
dstanekamakarov: for example, https://github.com/openstack/keystone/blob/master/keystone/tests/unit/test_backend_ldap.py#L106513:48
amakarovdstanek, aha, just as I thought. What should I do if I want to use another backend?13:50
*** ametts has joined #openstack-keystone13:50
dstanekamakarov: what are you trying to do?13:50
amakarovdstanek, I'm writhing an assignment driver13:51
dstanekamakarov: do you have example code to share?13:51
*** edtubill has joined #openstack-keystone13:52
amakarovdstanek, https://review.openstack.org/#/c/291318/16/keystone/delegation/backends/sql.py13:52
patchbotamakarov: patch 291318 - keystone - WIP/DNM Unified delegation assignment driver13:52
*** rodrigods has quit IRC13:52
*** rodrigods has joined #openstack-keystone13:52
*** jorge_munoz has quit IRC13:54
*** jorge_munoz has joined #openstack-keystone13:58
dstanekamakarov: i can't get that to work at all. lots of recursion errors14:02
*** raddaoui has joined #openstack-keystone14:02
amakarovdstanek, I know, I just don't want to push failing code )14:03
*** henrynash has quit IRC14:06
*** ddieterly is now known as ddieterly[away]14:06
*** sigmavirus24_ is now known as sigmavirus2414:06
openstackgerritAlexander Makarov proposed openstack/keystone: WIP/DNM Unified delegation assignment driver  https://review.openstack.org/29131814:07
amakarovdstanek, ^14:08
*** adrian_otto has joined #openstack-keystone14:10
amakarovdstanek, tox -e py27 keystone.tests.unit.test_backend_ldap14:10
amakarovdstanek, AssertionError: subsystem assignment expected <class 'keystone.assignment.backends.sql.Assignment'>, but observed <class 'keystone.assignment.backends.base.V10AssignmentWrapperForV9Driver'>14:11
dstanekamakarov: it looks like you are trying to reuse tests that have a very specific backend requirement14:12
*** sdake has joined #openstack-keystone14:12
amakarovdstanek, but I need to change the backend14:13
*** ddieterly[away] is now known as ddieterly14:13
dstanekamakarov: new test class? if you need to share tests then they may need to be broken out14:14
openstackgerritOpenStack Proposal Bot proposed openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/33116614:15
amakarovdstanek, broken out? What do you mean?14:15
dstanekamakarov: something you are doing is changing the backend that test_backend_ldap uses14:18
amakarovdstanek, as a result of my work the backend gets changed, so I want tests to pass with my new backend. What can I do for that?14:20
dstanekamakarov: you want the existing test to use your new backend?14:20
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/33118014:20
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient-kerberos: Updated from global requirements  https://review.openstack.org/33118114:20
amakarovdstanek, If I disable _assert_backends, test_backend_ldap passes14:20
amakarovdstanek, yes14:20
dstanekamakarov: but it gets run with the incorrect backends, right?14:21
dstanekamakarov: which tests do you want to run against your new backend?14:21
amakarovdstanek, all of them actually14:22
dstanekamakarov: all from that module?14:22
*** ebarrera has quit IRC14:23
dstanekamakarov: the short answer is not to us the LDAPIdentity setup14:23
amakarovdstanek, imagine keystone.assignment.backends.sql.Assignment is removed and keystone.delegation.backends.sql.AssignmentDriver is user instead of it14:25
amakarov*is used14:26
*** roxanaghe has joined #openstack-keystone14:28
amakarovdstanek, I assume all existing tests should pass14:28
dstanekamakarov: sure14:28
amakarovdstanek, so I want all the tests from keystone and all the tests from that module in partucular :)14:29
dstanekamakarov: LDAPIdentity is just setup not tests. make your own class that provides its own setup and uses the same tests14:29
amakarovdstanek, no problem, but what have I to do with failing tests based on LDAPIdentity? They won't go anywhere14:31
dstanekamakarov: don't change the backend used by LDAPIdentity14:31
*** david-lyle has joined #openstack-keystone14:32
*** roxanaghe has quit IRC14:32
amakarovdstanek, please suggest me, how can I not to change backend for a special test using adapters?14:33
amakarovhttps://review.openstack.org/#/c/291318/16/keystone/assignment/core.py14:33
patchbotamakarov: patch 291318 - keystone - WIP/DNM Unified delegation assignment driver14:33
dstanekamakarov: don't use the LDAPIdentity class. write your own that provides your own setup14:35
amakarovdstanek, I've done nothing to it and I don't use it14:36
amakarovdstanek, it just fails because of system-wide driver change14:36
amakarovdstanek, and it's not my custom driver - it's just a new vorsion of driver with adapter14:37
dstanekamakarov: so you'll need to figure out why the driver for its tests is getting changed14:37
amakarovdstanek, driver is getting changed because I introduce a new driver version, so driver is changed to adapter14:38
amakarovdstanek, in this case the old driver is called using an adapter14:38
amakarovdstanek, it is the very same driver14:39
amakarovdstanek, but wrapped with adapter14:39
amakarovbase.V10AssignmentWrapperForV9Driver14:39
dstanekamakarov: don't the tests always expect the latest version?14:41
amakarovdstanek, no14:41
mwheckmannhello. Can anyone help be with a federation problem when combined with the new sample v3 policy.json?14:41
amakarovdstanek, not this one14:41
dstanekamakarov: it should. i think _assert_backends actually matches the string 'sql' against the entrypoint14:43
amakarovdstanek, more or less - it matches the driver class14:44
*** phalmos has joined #openstack-keystone14:44
amakarovdstanek, the class from entrypoint against the calss of actual driver14:44
dstanekamakarov: is that the latest class?14:45
amakarovdstanek, actual driver is of latest class, expected class is assignment.backends.sql.Assignment14:46
amakarovwithout any versioning14:46
mwheckmannbasically, I have SAML federation working beautifully, but the problem is that all users that come in from federation are in the "Federated" domain.14:48
*** nisha_ has joined #openstack-keystone14:48
mwheckmannThis means that I can't map any user to be a domain admin in other domains14:49
*** timcline has joined #openstack-keystone14:50
dstanekamakarov: in my env it looks like it expects the latest and get a wrapper around the old14:54
*** pcaruana has quit IRC14:54
dstanekamakarov: the tests (except the legacy tests) should always be using the latest drivers14:55
amakarovdstanek, can you please give me an error message?14:55
dstanek    AssertionError: subsystem assignment expected <class 'keystone.assignment.backends.sql.Assignment'>, but observed <class 'keystone.assignment.backends.base.V10AssignmentWrapperForV9Driver'>14:56
openstackgerritRodrigo Duarte proposed openstack/keystone: Integration tests cleanup  https://review.openstack.org/33053714:56
dstanekamakarov: are you not getting the same thing?14:56
amakarovdstanek, yes14:56
amakarovdstanek, it expects not the latest one14:56
amakarovbut the particular one14:56
amakarovkeystone.assignment.backends.sql.Assignment is not the latest14:57
amakarovdstanek, V10AssignmentWrapperForV9Driver is used to adapt it14:57
dstanekamakarov: isn't keystone.assignment.backends.sql.Assignment the latest driver?14:58
amakarovdstanek, no. it's v9 and I'm introducing v1014:58
dstanekamakarov: that's why you are broken then14:58
*** roxanaghe has joined #openstack-keystone14:59
dstanekamakarov: our drivers should be the latest14:59
dstanekamakarov: it's vendor drivers that need the wrapper. we should never be using the wrapper ourselves14:59
amakarovdstanek, so I should upgrade alod driver to be v10 to pass this test?15:00
dstanekamakarov: probably15:00
dstanekkeystone *always* uses the latest driver. we just support the old interface for vendors that can't keep up15:00
amakarovdstanek, understood. thanks, will hack okd driver then15:01
*** roxanaghe has quit IRC15:03
*** tesseract has quit IRC15:05
dstanekamakarov: np15:06
*** rcernin has quit IRC15:07
*** bjornar_ has quit IRC15:10
*** adrian_otto has quit IRC15:11
*** browne has joined #openstack-keystone15:15
*** dan_nguyen has joined #openstack-keystone15:18
*** sdake has quit IRC15:20
*** afazekas|dentist is now known as afazekas15:25
*** nisha__ has joined #openstack-keystone15:27
*** jorge_munoz_ has joined #openstack-keystone15:27
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add domain functional tests  https://review.openstack.org/32959815:27
*** jorge_munoz has quit IRC15:27
*** jorge_munoz_ is now known as jorge_munoz15:27
nisha__samueldmq, Please have a look :)15:27
*** nisha_ has quit IRC15:30
*** dan_nguyen has quit IRC15:32
*** dan_nguyen has joined #openstack-keystone15:36
*** belmoreira has quit IRC15:40
*** phalmos has quit IRC15:41
*** phalmos has joined #openstack-keystone15:43
*** ddieterly is now known as ddieterly[away]15:47
*** henrynash has joined #openstack-keystone15:49
*** ChanServ sets mode: +v henrynash15:49
*** Guest31553 is now known as redrobot15:50
*** sdake has joined #openstack-keystone15:51
*** dan_nguyen has quit IRC15:51
openstackgerritMikhail Nikolaenko proposed openstack/keystone: Validate impersonation in trust redelegation  https://review.openstack.org/33004515:52
samueldmqnisha__: done, I left another couple of comments, mostly nits (minor suggestions/changes)15:52
nisha__samueldmq, Sure, will work on them15:53
*** aratus has joined #openstack-keystone15:53
*** aratus has left #openstack-keystone15:56
*** tonytan4ever has joined #openstack-keystone15:59
*** dan_nguyen has joined #openstack-keystone15:59
*** permalac has quit IRC16:03
*** roxanaghe has joined #openstack-keystone16:06
*** sdake has quit IRC16:07
*** dmk0202 has joined #openstack-keystone16:09
*** mdavidson has quit IRC16:11
*** ddieterly[away] is now known as ddieterly16:14
*** roxanaghe has quit IRC16:15
*** roxanaghe has joined #openstack-keystone16:22
*** jsavak has quit IRC16:25
*** jsavak has joined #openstack-keystone16:26
-openstackstatus- NOTICE: zuul was restarted for a software upgrade; events between 16:08 and 16:30 were missed, please recheck any changes uploaded during that time16:33
*** gyee has joined #openstack-keystone16:42
*** ChanServ sets mode: +v gyee16:42
*** pushkaru has joined #openstack-keystone16:47
ayoungdstanek, notmorgan how do we publish the entrypoints for the SAML2 and kerberos plugins in keystoneauth?  THey are not listed in /usr/lib/python2.7/site-packages/keystoneauth1-2.4.1-py2.7.egg-info/entry_points.txt16:49
*** ddieterly is now known as ddieterly[away]16:50
*** manjrem has joined #openstack-keystone16:51
*** daemontool_ has quit IRC16:52
*** harlowja has joined #openstack-keystone16:53
*** adrian_otto has joined #openstack-keystone16:57
dstanekayoung: do we have saml2 stuff in keystoneauth?17:00
ayoungdstanek, yeah, in extras17:00
ayoung dstanek I think we just need an entrypoint17:00
dstanekmaybe there's no entrypoint since it's in extras17:00
ayoungdstanek, http://git.openstack.org/cgit/openstack/keystoneauth/tree/keystoneauth1/extras17:01
ayoungdstanek, so, as I understand it, enumerating the extras would load the classes, causing failuers for the ones that have external dependencies17:01
ayoungdoes just loading a class via entrypoints enumerate the same way?17:02
ayoungI think I can test this...17:02
*** jsavak has quit IRC17:02
*** jsavak has joined #openstack-keystone17:02
dstanekayoung: ah, yeah. that's probably it. you can still use it by using the fully qualified path17:04
*** sheel has quit IRC17:05
ayoungdstanek, so we broke everyone using entrypoints this way.  I have a meeting now...17:06
*** tonytan4ever has quit IRC17:07
*** mvk_ has joined #openstack-keystone17:11
*** ddieterly[away] is now known as ddieterly17:13
*** mkrcmari__ has quit IRC17:15
*** GB21 has joined #openstack-keystone17:15
*** browne has quit IRC17:19
openstackgerritMerged openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/33116617:22
*** adrian_otto has quit IRC17:23
*** nisha__ has quit IRC17:26
*** nisha__ has joined #openstack-keystone17:27
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add domain functional tests  https://review.openstack.org/32959817:28
*** nisha__ is now known as nisha_17:34
*** adrian_otto has joined #openstack-keystone17:35
*** sdake has joined #openstack-keystone17:40
*** adrian_otto has quit IRC17:42
*** pauloewerton has quit IRC17:43
nisha_samueldmq, did the changes, thanks for suggestions :)17:44
*** jed56 has quit IRC17:45
*** GB21 has quit IRC17:45
*** pauloewerton has joined #openstack-keystone17:50
samueldmqnisha_: thx17:53
openstackgerritSam Leong proposed openstack/keystoneauth: Auth plugin for X.509 tokenless authz  https://review.openstack.org/28390517:54
*** gyee has quit IRC17:55
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add domain functional tests  https://review.openstack.org/32959817:55
*** manjrem has quit IRC17:57
*** tonytan4ever has joined #openstack-keystone17:57
*** ddieterly is now known as ddieterly[away]18:03
*** harlowja has quit IRC18:04
*** browne has joined #openstack-keystone18:08
*** adrian_otto has joined #openstack-keystone18:09
*** amakarov is now known as amakarov_away18:10
*** adrian_otto has quit IRC18:10
*** al_loew has joined #openstack-keystone18:12
*** mkrcmari__ has joined #openstack-keystone18:25
*** mvk_ has quit IRC18:28
*** timcline has quit IRC18:30
*** timcline has joined #openstack-keystone18:30
*** timcline has quit IRC18:35
*** pushkaru has quit IRC18:36
shewlessHi team. I think I have found a bug with keystone federation using Shibboleth. I'm running Mitaka and when I restart shibd I always receive a 404 error (Not Found: /v3/auth/OS-FEDERATION/websso/saml2) for the FIRST time I try and "connect" from Horizon. Subsequent attempts all work perfectly, until I restart shibd again.18:36
shewlessIs anyone around to help me validate that?18:36
*** jsavak has quit IRC18:37
shewlessI don't see any errors in keystone.log, I see an access error in apache for "not found", and the shib transaction log logs "nothing" when it's working.. but on the first attempt it logs that it's creating a new session18:37
*** jsavak has joined #openstack-keystone18:38
*** simondodsley has joined #openstack-keystone18:40
shewlessActually the problem is much worse then that. Every time a new transaction is created in shibboleth this problem occurs. So If I use a new browser the problem occurs or if 10 different users login from their computers they would see "page not found" on the first time through18:45
shewlessThe timestamp for shibd to create the transaction is the exact timestamp that the "not found" error is generated in apache.  Is this a "race condition"?18:47
*** jsavak has quit IRC18:52
*** jsavak has joined #openstack-keystone18:53
dstanekshewless: that happens before you are redirected to the IdP?18:53
dstanekif so then it would be a shib bug i think18:53
shewlessdstanek: I think so. not quite sure18:55
dstanekshewless: you won't find keystone logs for requests that are handled by mod_shib18:55
*** nisha_ has quit IRC18:56
shewlessdstanek: hmm. thanks. any hints how I would track that down?18:56
openstackgerritMerged openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/33118018:57
shewlessdstanek: but it times out accessing:  /v3/auth/OS-FEDERATION/websso/saml218:57
shewlessdstanek: wouldn't that be a keystone thing?18:57
*** timcline has joined #openstack-keystone18:58
*** ddieterly[away] has quit IRC19:03
*** amoralej is now known as amoralej|off19:03
*** al_loew has quit IRC19:09
dstanekshewless: you probably have that in your apache config as being handled by mod_shib19:14
dstanekshewless: is there anything in your apache error logs or the shibboleth logs?19:15
*** gyee has joined #openstack-keystone19:17
*** ChanServ sets mode: +v gyee19:17
*** al_loew has joined #openstack-keystone19:18
*** ddieterly has joined #openstack-keystone19:27
*** pushkaru has joined #openstack-keystone19:31
*** harlowja has joined #openstack-keystone19:32
*** tonytan4ever has quit IRC19:39
*** slberger has joined #openstack-keystone19:44
*** jsavak has quit IRC19:48
*** samueldmq has quit IRC19:49
*** pauloewerton has quit IRC19:49
*** markvoelker has quit IRC19:55
*** ddieterly is now known as ddieterly[away]19:57
*** raildo is now known as raildo-afk19:57
*** ddieterly[away] is now known as ddieterly20:01
*** slberger has quit IRC20:03
*** slberger has joined #openstack-keystone20:06
shewlessdstanek: apache just says that it can't find /v3/auth/OS-FEDERATION/websso/saml220:09
*** dan_nguyen has quit IRC20:09
shewlessdstanek: and shibboleth just says that it's starting a new session (no errors that I can see)20:09
*** markvoelker has joined #openstack-keystone20:10
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add domain functional tests  https://review.openstack.org/32959820:11
*** edtubill has quit IRC20:12
*** ddieterly has quit IRC20:14
shewlessdstanek: sorry I lied. I tried it on a fresh browser and the error happens after the IDP part20:22
shewlessdstanek: does that mean it's a keystone problem?20:24
*** mwheckmann has quit IRC20:30
*** mvk_ has joined #openstack-keystone20:34
dstanekshewless: not sure. you said you get a 404 before keystone gets a chance to serve the request right?20:38
*** mkrcmari__ has quit IRC20:38
dstanekis it maybe missing the port?20:38
shewlessdstanek: I get a 404 error while at the same time shib is creating the session. I don't think there are any keystone logs..20:39
shewlessdstanek: not sure why it would work every subsequent time if it's a port issue20:40
dstanekshewless: are you restart shibd to fix the issue?20:41
shewlessdstanek: restarting shibd basically creates the issue. so if I restart shibd and then I try and connect I'll always hit the error the first time.. then after that it works fine20:42
*** pushkaru has quit IRC20:44
shewlessdstanek: in the "broken" case keystone logs this (and only this): 192.168.216.117 - - [17/Jun/2016:20:42:44 +0000] "GET /v3/auth/OS-FEDERATION/websso/saml2?origin=https://mycloud.foo.com/auth/websso/ HTTP/1.1" 302 1999 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.84 Safari/537.36"20:44
shewlessdstanek: in the "working" case keystone logs that same line (as far as I can tell) and then a bunch more stuff20:44
shewlessdstanek: Does the number after the GET matter?  In the bad case it's 302 and in the good case it's 200.. GET /v3/auth/OS-FEDERATION/websso/saml2?origin=https://mycloud.foo.com/auth/websso/ HTTP/1.1" 200 884 "20:47
dstaneki think the 302 is trying to redirect you to the IdP and the 200 is after it thinks you have successfully logged in20:48
dstanekshewless: when are you getting the 404?20:49
shewlessdstanek: not sure what you mean20:51
shewlessdstanek: ran out of time for today. I'd like to catch up with you on Monday if possible. Hav ea good weekend20:54
*** mkrcmari__ has joined #openstack-keystone20:54
dstanekshewless: you too20:57
*** mvk_ has quit IRC20:57
*** mvk has joined #openstack-keystone21:01
*** mkrcmari__ has quit IRC21:02
notmorganstevemar: soooooo many rap battles of history today.21:06
notmorganstevemar: soooooo many...21:06
henrynashso I’m a little confused….what is the relationship between keystonemiddleware and keystone/middleware?21:11
henrynashthe later if to build teh variou server pipeline processes I assume?21:12
henrynashand the former is for clients to auth?21:12
*** daemontool has joined #openstack-keystone21:12
*** ametts has quit IRC21:13
notmorganhenrynash: keystone/middleware is the implementation of basically keystonemiddleware that keystone uses since it can access the db has to validate the token internalylt rather than use a rEST interface to do so21:13
henrynashnotmorgan: ah21:13
notmorganhenrynash: long term there is a desire to split keystonemiddleware.auth_token out into peices that keystone/middleware can consume21:13
henrynashnotmorgan: right, that would be good21:14
notmorganhenrynash: but keystone/middleware just constructs the auth context that is specific to keystone, right now auth_token can't be run in front of keystne bceause it doesn't know how to ask keystone internals how to validate a token21:14
henrynashand keystone/tests/unit/test_middleware ends up calling keystonemiddleware….which I found confusing?21:14
notmorganhenrynash: jamielennox has been working on that conversion fwiw21:15
henrynash(at least I think that’s what is happening)21:15
*** slberger has quit IRC21:16
henrynashnotmorgan: thx21:19
*** edtubill has joined #openstack-keystone21:19
*** slberger has joined #openstack-keystone21:20
*** gordc has quit IRC21:21
*** markvoelker has quit IRC21:21
*** edtubill has quit IRC21:22
*** dave-mccowan has quit IRC21:26
*** dmk0202 has quit IRC21:33
*** dmk0202 has joined #openstack-keystone21:34
EmilienMtoday I'm sad21:49
EmilienMhttps://bugs.launchpad.net/python-openstackclient/+bug/1593664 is really annoying21:49
openstackLaunchpad bug 1593664 in python-openstackclient "openstackclient fails with --os-token and --os-url" [Undecided,New] - Assigned to Adam Young (ayoung)21:49
ayoungit doesnm't fail;21:50
EmilienMis it wrong to run keystone-manage boostrap using admin token ?21:50
ayoungit is the deprcatiopn warning21:50
*** dmk0202 has quit IRC21:50
ayoungyou should just kill admin_token for this21:50
EmilienMayoung: is it a parsing issue in our ruby provider?21:50
EmilienMayoung: look at https://paste.fedoraproject.org/380739/18780514/ - yea it's seems to fail21:51
ayoungah...no the problem is the OSC21:52
ayounglet's see if we can suprress that21:52
ayoungEmilienM, you have that machine available?21:52
EmilienMno but I can give one to you21:52
EmilienMayoung: let me 10 min21:53
*** daemontool has quit IRC21:53
ayoungexport PYTHONWARNINGS="ignore:Certificate has no, ignore:A true SSLContext object is not available, ignore:...  "21:53
ayoungnot sure what to put there21:53
ayoungEmilienM, I'm kindof in Family mode at the moment. EMail me the login info and I will get to it later tongiht21:56
*** edtubill has joined #openstack-keystone21:56
EmilienMayoung: ack21:56
*** edtubill has quit IRC21:58
*** slberger has left #openstack-keystone22:00
*** phalmos has quit IRC22:01
*** pushkaru has joined #openstack-keystone22:10
*** henrynash has quit IRC22:17
*** haneef has joined #openstack-keystone22:33
*** dan_nguyen has joined #openstack-keystone22:37
*** sdake has quit IRC22:38
*** mvk_ has joined #openstack-keystone22:39
*** sdake has joined #openstack-keystone22:41
*** mvk has quit IRC22:42
*** edtubill has joined #openstack-keystone22:44
*** edtubill has quit IRC22:51
*** edtubill has joined #openstack-keystone22:52
*** timcline has quit IRC22:56
*** timcline has joined #openstack-keystone22:57
*** edmondsw has quit IRC22:59
*** timcline has quit IRC23:01
*** edtubill has quit IRC23:08
*** markvoelker has joined #openstack-keystone23:16
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Pass X_IS_ADMIN_PROJECT header from auth_token  https://review.openstack.org/33137423:16
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Pass X_IS_ADMIN_PROJECT header from auth_token  https://review.openstack.org/33137423:21
*** dave-mccowan has joined #openstack-keystone23:22
*** dave-mccowan has quit IRC23:26
*** pushkaru has quit IRC23:37
*** jorge_munoz has quit IRC23:41
*** gyee has quit IRC23:46
*** pushkaru has joined #openstack-keystone23:47
*** raddaoui has quit IRC23:47
*** al_loew has quit IRC23:51
*** lamt has quit IRC23:51

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!