Thursday, 2016-07-14

*** gyee has quit IRC00:08
*** anteaya has quit IRC00:10
*** thumpba has joined #openstack-keystone00:22
*** adrian_otto has quit IRC00:30
*** david-lyle has quit IRC00:31
*** thumpba has quit IRC00:33
*** david-lyle_ has quit IRC00:36
*** david-lyle_ has joined #openstack-keystone00:36
openstackgerritMerged openstack/keystone: Validate SAML keyfile & certfile options  https://review.openstack.org/34152500:44
openstackgerritJamie Lennox proposed openstack/keystone: Disable warnerrors in setup.cfg temporarily  https://review.openstack.org/34188400:46
*** tonytan4ever has joined #openstack-keystone00:54
*** edtubill has joined #openstack-keystone00:54
*** tonytan4ever has quit IRC00:59
*** anteaya has joined #openstack-keystone01:02
*** spzala has joined #openstack-keystone01:09
*** pece has quit IRC01:09
*** lamt has quit IRC01:11
*** thumpba has joined #openstack-keystone01:16
*** code-R has joined #openstack-keystone01:18
*** browne has quit IRC01:20
*** EinstCrazy has joined #openstack-keystone01:26
*** edtubill has quit IRC01:38
*** ravelar159 has joined #openstack-keystone01:40
*** wangqun has joined #openstack-keystone01:42
*** ravelar159 has quit IRC01:45
*** tonytan4ever has joined #openstack-keystone02:02
*** rderose has quit IRC02:08
*** tonytan_brb has joined #openstack-keystone02:10
*** tonytan4ever has quit IRC02:13
*** davechen has joined #openstack-keystone02:14
*** EinstCrazy has quit IRC02:15
*** EinstCrazy has joined #openstack-keystone02:16
*** akscram has quit IRC02:22
*** kean has quit IRC02:23
*** kean has joined #openstack-keystone02:24
*** akscram has joined #openstack-keystone02:28
openstackgerritDave Chen proposed openstack/python-keystoneclient: Add region functional tests  https://review.openstack.org/33915802:29
*** spzala has quit IRC02:33
*** spzala has joined #openstack-keystone02:33
*** ddieterly has joined #openstack-keystone02:33
*** spzala has quit IRC02:38
*** itisha has quit IRC02:40
openstackgerritClenimar Filemon proposed openstack/keystone: Move OS-INHERIT api-ref from extensions to core  https://review.openstack.org/34191202:40
openstackgerritClenimar Filemon proposed openstack/keystone: Move OS-INHERIT api-ref from extensions to core  https://review.openstack.org/34191202:43
*** markvoelker has quit IRC02:45
*** roxanaghe has quit IRC02:46
*** roxanaghe has joined #openstack-keystone02:46
*** adu has joined #openstack-keystone02:48
*** akscram has quit IRC02:48
*** woodster_ has quit IRC02:49
*** akscram has joined #openstack-keystone02:49
*** ddieterly has quit IRC02:50
*** roxanaghe has quit IRC02:51
*** akscram has quit IRC02:53
*** akscram has joined #openstack-keystone02:54
*** sdake has joined #openstack-keystone02:59
*** richm has quit IRC03:02
*** itisha has joined #openstack-keystone03:03
*** TxGVNN has joined #openstack-keystone03:06
*** akscram has quit IRC03:07
*** akscram has joined #openstack-keystone03:13
*** mordred has quit IRC03:14
*** thumpba has quit IRC03:25
*** akscram has quit IRC03:31
*** akscram has joined #openstack-keystone03:33
openstackgerritzheng yin proposed openstack/python-keystoneclient: Add Python 3.5 classifier and venv  https://review.openstack.org/34193103:37
*** akscram has quit IRC03:38
*** markvoelker has joined #openstack-keystone03:39
*** akscram has joined #openstack-keystone03:40
*** EinstCrazy has quit IRC03:43
*** EinstCrazy has joined #openstack-keystone03:44
*** akscram has quit IRC03:47
*** akscram has joined #openstack-keystone03:54
openstackgerritMerged openstack/keystoneauth: Add Python 3.5 classifier and venv  https://review.openstack.org/34106503:55
*** julim has quit IRC03:56
*** dikonoor has joined #openstack-keystone03:56
*** akscram has quit IRC04:01
*** spzala has joined #openstack-keystone04:03
*** akscram has joined #openstack-keystone04:04
*** adu has quit IRC04:05
*** davechen has left #openstack-keystone04:06
*** spzala has quit IRC04:07
stevemarjamielennox: yes04:07
*** adrian_otto has joined #openstack-keystone04:09
*** harlowja has quit IRC04:13
*** akscram has quit IRC04:13
*** roxanaghe has joined #openstack-keystone04:15
*** eggmaster has quit IRC04:16
*** dikonoor has quit IRC04:16
*** akscram has joined #openstack-keystone04:23
*** david-lyle_ has quit IRC04:26
*** links has joined #openstack-keystone04:27
*** akscram has quit IRC04:28
*** akscram has joined #openstack-keystone04:28
jamielennoxstevemar: is this something we're doing now: https://review.openstack.org/#/c/341841/1/api-ref/source/v2/samples/admin/authenticate-response.json04:30
patchbotjamielennox: patch 341841 - keystone - Update identity endpoint in v2 samples04:30
*** roxanaghe has quit IRC04:32
*** roxanaghe has joined #openstack-keystone04:32
*** GB21 has joined #openstack-keystone04:34
*** nisha_ has joined #openstack-keystone04:34
*** roxanaghe has quit IRC04:36
openstackgerritSteve Martinelli proposed openstack/keystone: Add OS-KSCRUD api-ref  https://review.openstack.org/34170804:41
*** david-lyle_ has joined #openstack-keystone04:42
*** akscram has quit IRC04:48
*** EinstCrazy has quit IRC04:49
*** code-R_ has joined #openstack-keystone04:49
*** EinstCrazy has joined #openstack-keystone04:50
jamielennoxthat's a big list of merging patches04:51
*** code-R has quit IRC04:52
*** akscram has joined #openstack-keystone04:59
*** eggmaster has joined #openstack-keystone05:01
*** EinstCrazy has quit IRC05:03
*** EinstCrazy has joined #openstack-keystone05:04
*** adu has joined #openstack-keystone05:08
openstackgerritMerged openstack/keystone: Require auth_context middleware in the pipeline  https://review.openstack.org/33935605:08
openstackgerritMerged openstack/keystone: Handle more auth information via context  https://review.openstack.org/33939005:10
openstackgerritMerged openstack/keystone: Disable warnerrors in setup.cfg temporarily  https://review.openstack.org/34188405:10
*** sdake has quit IRC05:26
*** code-R_ has quit IRC05:26
*** code-R has joined #openstack-keystone05:27
*** adu has quit IRC05:33
openstackgerritMerged openstack/keystone: Improve keystone.conf [saml] documentation  https://review.openstack.org/34056605:36
openstackgerritMerged openstack/keystone: Improve keystone.conf [security_compliance] documentation  https://review.openstack.org/34179705:36
*** nisha_ has quit IRC05:36
*** roxanaghe has joined #openstack-keystone05:36
*** jojden has joined #openstack-keystone05:38
*** akscram has quit IRC05:40
*** roxanaghe has quit IRC05:41
*** davechen has joined #openstack-keystone05:43
openstackgerritMerged openstack/keystone: Improve keystone.conf [token] documentation  https://review.openstack.org/34164605:45
openstackgerritMerged openstack/keystone: Improve keystone.conf [signing] documentation  https://review.openstack.org/34179005:45
openstackgerritMerged openstack/keystone: Improve keystone.conf [shadow_users] documentation  https://review.openstack.org/34179105:45
openstackgerritMerged openstack/keystone: Improve keystone.conf [tokenless_auth] documentation  https://review.openstack.org/34059105:46
openstackgerritMerged openstack/keystone: Correct normal response codes for auth docs  https://review.openstack.org/34171505:46
openstackgerritMerged openstack/keystone: Correct normal status codes for v2.0 admin docs  https://review.openstack.org/34179605:46
*** sheel has joined #openstack-keystone05:47
*** markvoelker has quit IRC05:52
openstackgerritMerged openstack/keystone: Correct normal response codes in v2.0 tenant docs  https://review.openstack.org/34178105:55
openstackgerritMerged openstack/keystone: Correct normal response codes for credential docs  https://review.openstack.org/34171605:56
openstackgerritMerged openstack/keystone: Correct normal response codes in v2.0 admin user docs  https://review.openstack.org/34177005:56
openstackgerritMerged openstack/keystone: Correct normal response codes for role docs  https://review.openstack.org/34172605:56
openstackgerritMerged openstack/keystone: Correct normal response codes for policy docs  https://review.openstack.org/34171905:56
*** akscram has joined #openstack-keystone05:57
*** EinstCrazy has quit IRC05:58
*** EinstCrazy has joined #openstack-keystone05:59
openstackgerritJamie Lennox proposed openstack/keystone: Cleanup trusts controller  https://review.openstack.org/34196906:00
openstackgerritJamie Lennox proposed openstack/keystone: Remove get_user_id in trust controller  https://review.openstack.org/34197006:00
*** rcernin has joined #openstack-keystone06:01
*** spzala has joined #openstack-keystone06:01
openstackgerritDave Chen proposed openstack/keystone: Change the parameter from  optional to required  https://review.openstack.org/34197306:02
openstackgerritMerged openstack/keystone: Correct normal response codes in service catalog doc  https://review.openstack.org/34175906:03
openstackgerritMerged openstack/keystone: Correct normal response codes for region docs  https://review.openstack.org/34172306:03
openstackgerritEric Brown proposed openstack/keystone: Trivial spacing and comma corrections  https://review.openstack.org/34197506:04
openstackgerritMerged openstack/keystone: Correct normal response codes for project docs  https://review.openstack.org/34172006:04
openstackgerritMerged openstack/keystone: Correct normal response codes for v2.0 versions doc  https://review.openstack.org/34178506:04
openstackgerritMerged openstack/keystone: Clean up token binding validation code  https://review.openstack.org/34166206:04
*** spzala has quit IRC06:06
*** akscram has quit IRC06:08
openstackgerritzheng yin proposed openstack/python-keystoneclient: Add Python 3.5 classifier and venv  https://review.openstack.org/34193106:26
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add project functional tests  https://review.openstack.org/33287106:33
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add project functional tests  https://review.openstack.org/33287106:34
*** markvoelker has joined #openstack-keystone06:34
*** code-R_ has joined #openstack-keystone06:38
*** markvoelker has quit IRC06:39
*** pcaruana has joined #openstack-keystone06:40
*** code-R has quit IRC06:41
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add region functional tests  https://review.openstack.org/33915806:42
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add region functional tests  https://review.openstack.org/33915806:44
openstackgerritMerged openstack/keystone: Correct normal response codes in v2.0 versions doc  https://review.openstack.org/34178206:47
openstackgerritDave Chen proposed openstack/keystone: Clean the V3 extension parameter list  https://review.openstack.org/34199306:48
*** roxanaghe has joined #openstack-keystone06:48
*** roxanaghe has quit IRC06:52
*** belmoreira has joined #openstack-keystone06:57
*** nisha_ has joined #openstack-keystone06:57
*** rcernin has quit IRC07:05
*** jaosorior has joined #openstack-keystone07:08
*** tesseract- has joined #openstack-keystone07:10
*** code-R_ has quit IRC07:18
*** code-R has joined #openstack-keystone07:18
*** rcernin has joined #openstack-keystone07:20
*** nisha_ has quit IRC07:24
*** markvoelker has joined #openstack-keystone07:28
*** GB21 has quit IRC07:30
*** markvoelker has quit IRC07:35
*** andrewliu117 has joined #openstack-keystone07:36
openstackgerritSwapnil Kulkarni (coolsvap) proposed openstack/keystone: [WIP] Testing latest u-c  https://review.openstack.org/31843507:40
andrewliu117dear fellows, I have a question need your help, I am trying to using the pycharm remote debug to debug keystone. now I met this problem, when I start the keystone by keystone-all command, and then I add the "pydevd.settrace(myip, port=15678, stdoutToServer=True,07:40
andrewliu117 stderrToServer=True)" to some api function, but it won't stop here07:40
*** tonytan_brb has quit IRC07:40
andrewliu117but instead, I using the httpd way to start the keystone, it will stop07:41
*** ravelar159 has joined #openstack-keystone07:41
andrewliu117did anyone meet this problem before?07:41
andrewliu117I think it may relate to the paste worker07:41
andrewliu117any advice is appreciated07:42
*** akscram has joined #openstack-keystone07:44
*** TxGVNN has quit IRC07:46
*** ravelar159 has quit IRC07:47
openstackgerritMerged openstack/keystone: Add OS-KSCRUD api-ref  https://review.openstack.org/34170807:49
*** TxGVNN has joined #openstack-keystone07:49
*** itisha has quit IRC07:50
andrewliu117or can any one give me some information about how to debug keystone?07:52
jamielennoxandrewliu117: i haven't used pycharm but i do remember that there used to be a problem with eventlet and pycharm debugging07:56
jamielennoxandrewliu117: there were some flags that might have worked, but keystone-all and the eventlet code has all been deprecated and removed so i'm not sure how much luck you'll have there07:56
jamielennoxthe wsgi code will work, and i've used rpdb with success there07:57
jamielennoxotherwise i'd suggest you execute the keystone-wsgi-public script directly which will run a test server on a single thread07:57
jamielennoxfrom there you can just use ipdb or whatever you like in the console07:57
*** d0ugal has joined #openstack-keystone07:59
*** jrist has joined #openstack-keystone07:59
*** zzzeek has quit IRC08:00
*** zzzeek has joined #openstack-keystone08:00
*** rcernin has quit IRC08:00
*** spzala has joined #openstack-keystone08:03
*** spzala has quit IRC08:07
openstackgerritDavanum Srinivas (dims) proposed openstack/keystone: [WIP] Testing latest u-c  https://review.openstack.org/31843508:10
openstackgerrityuyafei proposed openstack/python-keystoneclient: Add __ne__ built-in function  https://review.openstack.org/33743508:10
*** jistr is now known as jistr|off08:11
*** rcernin has joined #openstack-keystone08:13
*** GB21 has joined #openstack-keystone08:17
openstackgerritDave Chen proposed openstack/keystone: Fix the wrong check condition  https://review.openstack.org/34203408:18
*** markvoelker has joined #openstack-keystone08:23
*** markvoelker has quit IRC08:27
*** akscram has quit IRC08:27
openstackgerritJamie Lennox proposed openstack/keystone: Cleanup trusts controller  https://review.openstack.org/34196908:30
openstackgerritJamie Lennox proposed openstack/keystone: Remove get_user_id in trust controller  https://review.openstack.org/34197008:30
openstackgerritJamie Lennox proposed openstack/keystone: Remove a validate_token_bind call  https://review.openstack.org/34204608:32
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: move the get_unscoped_auth_ref into the base class  https://review.openstack.org/33714008:32
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: add discovery document support  https://review.openstack.org/33046408:32
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: deprecate grant_type argument  https://review.openstack.org/33046508:32
*** nisha_ has joined #openstack-keystone08:36
*** adrian_otto has quit IRC08:41
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Add region functional tests  https://review.openstack.org/33915808:43
*** akscram has joined #openstack-keystone08:45
*** nisha_ has quit IRC08:54
openstackgerritJamie Lennox proposed openstack/keystone: Pass request to normalize_domain_id  https://review.openstack.org/34205208:55
*** aastha has quit IRC08:59
openstackgerritJamie Lennox proposed openstack/keystone: Remove get_trust_id_for_request function  https://review.openstack.org/34205609:04
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: fix OpenID Connect authorization code grant_type  https://review.openstack.org/33000609:16
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: move the get_unscoped_auth_ref into the base class  https://review.openstack.org/33714009:16
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: deprecate grant_type argument  https://review.openstack.org/33046509:16
*** markvoelker has joined #openstack-keystone09:17
andrewliu117jamielennox, thanks09:19
*** EinstCrazy has quit IRC09:19
*** EinstCrazy has joined #openstack-keystone09:20
*** markvoelker has quit IRC09:21
jamielennoxaloga: i'm +2 all the way to the last one, i'm not sure what you mean that you can't not set the port09:25
andrewliu117@jamielennox, thanks09:25
jamielennoxandrewliu117: no worries, hope it helped09:25
alogajamielennox: if you chose a random port, it will change each time you're executing the code09:30
*** clenimar_ has quit IRC09:30
alogajamielennox: and in some oidc servers you have to explicitly set the list of allowed urls for redirection09:30
jamielennoxaloga: OIDC has a service registration?09:30
alogas/chose/choose/09:30
jamielennoxah09:30
jamielennoxi think that pretty much kills this whole approach though right?09:31
jamielennoxi mean you would need to get every person who is possibly going to use the OIDC server registered with a real hostname09:31
jamielennoxbecause they can't all be localhost09:31
alogajamielennox: nope09:31
alogayou can set localhost09:31
jamielennox(or maybe they can and that's weird)09:31
alogajamielennox: /clear09:32
alogajamielennox: lets start again09:32
alogajamielennox: when you define a client, you have to specify which URLs you are allowed to be redirected09:32
jamielennoxso its perfectly OK to say: OIDC server allow requests from localhost:8080 and that will work for everyone09:32
alogajamielennox: no, this is done by the client09:32
alogajamielennox: the user, when it creates a client so that it gets the client id and secret09:33
alogajamielennox: she has to specify a redirection URL09:33
alogajamielennox: this can be localhost:808009:33
alogajamielennox: in the horizon case, it is the websso url09:33
alogajamielennox: they can be both09:33
alogajamielennox: but the thing is that you have to know the URL when you (as a user) create a client in the oidc server09:34
alogajamielennox: so, if Alice wants to use oidc for OpenStack using osc, she can go to the server and create a client, specifying localhost:8080 as the redirect URI09:34
alogas/can/must/09:35
*** woodburn has quit IRC09:35
alogajamielennox: if then she moves to another location where 8080 is not available, she can add another url like localhost:12345 and she would pass the port option to the client09:36
alogajamielennox: so, you need to know where you will be listening beforehand09:36
jamielennoxaloga: so i think horizon is out of scope here - we are popping a webbrowser so there's no way they can use this09:38
*** akscram has quit IRC09:38
alogajamielennox: yes, it was just an example09:38
jamielennoxbut i can reorder that code so whilst i don't know ahead of time the port i can set the correct redirect_uri09:38
jamielennoxaloga: do you mind if i upload a new version of that last review to show you what i mean09:39
alogajamielennox: I don't get your point, so yes09:39
alogajamielennox: :)09:39
alogaI mean yes, go ahead09:39
openstackgerritJamie Lennox proposed openstack/keystoneauth: oidc: fix OpenID Connect authorization code grant_type  https://review.openstack.org/33000609:40
jamielennoxaloga: so if i reorder it like ^ is it not the same thing?09:40
jamielennoxaloga: i don't have any way of testing this09:40
alogajamielennox: you're getting a random port09:42
jamielennoxyes, but i'm not making the request until i know what the port is09:43
*** akscram has joined #openstack-keystone09:43
alogajamielennox: right, but the thing is that the URL has to be configured in the server09:43
alogawhen the user creates a client09:44
jamielennoxright ok - that's kind of where we started and i thought i had misunderstood when you restarted from a client perspective09:45
jamielennoxso the OIDC server likely has a whitelist of allowed redirect_uris09:45
alogayes, but they are not global09:46
alogathey are explicitly set by each user09:46
alogawhen they define a client09:46
jamielennoxoh, per user? that seems like  an odd step09:46
alogaso, if Alice wants to use FooBar OIDC server, she must go to the server09:47
alogashe must create a client, where she define the redirect URI among other things (like the scope)09:47
alogaand she will get back the client secret and client id09:47
alogathen, she will use this client secret and ID to authenticate in osc and keystoneauth09:48
alogaso yes, there is this extra step that needs to be done09:48
alogajamielennox: there are some servers where you can directly use your client credentials (https://tools.ietf.org/html/rfc6749#section-4.4)09:49
*** jaosorior has quit IRC09:50
jamielennoxand this is more than like an oauth accepting yes i want to allow delegation to this client? it's an out of band registration?09:50
alogajamielennox: but, this is another grant_type, not this one09:50
*** jaosorior has joined #openstack-keystone09:50
jamielennoxaloga: i'm more and more inclined to say that this simply isn't workable from a CLI and deprecate the whole plugin09:52
jamielennoxit's obviously not desinged for this purpose09:52
jamielennoxand i'm not sure from a practical perspective anyone would use it09:52
alogajamielennox: i disagree :)09:52
alogajamielennox: we would use it09:53
aloga;)09:53
jamielennoxi was assuming there (i don't know OIDC well) that the webbrowser would pop, you'd enter your credentials, agree to the delegation and be returned an access token or something09:53
alogajamielennox: yes, this is true09:53
alogajamielennox: the OIDC client registration is a one-time step09:53
*** GB21 has quit IRC09:53
jamielennoxwhich is a little why i was confused you'd need to redirect_uri at all, because it's a client initiated redirect09:53
jamielennoxwell no, that part makes sense because having popped the webbrowser python has no other way to receive back that code09:54
alogajamielennox: the webbrowser thing is because of this specific grant type, because to obtain an access code you need to do all the flow09:55
jamielennoxaloga: so if i have a client_id and a client_secret that only identifies my server, why do we need to pop a browser?09:56
jamielennoxidentifies my client09:56
jamielennoxwe need a per user client_id, client_secret and they still need to login?09:56
alogajamielennox: if your server allows client_credentials as grant type, you don't need a browser, as this grant type allows to use the client credentials directly09:57
alogajamielennox: if your server does not allow client credentials (like google) and only authz code, you need a browser09:57
alogajamielennox: because the oauth standard specifies so, there is no other way to go09:58
alogajamielennox: if we could persist the access token, this could be done only once for the lifetime of the access token, as this could be reused09:58
aloga(access token = oidc access token)09:58
alogajamielennox: if you are a service, or a server, then you must use the client credentials or the resource owner grant types09:59
alogajamielennox: not this particular one09:59
*** akscram has quit IRC10:00
jamielennoxok client credentials in this case being a user login/password right? not the client secret10:02
jamielennoxso i understand this from a 3rd party auth perspective where like openstack.org was using google auth10:02
alogajamielennox: not sure, unfortunately I could not test this up to know, but I guess so10:02
jamielennoxthen openstack.org gets a client_id and client_secret10:02
jamielennoxthen the user uses their login/pass10:03
jamielennoxand the client_secret has validated that handshake between google and openstack.org10:03
jamielennoxthat's pretty standard amongst federated protocols10:03
alogajamielennox: using which grant type :)10:03
jamielennoxi'm mostly trying to understand why atm, but some form of the above can be seen in saml and oauth off the top of my head10:04
jamielennoxbut in that case the client is not the user, the client is the third party you want to auth agains10:04
*** spzala has joined #openstack-keystone10:05
alogajamielennox: you're describing the resource owner credentials10:05
jamielennoxso in this case it would be keystone having a client_secret10:05
alogas/credentials/grant type/10:05
*** nisha_ has joined #openstack-keystone10:06
alogajamielennox: I do not know the motivations of each grant type in oauth 2, but they're focused at different purposes10:06
alogajamielennox: the authorization_code and the user credentials are focused on authenticating the final user, i.e. Alice or Bob10:06
alogajamielennox: the resource password credentials (implemented in oidcpassword) is focused on authenticating the service, i.e. the resource10:07
alogajamielennox: to my knowledge this last grant type is not enabled by default in most implementations, as it implies a trust relationship between the oidc server and the resource owner10:08
jamielennoxalright, i think i'm going to need to do a proper read of the oidc spec10:08
jamielennoxit's been on my list for a while10:08
alogajamielennox: the client credentials would solve our problems, as the users will pass their username and password to the oidc server and return the access token10:08
*** spzala has quit IRC10:09
alogajamielennox: but, it is not supported by all the oidc servers (like google)10:09
jamielennoxyea, for a CLI case that's what we need10:09
alogajamielennox: finally, the authz code, implies interacting with the user browser10:09
jamielennoxi need to run off for a bit, i'm supposed to be doing dinner, but i'll read through the spec and try and figure it out10:10
jamielennoxit's at the end of the queue now so not holding the others up10:10
alogajamielennox: I do think that this needs to be implemented, otherwise the oidc thing would become a bit useless10:11
*** markvoelker has joined #openstack-keystone10:11
alogajamielennox: although I am aware of the browser and redirection stuff,10:11
*** ktychkova has joined #openstack-keystone10:11
alogajamielennox: but I do think that somebody using this plugin is or should be aware of the redirection stuff10:11
*** akscram has joined #openstack-keystone10:12
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth: oidc: fix OpenID Connect authorization code grant_type  https://review.openstack.org/33000610:14
alogajamielennox: FYI: I am working in the client credentials atm10:15
*** markvoelker has quit IRC10:16
*** roxanaghe has joined #openstack-keystone10:24
*** akscram has quit IRC10:24
*** akscram has joined #openstack-keystone10:27
*** roxanaghe has quit IRC10:29
openstackgerritDave Chen proposed openstack/keystone: {WIP} Choose the right parameter from the parameter list  https://review.openstack.org/34208910:31
*** GB21 has joined #openstack-keystone10:35
*** clenimar_ has joined #openstack-keystone10:41
*** davechen has quit IRC10:45
nisha_o/10:49
*** TxGVNN has quit IRC11:04
*** markvoelker has joined #openstack-keystone11:05
*** markvoelker has quit IRC11:09
*** dikonoor has joined #openstack-keystone11:18
*** divyakkonoor has joined #openstack-keystone11:18
*** divyakkonoor has quit IRC11:19
*** wangqun has quit IRC11:19
*** nisha__ has joined #openstack-keystone11:27
*** nisha_ has quit IRC11:28
*** TxGVNN has joined #openstack-keystone11:30
*** akscram has quit IRC11:32
openstackgerritDave Chen proposed openstack/keystone: Variables in URL path should be required  https://review.openstack.org/34197311:39
*** andrewliu117 has quit IRC11:43
*** andrewliu117_ has joined #openstack-keystone11:45
*** akscram has joined #openstack-keystone11:46
*** EinstCrazy has quit IRC11:48
*** EinstCrazy has joined #openstack-keystone11:48
*** markvoelker has joined #openstack-keystone11:59
*** rodrigods has quit IRC11:59
*** rodrigods has joined #openstack-keystone11:59
*** wangqun has joined #openstack-keystone12:00
*** markvoelker has quit IRC12:03
*** spzala has joined #openstack-keystone12:06
*** thumpba has joined #openstack-keystone12:09
*** spzala has quit IRC12:10
*** roxanaghe has joined #openstack-keystone12:12
*** roxanaghe has quit IRC12:16
*** nisha__ is now known as nisha_12:19
*** GB21 has quit IRC12:23
*** ddieterly has joined #openstack-keystone12:28
*** clenimar_ has quit IRC12:28
*** ddieterly has quit IRC12:31
*** TxGVNN has quit IRC12:35
*** raildo has joined #openstack-keystone12:36
*** daemontool_ has quit IRC12:38
*** links has quit IRC12:40
*** pauloewerton has joined #openstack-keystone12:44
*** TxGVNN has joined #openstack-keystone12:46
*** samueldmq has joined #openstack-keystone12:47
*** ChanServ sets mode: +v samueldmq12:47
samueldmqhey keystone12:47
samueldmqdon't make it bad, take a sad doc and make it better :)12:47
*** lamt has joined #openstack-keystone12:48
* samueldmq continues with federation docs12:48
nisha_samueldmq, nice12:49
nisha_samueldmq, good morning :)12:49
samueldmqnisha_: o/12:49
openstackgerritMerged openstack/keystone: Trivial spacing and comma corrections  https://review.openstack.org/34197512:49
*** d0ugal has quit IRC12:53
*** thumpba has quit IRC12:54
*** thumpba has joined #openstack-keystone12:55
*** EinstCrazy has quit IRC12:58
*** EinstCrazy has joined #openstack-keystone12:58
*** tonytan4ever has joined #openstack-keystone12:58
*** thumpba has quit IRC13:00
*** gordc has joined #openstack-keystone13:00
*** ddieterly has joined #openstack-keystone13:00
*** edmondsw has joined #openstack-keystone13:06
*** julim has joined #openstack-keystone13:06
*** spzala has joined #openstack-keystone13:07
*** jojden has quit IRC13:10
*** henrynash has joined #openstack-keystone13:10
*** ChanServ sets mode: +v henrynash13:10
*** sdake__ has joined #openstack-keystone13:15
*** woodster_ has joined #openstack-keystone13:21
lbragstado/13:22
lbragstadcouple more easy keystone-api-sprint reviews if any wants to review them - https://review.openstack.org/#/c/341762/ and https://review.openstack.org/#/c/341765/13:22
patchbotlbragstad: patch 341762 - keystone - Correct normal response codes in OS-INHERIT docs13:22
patchbotlbragstad: patch 341765 - keystone - Correct normal response codes in endpoint policy docs13:22
*** EinstCrazy has quit IRC13:22
*** EinstCrazy has joined #openstack-keystone13:23
*** code-R_ has joined #openstack-keystone13:25
samueldmqlbragstad: left a comment in 34176213:25
samueldmqlbragstad: see if it makes sense for you13:26
openstackgerritLance Bragstad proposed openstack/keystone: Correct normal response codes in trust documentation  https://review.openstack.org/34176013:26
samueldmqlbragstad: but perhaps that could be addressed in a separate thing .... as it's all over the places in that way13:27
*** code-R has quit IRC13:28
lbragstadsamueldmq responed13:29
lbragstadresponded*13:29
*** EinstCra_ has joined #openstack-keystone13:29
*** richm has joined #openstack-keystone13:29
*** EinstCrazy has quit IRC13:29
*** bigdogstl has joined #openstack-keystone13:31
*** bigdogstl has quit IRC13:31
samueldmqlbragstad: makes sense13:33
samueldmqlbragstad: all reviewed, see comment in 34176013:33
*** ametts has joined #openstack-keystone13:33
*** adrian_otto has joined #openstack-keystone13:35
*** sheel has quit IRC13:36
*** gagehugo has joined #openstack-keystone13:38
*** akscram has quit IRC13:38
*** richm has quit IRC13:39
openstackgerritLance Bragstad proposed openstack/keystone: Correct normal response codes in trust documentation  https://review.openstack.org/34176013:39
*** ninag has joined #openstack-keystone13:39
*** akscram has joined #openstack-keystone13:40
*** itisha has joined #openstack-keystone13:42
lbragstadsamueldmq did you have a review up for migrating the OS-FEDERATION docs?13:43
*** EinstCra_ has quit IRC13:43
samueldmqlbragstad: not yet, I am working on it... I had schedule so many things to do yesterday, sorry :(13:44
samueldmqlbragstad: I will ping you as soon as I push it to review13:44
lbragstadsamueldmq ok - no worries. I was just curious13:45
*** ninag has quit IRC13:45
lbragstadI'm in the process of updating the etherpad13:45
*** woodburn has joined #openstack-keystone13:47
samueldmqlbragstad: nice13:47
*** slberger has joined #openstack-keystone13:47
*** daemontool has joined #openstack-keystone13:48
samueldmqlbragstad: another thing is to check whether all those error response codes are returned by keystone13:49
lbragstadsamueldmq those are probably wrong too13:50
samueldmqlbragstad: perhaps they've come from old docs and we're just c&ping them all over the place13:50
samueldmqlbragstad: ++13:50
lbragstadmy patches just went through and separated them into two separate lists so that we aren't advertising 20X status codes as Errors.13:50
stevemaro/13:50
stevemarjoining now!13:50
samueldmqlbragstad: ++ that's a good improvement already13:51
samueldmqstevemar: o/13:51
lbragstadsamueldmq personally - i'd be fine to nuke the Error response codes list13:51
lbragstadit's an http status code...13:51
openstackgerritGage Hugo proposed openstack/keystone: Add OS-EP-FILTER to api-ref  https://review.openstack.org/34178713:51
samueldmqstevemar: lbragstad: do we want to keep that "Relationship" thing from the -specs repo13:51
lbragstadstevemar i'll be able to join for about an hour then I have to hop off for a couple meetings13:51
samueldmqlbragstad: yes, I think they could be documented somewhere, in a common place13:52
stevemarlbragstad:  samueldmq new hangout link, old one died :( https://hangouts.google.com/call/tp757ctnojfdvh7dpc66pqnq3ie13:52
samueldmqrather than just repeating them for every API description13:52
stevemarlbragstad: i'm OK with that too TBH13:52
*** ametts has quit IRC13:54
*** rderose has joined #openstack-keystone13:54
*** ddieterly is now known as ddieterly[away]13:55
*** richm has joined #openstack-keystone13:55
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Password strength requirements  https://review.openstack.org/32058613:57
openstackgerritSteve Martinelli proposed openstack/keystone: Add "v2 overview" docs to APIs  https://review.openstack.org/34173913:57
*** roxanaghe has joined #openstack-keystone13:58
*** nk2527 has quit IRC13:59
openstackgerritGage Hugo proposed openstack/keystone: Add OS-EP-FILTER to api-ref  https://review.openstack.org/34178714:00
* lbragstad stevemar https://review.openstack.org/#/c/341787/2/api-ref/source/v3-ext/ep-filter.inc14:00
patchbotlbragstad: patch 341787 - keystone - Add OS-EP-FILTER to api-ref14:00
*** nk2527 has joined #openstack-keystone14:01
*** links has joined #openstack-keystone14:01
*** ddieterly[away] is now known as ddieterly14:01
dstanekso do we consider OS-INHERIT core or extension?14:02
*** roxanaghe has quit IRC14:03
*** adu has joined #openstack-keystone14:03
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Password history requirements  https://review.openstack.org/32833914:04
samueldmqdstanek: core14:05
*** GB21 has joined #openstack-keystone14:05
samueldmqdstanek: I remember we have put it into core a few releases back... stevemar ^ you agree?14:05
dstaneksamueldmq: what is the distinction between what is core and what is an extension?14:05
samueldmqdstanek: in the docs, we are keeping what's in extension already in v3-ext, we can move them later if we want14:06
samueldmqdstanek: at least this is how I am doing for federation14:06
dstaneksamueldmq: you mean the extension package?14:06
dstanekdid we get rid of that a long time ago?14:07
*** ametts has joined #openstack-keystone14:07
samueldmqdstanek: yes, for eg federation is identity-api-v3-os-federation-ext.rst in -specs, so I am putting it under the -ext package in the new docs14:07
samueldmqdstanek: looks like we did .. but some naming remained ?14:08
samueldmqiirc we replaced extensions by moving everything to core and classifying those things into stable or experimental14:08
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Password expires validation  https://review.openstack.org/33336014:09
*** edmondsw has quit IRC14:10
samueldmqdoes anybody know what those "Relationship" links are for ?14:13
*** catintheroof has joined #openstack-keystone14:16
openstackgerritMerged openstack/keystone: Add is_domain to project example responses  https://review.openstack.org/34182014:17
catintheroofhi guys, quick question. does the openstack cli supports to handle domain-specific configuration ? how do i change those configs after i run keystone-manage domain_config_upload ??14:17
*** aastha has joined #openstack-keystone14:19
*** ravelar159 has joined #openstack-keystone14:21
lbragstadclenimar around?14:21
*** adrian_otto has quit IRC14:25
*** adrian_otto has joined #openstack-keystone14:25
catintheroofdoes anyone know if the API for domain configuration management is still experimental on mitaka ? https://specs.openstack.org/openstack/keystone-specs/api/v3/identity-api-v3.html#domain-configuration-management14:26
*** ravelar159 has quit IRC14:26
*** ravelar159 has joined #openstack-keystone14:27
*** GB21 has quit IRC14:30
*** samueldmq has quit IRC14:31
*** samueldmq has joined #openstack-keystone14:31
*** ChanServ sets mode: +v samueldmq14:31
*** jaosorior has quit IRC14:32
knikollao/14:33
*** adrian_otto has quit IRC14:35
*** markvoelker has joined #openstack-keystone14:35
*** dikonoor has quit IRC14:37
*** phalmos has joined #openstack-keystone14:38
*** pcaruana has quit IRC14:39
clenimarlbragstad: hey14:43
*** adrian_otto has joined #openstack-keystone14:43
*** david-lyle_ has quit IRC14:45
*** d0ugal has joined #openstack-keystone14:46
lbragstadclenimar o/ i just saw your comment :)14:48
clenimarclenimar: np :)14:49
clenimarlbragstad: what about identity.example.com/v3?14:50
lbragstadclenimar I think that would be perfect14:50
lbragstadthat way it denotes the hostname from the path14:50
lbragstadcc stevemar gagehugo samueldmq ^14:50
lbragstaddstanek ^14:50
dstaneksamueldmq: did you get an answer about the links?14:50
lbragstadregarding my question here - https://review.openstack.org/#/c/341829/1//COMMIT_MSG14:51
patchbotlbragstad: patch 341829 - keystone - Update identity endpoint in v3 samples14:51
gagehugosure14:51
dstaneklbragstad: ?14:52
lbragstaddstanek just curious if you had any thoughts about the way we reference the identity endpoint in docs14:52
dstaneklbragstad: as long as we are consistent i'd be happy with anything14:53
lbragstaddstanek ++14:54
lbragstadclenimar yeah - i think we should change it14:54
lbragstadclenimar I'll update my comment14:54
clenimarlbragstad: okay14:54
*** edtubill has joined #openstack-keystone14:54
stevemaroh i *just* went through and changed all the URLs in the EP-filter patch14:55
openstackgerritSteve Martinelli proposed openstack/keystone: Add OS-EP-FILTER to api-ref  https://review.openstack.org/34178714:56
*** chrisshattuck has joined #openstack-keystone14:57
samueldmqdstanek: not yet14:59
*** slberger has left #openstack-keystone14:59
dstaneksamueldmq: i think we are trying to be a real restful api14:59
dstanekstevemar: lbragstad: so what's the verdict on what the example URLs should be?15:01
openstackgerritSteve Martinelli proposed openstack/keystone: Add OS-EP-FILTER to api-ref  https://review.openstack.org/34178715:01
lbragstaddstanek documented here - https://review.openstack.org/#/c/341829/1//COMMIT_MSG15:02
patchbotlbragstad: patch 341829 - keystone - Update identity endpoint in v3 samples15:02
stevemardstanek: i'm OK with any combination of {localhost|identity}:{5000|35357} TBH15:02
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Lockout requirements  https://review.openstack.org/34007415:02
stevemari think i prefer identity:5000 for simplicity15:02
stevemarwe don't want to advertise 35357 i think15:03
*** chrisshattuck has quit IRC15:03
stevemarand localhost seems amatuerish15:03
*** phalmos has quit IRC15:03
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Lockout requirements  https://review.openstack.org/34007415:04
*** akscram has quit IRC15:04
*** edmondsw has joined #openstack-keystone15:05
stevemardstanek: lbragstad i think https://review.openstack.org/#/c/341787/6 is ready15:06
patchbotstevemar: patch 341787 - keystone - Add OS-EP-FILTER to api-ref15:06
*** akscram has joined #openstack-keystone15:06
bretonstevemar: but we use /identity/ in devstack15:06
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Improve docs for v3 endpoints  https://review.openstack.org/33946815:07
stevemarbreton: thtas a fairly new change,15:07
openstackgerritMerged openstack/keystone: Correct normal response codes in endpoint policy docs  https://review.openstack.org/34176515:08
dstanekstevemar: that's the one i'm looking at now15:08
bretoni think we should stick to what is used in the gates now. And in the gates /identity/ is even in endpoints.15:08
openstackgerritMerged openstack/keystone: Correct normal response codes in OS-INHERIT docs  https://review.openstack.org/34176215:09
openstackgerritNisha Yadav proposed openstack/python-keystoneclient: Improve docs for v3 endpoints  https://review.openstack.org/33946815:10
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Password strength requirements  https://review.openstack.org/32058615:10
*** chrisshattuck has joined #openstack-keystone15:11
dstanekjust a general note...i think we document APIs backwards in OpenStack. we don't focus nearly enough on defining a media type15:11
samueldmqstevemar: federation API is HUGE15:14
samueldmqstevemar: what if we split it into Federation [Identity Provider|Mappings|Service Provider]15:14
samueldmq3 APIs rather than a single one15:15
stevemarthere are also the auth ones :P15:15
samueldmqI think it makes sense, as we don't document Identity API (with user and groups in there)15:15
lbragstadmaybe that's a sign15:15
stevemarfine with me15:15
samueldmqneither Resource API15:15
*** thumpba has joined #openstack-keystone15:15
samueldmqwith projects and domains15:15
samueldmqstevemar: nice15:15
samueldmqstevemar: I am in the middle of the transition, and the number of followup patch sets are increasing exponentially in my mind15:16
samueldmq:p15:16
stevemar:)15:16
*** d0ugal has quit IRC15:16
*** links has quit IRC15:17
*** d0ugal has joined #openstack-keystone15:17
*** spzala has quit IRC15:17
stevemarbreton: you can do a grep/awk call to change all of them at once :P15:18
*** spzala has joined #openstack-keystone15:18
*** kean has quit IRC15:18
stevemarbreton: i'd be OK with the change15:18
dstanekstevemar: we need to come up with some rules to make the docs more uniform. i left a few comments in the ep-filter review15:19
gagehugo+1 yeah it would be good to have some master layout guide15:21
stevemardstanek: agreed, even the order of GET/POST/DELETE and the order of arguments needs to be uniform15:21
stevemardstanek: also: https://review.openstack.org/#/c/341739/15:21
patchbotstevemar: patch 341739 - keystone - Add "v2 overview" docs to APIs15:21
*** thumpba has quit IRC15:21
*** phalmos has joined #openstack-keystone15:21
*** spzala has quit IRC15:22
stevemardstanek: i'll add /v3 to the beginning of the route, i think most have it15:22
*** kean has joined #openstack-keystone15:24
*** nisha_ has quit IRC15:24
stevemardstanek: patched15:24
*** nisha_ has joined #openstack-keystone15:25
openstackgerritSteve Martinelli proposed openstack/keystone: Correct normal response codes in trust documentation  https://review.openstack.org/34176015:26
*** lucas___ has joined #openstack-keystone15:26
*** ravelar159 has quit IRC15:26
*** ravelar159 has joined #openstack-keystone15:27
stevemarbreton: oh i see someone else has updated all the examples: https://review.openstack.org/#/c/341829/15:28
patchbotstevemar: patch 341829 - keystone - Update identity endpoint in v3 samples15:28
stevemaroof15:28
*** thumpba has joined #openstack-keystone15:32
*** arunkant_ has joined #openstack-keystone15:32
bretonstevemar: the discussion came from that review, right15:33
*** clenimar_ has joined #openstack-keystone15:33
stevemarbreton: sorry, i'm behind, had a late start15:33
stevemarand jumped right into the ep-filter review15:33
stevemarwe really need to create a separate parameters.yaml for each .inc15:34
stevemarit would make things so much easier15:34
stevemara bit duplicative, but meh15:34
dstanekstevemar: that's where we have to be careful not to duplicate too much and have language discrepencies15:35
*** rderose has quit IRC15:35
stevemardstanek: yeah15:35
bretonstevemar: it will be easier to do when https://bugs.launchpad.net/keystone/+bug/1602772 is closed15:35
openstackLaunchpad bug 1602772 in OpenStack Identity (keystone) ""_{n}" suffixes in parameters.yaml are not used" [Medium,In progress] - Assigned to Ron De Rose (ronald-de-rose)15:35
stevemari agree15:35
stevemari'm worried some of those are being removed when they shouldn't be15:36
stevemarthey should be renamed or something15:36
*** belmoreira has quit IRC15:36
*** jaosorior has joined #openstack-keystone15:36
*** lucas____ has joined #openstack-keystone15:36
*** jaosorior has quit IRC15:36
*** lucas___ has quit IRC15:36
*** andrewliu117__ has joined #openstack-keystone15:37
dstanekstevemar: it's possible they should be used instead of the non-_{n} ones15:37
*** jaosorior has joined #openstack-keystone15:38
bretonstevemar: dstanek: please comment on https://review.openstack.org/#/c/341757/ too.15:39
patchbotbreton: patch 341757 - keystone - Remove unused parameters with underscore suffix in...15:39
*** andrewliu117_ has quit IRC15:40
*** KevinE has joined #openstack-keystone15:41
*** code-R_ has quit IRC15:42
dstanekstevemar: breton: is it possible we're just doing it all wrong?15:44
stevemardstanek: i don't think so, i think all the documentation was automatically generated from the wadl docs15:45
*** spzala has joined #openstack-keystone15:46
bretonstevemar: ++15:46
dstanekthe _{n} appear to be variations (at least in some cases). x is 'in:body", but x_1 is 'in:path' and x_2 is 'in:querystring'15:46
bretondstanek: they were supposed to be used but they are not. My guess is that when it all was merged, parameters.yaml were generated with _n appended, but .inc were not15:47
*** roxanaghe has joined #openstack-keystone15:47
openstackgerritDavid Stanek proposed openstack/keystone: wip it  https://review.openstack.org/34225315:48
bretoni also thought that os-api-ref supports that in some weird way. But it doesn't.15:48
*** rderose has joined #openstack-keystone15:48
dstanekbreton: which would indicate that the .inc files are incorrect - see ^ for a quick example15:48
stevemarcan someone confirm is https://bugs.launchpad.net/keystone/+bug/1603038 exists?15:48
openstackLaunchpad bug 1603038 in OpenStack Identity (keystone) "Execption on admin_token usage ValueError: Unrecognized " [Undecided,New]15:48
dstanekstevemar: breton: service_id is defined as a path variable and is used to show the response body too....but service_id_1 is defined as a body parameter15:49
stevemardstanek: we probably need path_service_id cause there will be many of those15:49
stevemarpath_service_id: the UUID of the service, whereas service_id (no prefix) can be used for the body15:50
*** wangqun has quit IRC15:51
*** nisha_ has quit IRC15:51
*** roxanaghe has quit IRC15:52
*** akscram has quit IRC15:52
openstackgerritDavid Stanek proposed openstack/keystone: Fixes a variable usage issue  https://review.openstack.org/34225315:53
bretonhere is what we need to do:15:53
breton1. Use correct variable_{n} where they are needed15:53
breton2. Split parameters.yaml into several incname_parameters.yaml, copying _{n} variables where needed15:53
breton3. Rename _{n} variables to something sane15:53
dstaneki worry about #215:53
*** akscram has joined #openstack-keystone15:54
samueldmqwhat if we have a parameters file per API e.g projects, domains, and so on ?15:54
samueldmqdstanek:  ^15:54
samueldmqthis way we won't need to put suffixes on things15:54
dstanekif you spit by .inc file then you will have the same param in multiple places. then you get into the mess of adding a 'common' file of some sort15:55
dstaneksamueldmq: where would domain_id be defined?15:55
samueldmqdstanek: 2 options15:55
bretonsamueldmq: we still need suffixes. For example, when specifying a project, "id" might mean both project and domain id.15:55
samueldmqwe can put on every file and then have more meaningful descriptions, like: The ID of user's domain.15:56
samueldmqor put them in a common file for very common things, but I can't think of many cases15:56
bretoni think that some duplication is not a big issue15:57
dstaneksamueldmq: the problem is that i don't think you can specify multiple parameters files15:57
samueldmqwhy not ? you specify the parameters file when defining the params15:57
samueldmqlike15:57
*** ddieterly is now known as ddieterly[away]15:58
samueldmq.. rest_parameters:: parameters.yaml15:58
dstanekif you have domain_id (from common) and username (from user) in the same response15:58
dstaneki don't see any advantage to splitting. just disadvantages15:58
samueldmqdstanek: so let's just have a file for each one15:58
samueldmqI don't see much things that will be "duplicated"15:59
samueldmqmostly domain_id15:59
stevemarand it may be better to split that15:59
samueldmqand this has also the advantage to put very specific messages for each resource15:59
stevemarfor domain CRUD domain_id is "the id of the domain"15:59
*** lucas____ has quit IRC15:59
stevemarfor project CRUD it's "the id of the domain that owns the project"15:59
samueldmqlike I said, domain_id can be: Project's domain ID. or User's domain ID. and so on15:59
samueldmqstevemar: yes that's my point16:00
samueldmqwe describe the parameter in a way its description is more accurate depending on the context it's used16:00
*** ddieterly[away] is now known as ddieterly16:01
stevemari like the splitting option16:01
stevemarone .yaml file per .inc file16:02
dstanekwhat's the problem that's being solved?16:03
samueldmqmore accurate descriptions for attributes depending where they are used16:03
samueldmqand fixing lots of bugs because sometimes you use domain_id and it has a description of another thing16:04
samueldmqlet me give an example16:04
dstanekthat's fine, i don't care enough to debate this :-)16:05
samueldmqsee http://developer.openstack.org/api-ref/identity/v3/index.html?expanded=list-projects-detail#projects16:05
samueldmqenabled field description is wrong :/16:05
breton(and bug 1602772)16:06
openstackbug 1602772 in OpenStack Identity (keystone) ""_{n}" suffixes in parameters.yaml are not used" [Medium,In progress] https://launchpad.net/bugs/1602772 - Assigned to Ron De Rose (ronald-de-rose)16:06
*** nisha_ has joined #openstack-keystone16:06
dstanekthe bug is something different16:06
samueldmqyes16:06
samueldmqmaybe that will be fixed during the process of splitting the files16:07
samueldmqas one file won't contain lots of name attributes anymore16:08
dstaneksamueldmq: that bug won't be fixed that way. you have to use the _n versions of the attributes16:08
samueldmqwhat are versions of attributes useful for ?16:08
dstaneksamueldmq: https://review.openstack.org/#/c/342253/16:09
patchbotdstanek: patch 342253 - keystone - Fixes a variable usage issue16:09
bretonalso, nobody idles in hangout today?16:09
gagehugoI'll be back in this afternoon16:10
samueldmqdstanek: because query and body params are in the same namespace ? :/16:10
dstaneksamueldmq: so you want 2 parameter files per include?16:11
dstanek...actually three16:11
dstanekpath, body and querystring16:11
samueldmqheader, path, query and body are only separated by a comment in parameters.yml :/16:11
samueldmqdstanek: no, but maybe putting something more meaningful in the parameter name16:11
samueldmqlike:16:11
samueldmqservice_id_query, service_id_body16:12
samueldmqrather than _1 and _2, and so on16:12
*** nisha__ has joined #openstack-keystone16:12
*** nisha_ has quit IRC16:12
dstaneksamueldmq: right, like i said has nothing to do with splitting files16:12
samueldmqdstanek: splitting is useful for keeping them small too.. imo16:13
openstackgerritRichard proposed openstack/keystone: Improve user experience involving token flush  https://review.openstack.org/34116516:13
samueldmqotherwise we would have another append for the API... like service_name_query, service_name_body16:13
dstaneksamueldmq: that's fine. i'm simply saying that the bug has nothing to do with splitting16:13
samueldmqdstanek: I agree16:13
dstanekbreton: i'm not in the hangout because i uses by cpu something fierce and i'm not plugged into an outlet right now16:16
*** GB21 has joined #openstack-keystone16:19
*** david-lyle__ has joined #openstack-keystone16:20
*** sdake__ is now known as sdake16:20
*** david-lyle__ is now known as david-lyle16:21
*** rcernin has quit IRC16:21
openstackgerritAndrew Laski proposed openstack/oslo.policy: Allow policy file to not exist  https://review.openstack.org/34173216:23
*** code-R has joined #openstack-keystone16:25
breton^ that oslo.policy change is interesting btw16:27
dstaneksamueldmq: i'm not sure if i ever got an answer before or if i just can't find it :-(  do we have criteria for determining which things go into v3 vs v3-ext?16:28
dstanektechnically we don't have extensions anymore16:28
*** daemontool has quit IRC16:30
*** lucas___ has joined #openstack-keystone16:33
*** lucas___ has quit IRC16:37
*** gordc has quit IRC16:37
stevemarbreton: i'll idle there in 10 minutes, lots of calls today :(16:37
bretonstevemar: i'll go home in 50 :)16:43
stevemarbreton: noooo16:43
stevemarbreton: thanks for the help over the sprint :)16:43
*** lucas___ has joined #openstack-keystone16:45
*** KevinE has quit IRC16:45
*** d0ugal has quit IRC16:49
stevemarbreton: i'm there now :P16:50
*** julim has quit IRC16:53
samueldmqdstanek: if it's said to be an extension in -specs, it goes in v3-ext16:53
samueldmqdstanek: at least this is how I am doing for federation16:53
samueldmqwhich is identity-api-v3-os-federation-ext.rst in -specs16:53
dstanekk, thx16:54
samueldmqyw16:54
*** spzala has quit IRC16:56
*** sdake has quit IRC17:00
*** sdake has joined #openstack-keystone17:02
*** GB21 has quit IRC17:02
*** spzala has joined #openstack-keystone17:03
*** jrist has quit IRC17:04
*** GB21 has joined #openstack-keystone17:05
*** ddieterly is now known as ddieterly[away]17:05
*** jlk has joined #openstack-keystone17:06
jlkDoes anybody remember or know of an open spec/blueprint for admin readonly like roles?17:06
jlkI swear I've seen them before but can't find them now17:06
*** spzala has quit IRC17:08
openstackgerritRon De Rose proposed openstack/keystone: Drop EPHEMERAL user type  https://review.openstack.org/29663917:08
stevemarjlk: there should be17:14
stevemarjlk: https://blueprints.launchpad.net/keystone/+spec/admin-readonly-role17:14
jlkYeah I found that, but there is nothing much there.17:14
*** thumpba has quit IRC17:14
jlkoh I clicked on "Set URL for this specification" thinking it was  "See this specification". That's why I got a error17:15
stevemarjlk: theres also https://review.openstack.org/#/c/245629/17:15
patchbotstevemar: patch 245629 - openstack-specs - A common policy scenario across all projects17:15
*** spzala has joined #openstack-keystone17:15
stevemarjlk: also, i though dolphm had something cooking for that?17:16
*** ddieterly[away] is now known as ddieterly17:16
dolphmjlk: it's a cross-project spec17:16
jlkYeah I remember the sessions in Austin17:17
dolphmjlk: jamielennox owns it though17:17
jlkI was just not finding the things to track through the googles.17:17
jlkI'm trying to give it to my product team so they stop asking _me_ to implement it in Blue Box clouds.17:17
stevemarjlk: hehe17:18
stevemarjlk: just implement it all17:18
jlksure, no problem. Will have it done this afternoon17:18
*** thumpba has joined #openstack-keystone17:19
clenimarstevemar: so, what endpoint should we use? :) localhost/identity/v3 or localhost:5000/v317:19
clenimarmaybe identity.example.com/v317:19
*** spzala has quit IRC17:20
stevemarjlk: :)17:20
* jlk cries at versioned endpoint urls17:20
stevemarclenimar: breton dstanek what about example.com/identity ?17:20
*** ddieterly is now known as ddieterly[away]17:21
*** spzala has joined #openstack-keystone17:21
*** jaosorior has quit IRC17:22
samueldmqstevemar: what about this https://github.com/openstack/keystone-specs/blob/master/api/v3/identity-api-v3-os-federation-ext.rst#listing-projects-and-domains17:23
samueldmqstevemar: "Deprecated in v1.1. This section is deprecated as the functionality is available in the core Identity API.17:23
samueldmq"17:23
*** jaosorior has joined #openstack-keystone17:24
*** lucas___ has quit IRC17:24
*** spzala has quit IRC17:25
openstackgerritClenimar Filemon proposed openstack/keystone: Move OS-INHERIT api-ref from extensions to core  https://review.openstack.org/34191217:26
stevemarsamueldmq: keep it around, it's an API17:27
*** spzala has joined #openstack-keystone17:27
*** harlowja has joined #openstack-keystone17:28
openstackgerritBoris Bobrov proposed openstack/keystone: Add v2.0 /endpoints/ api-ref  https://review.openstack.org/34229417:28
*** KevinE has joined #openstack-keystone17:30
*** spzala has quit IRC17:31
openstackgerritBoris Bobrov proposed openstack/keystone: Add v2.0 /endpoints/ api-ref  https://review.openstack.org/34229417:31
*** rcernin has joined #openstack-keystone17:32
*** browne has joined #openstack-keystone17:32
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Lockout requirements  https://review.openstack.org/34007417:32
*** spzala has joined #openstack-keystone17:33
*** TxGVNN has quit IRC17:33
*** haplo37_ has joined #openstack-keystone17:34
*** roxanaghe has joined #openstack-keystone17:35
*** spzala has quit IRC17:37
*** spzala has joined #openstack-keystone17:39
openstackgerritMerged openstack/keystone: Variables in URL path should be required  https://review.openstack.org/34197317:39
*** roxanaghe has quit IRC17:40
*** sdake_ has joined #openstack-keystone17:42
*** spzala has quit IRC17:43
*** jaosorior_ has joined #openstack-keystone17:43
*** code-R_ has joined #openstack-keystone17:44
*** tesseract- has quit IRC17:44
*** sdake has quit IRC17:44
*** jaosorior has quit IRC17:46
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Lockout requirements  https://review.openstack.org/34007417:46
*** code-R has quit IRC17:47
*** jaosorior_ is now known as jaosorior17:47
*** spzala has joined #openstack-keystone17:49
*** spzala has quit IRC17:53
*** spzala has joined #openstack-keystone17:55
*** catintheroof has quit IRC17:58
*** julim has joined #openstack-keystone17:59
*** Nexus_ has joined #openstack-keystone18:00
*** spzala has quit IRC18:00
*** nisha__ has quit IRC18:00
*** jaosorior has quit IRC18:02
stevemar#success keystone newton-2 driver is cut! thanks everyone!18:02
openstackstatusstevemar: Added success to Success page18:02
*** sdake has joined #openstack-keystone18:02
*** GB21 has quit IRC18:02
*** sdake_ has quit IRC18:03
*** spzala has joined #openstack-keystone18:06
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystone: Migrate OS-FEDERATION from specs repo  https://review.openstack.org/34232218:07
samueldmqstevemar: dstanek: lbragstad: ^18:07
openstackgerrithenry-nash proposed openstack/keystone: Improve readability of the api-ref roles section  https://review.openstack.org/34232518:11
*** spzala has quit IRC18:11
*** spzala has joined #openstack-keystone18:12
openstackgerrithenry-nash proposed openstack/keystone: WIP Improve readability of the api-ref roles section  https://review.openstack.org/34232518:14
*** samueldmq has quit IRC18:15
*** sdake_ has joined #openstack-keystone18:16
*** spzala has quit IRC18:17
*** spzala has joined #openstack-keystone18:18
*** sdake has quit IRC18:18
*** spzala has quit IRC18:22
edtubillping stevemar18:23
stevemaredtubill: yo18:23
*** spzala has joined #openstack-keystone18:24
*** spzala has quit IRC18:25
*** spzala has joined #openstack-keystone18:25
openstackgerrithenry-nash proposed openstack/keystone: Improve readability of the api-ref roles section  https://review.openstack.org/34232518:25
edtubillstevemar: so we have been getting this error for heat using an external heat engine and we been getting an RBAC error for "create_credential". The user that needs access uses our "cloud_admin" role. I'm trying to figure out if allowing cloud_admin access to create_credential will cause security vulnerabilities...18:25
stevemaredtubill: hmm, to create_credential... probably not,18:26
stevemarthe cloud admin could go and create 1000000 credentials now, but likely he could do much worse already ...18:27
edtubillok, I was afraid like the cloud_admin user could make some credential for admin and somehow use that to get admin level access.18:27
*** roxanaghe has joined #openstack-keystone18:28
Nexus_Hello everybody, I am encountering a problem with Keystone / AD integration. We don't have any OU containing all our users and when trying to set user_tree_dn to the root of the domain, Keystone is behaving weirdly18:28
dstanekNexus_: what is happening?18:29
dstanekedtubill: i would say that if we allow credentials to be created for any user other than the one making the API call that we've got a bug18:30
Nexus_If doing a user show --domain DOMAIN myuser it is hanging and ending up with "could not find resource myuser".18:30
henrynashapi-ref question? Where do you specifify the supproted query parameters for list APIs? Can’t see this anywhere18:30
dstanekhenrynash: parameters.yaml?18:31
*** chrisshattuck has quit IRC18:31
dstanekthat where we define what they mean and their descriptions18:31
dstanekNexus_: do you see the ldap query in the keystone log?18:31
Nexus_If at this point I try to restart the keystone service, it is stuck and I have to kill -9 it18:31
Nexus_+dstanek: Yes I see it and it is valid18:32
henrynashdstanek:…and where is the link from that to a given API, e.g. list projects?18:32
Nexus_I capture the LDAP flow with wireshark and I see the AD server properly answering with the correct LDAP entry18:32
openstackgerritwerner mendizabal proposed openstack/keystone: Support encryption of credentials in Keystone  https://review.openstack.org/31716918:35
edtubillstevemar: ok. So after changing the policy file to include cloud_admin and admin for credentials, the admin was able to create credentials for cloud_admin but the cloud_admin was not able to create credentials for admin (This was using totp credentials ...not sure if the credential types behave differently).18:35
dstanekhenrynash: the request and responses have lists of dictionaries the point back to things in parameters.yaml18:35
dstanekhenrynash: http://git.openstack.org/cgit/openstack/keystone/tree/api-ref/source/v2/identity-auth.inc#n3718:35
rderosehey all you hardcore reviewers, I could use some PCI love if anyone has time :)18:35
rderosehttps://review.openstack.org/#/q/topic:bp/pci-dss+status:open+owner:ronald.de.rose%2540intel.com18:35
Nexus_+dstanek: The interesting think is that if I change the user_tree_dn and put an OU instead, then I am able to observe the exact same request / reply in Wireshark but Keystone behaves properly18:36
edtubillstevemar: but let me double check that was the behavior  we saw.18:36
dstanekhenrynash: actually the request for this is http://git.openstack.org/cgit/openstack/keystone/tree/api-ref/source/v2/identity-auth.inc#n75 - the dictionary key is what the param is called in the API and the value is what it is called in the parameters file18:36
dstanekNexus_: are you don't see anything interesting in the logs?18:37
dstanekedtubill: so you can create credentials for other users?18:37
henrynashdtstanek:..ok, got that but..how does that link to something like “domain_id_7:” that is in pararmers.yaml? Sorryto be dumb, but can’t quite understand hwo this hangs together18:38
edtubilldstanek: I think somehow the admin can, but I am going to go confirm again that this is the behavior.18:39
dstanekhenrynash: if you needed to use domain_id_7 you would do something like 'domain_id: domain_id_7' since i presume you call the param domain_id in the api and you just need to use the description from domain_id_718:39
*** spzala has quit IRC18:40
henrynashdstanek: rather than me waste your time, is there somewhere this is actually documented (or howwe use it)…I’m just totally missing even the basic fundamentals of how this hangs together18:40
dstanekhenrynash: i'm sure there is.... i just put it all together myself this morning18:41
Nexus_dstanek: The last thing I have in the log is the ldap request displayed by the search_s function in common/ldap/core.py18:41
henrynashdtsanek: which is making writing docs a bit hit and miss!18:41
dstanekhenrynash: i actually said in channel earlier that we were doing the docs wrong.... see if this helps https://review.openstack.org/#/c/342253/18:42
patchbotdstanek: patch 342253 - keystone - Fixes a variable usage issue18:42
henrynashdstanek: the thing I am really missing is where, in parameters.yaml, is the link for a given entry back to a given API that is listed in proejcts, users, roles.rst etc.18:43
*** ddieterly[away] is now known as ddieterly18:43
dstanekhenrynash: i don't think you can look at parameters.yaml and easily find what api uses the entries18:44
dstanekyou can think of parameters.yaml as the same as our schema.py files ( just definitions )18:45
henrynashdtsanek: right…so your example makes sense…but where would the link be to a query parameter…since we don;t reference them in the rst? I’ll read up some more!!18:45
*** chrisshattuck has joined #openstack-keystone18:45
openstackgerritSteve Martinelli proposed openstack/keystone: Copy the preamble / summary of OAuth1 from the specs repo  https://review.openstack.org/34234718:45
openstackgerritSteve Martinelli proposed openstack/keystone: re-order the oauth APIs  https://review.openstack.org/34234818:45
openstackgerritSteve Martinelli proposed openstack/keystone: add OS-OAUTH1/authorize/{request_token_id} API  https://review.openstack.org/34234918:45
openstackgerritSteve Martinelli proposed openstack/keystone: Add relationship links to OAUTH APIs  https://review.openstack.org/34235018:45
openstackgerritSteve Martinelli proposed openstack/keystone: clean up OAUTH API  https://review.openstack.org/34235118:45
dstanekhenrynash: that's where i think we are doing it wrong. you have separate enties for body, path and query params. the tools used _1, _2 to differentiate, but never actually used the _1 version18:47
henrynashdstanek: maybe you have to make eaach attribute unique…and then you know if it is “in: query” in parameters.yaml, then you know it is for just that API18:47
dstanekhenrynash: stevemar had the suggestion earlier to use names like path_domain_id and body_domain_id to that it's easier to see if you are using the first one18:47
dstaneks/first/right/18:47
stevemardstanek: who wants to look at the oauth series :P18:48
henrynashdstanek: /cuase a domain_id might be OK as a query param in one api, but not another18:48
henrynash(be back on line in a bit)18:48
henrynashdstanek: thx, chat later18:48
stevemarhenrynash: dstanek yeah, i'm really thinking a separate yaml file per inc file is needed18:49
dstanekhenrynash: yeah the .inc file is what defines what is acceptable for each call. talk to you later18:50
*** jaugustine has joined #openstack-keystone18:52
*** slberger has joined #openstack-keystone18:58
*** adu has quit IRC18:58
knikollaanybody working on the nonvoting 3.5 gate error?19:02
stevemarknikolla: not i19:03
knikollai'm thinking of giving it a shot if i can get past the ast learning curve19:04
browneknikolla: https://review.openstack.org/#/c/337952/19:05
patchbotbrowne: patch 337952 - keystone - Add a py35 tox venv for Python 3.5 support19:05
*** ddieterly is now known as ddieterly[away]19:05
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Lockout requirements  https://review.openstack.org/34007419:05
*** ddieterly[away] is now known as ddieterly19:06
knikollabrowne: hmmm, that didn't work. i wonder why the values are different.19:07
openstackgerritMerged openstack/keystone: Correct normal response codes in trust documentation  https://review.openstack.org/34176019:07
browneknikolla: yeah i thought that would do the trick.  not sure why the values are different.  maybe it was always broken19:08
*** haplo37_ has quit IRC19:09
*** mvk has quit IRC19:10
knikollabrowne: well, it works on 3.4. so need to look up what's new in 3.5.19:10
dstanekknikolla: i started looking into it, but got side tracked19:11
dstanekbrowne: adding a 3.5 target doesn't actually change anything. that is included by default in tox19:12
dstanekall that list really does is tell tox what enviroments to run if none are specified, e.g. 'tox'19:12
browneok, can py34 also be removed?19:12
openstackgerritRon De Rose proposed openstack/keystone: PCI-DSS Lockout requirements  https://review.openstack.org/34007419:13
dstanekbrowne: i prefer not because i currently run 'tox' to run py27 and py34 (plus all the docs stuff)19:13
browneok, so maybe when py34 is dropped, we would add py35 there19:14
dstaneki'm not against adding it. i just want everyone to know what it actually means19:14
dstanekbrowne: back in the day we needed a config section for py34 because we had different test requirements at the time19:15
browneah ok19:15
dstanekbrowne: see https://testrun.org/tox/latest/example/basic.html19:16
dstanekusing our existing tox.ini you can 'tox -e pypy' for example19:16
dstanekassuming you have pypy installed it'll run our tests under it19:16
*** catintheroof has joined #openstack-keystone19:18
*** sdake__ has joined #openstack-keystone19:19
*** sdake_ has quit IRC19:21
*** tonytan4ever has quit IRC19:21
*** tonytan4ever has joined #openstack-keystone19:22
*** rderose has quit IRC19:23
browneknikolla: seems node.col_offset is off by one in python3.519:23
knikollabrowne: interesting19:24
*** ddieterly is now known as ddieterly[away]19:24
knikollabrowne: do you have a link?19:25
browneno link, just from examining the code.  i don't know a root cause yet.  the ast docs don't indicate any change19:25
*** sdake_ has joined #openstack-keystone19:25
brownefor example, on this line:19:27
brownedef f(bad=set(), more_bad={x for x in range(3)}, even_more_bad={1, 2, 3}):19:27
browneit flags the column before the =, not after for the first two parameters19:28
*** sdake__ has quit IRC19:28
knikollabrowne: i see, that would explain the off by one error19:29
knikollabrowne: good find19:29
*** andrewliu117__ has quit IRC19:30
stevemarhenrynash: around?19:32
*** rderose has joined #openstack-keystone19:32
*** nk2527 has quit IRC19:34
openstackgerritSteve Martinelli proposed openstack/keystone: Add "v2 overview" docs to APIs  https://review.openstack.org/34173919:39
stevemardstanek: want to punt https://review.openstack.org/#/c/341739/ through? already +2ed by lancey19:39
patchbotstevemar: patch 341739 - keystone - Add "v2 overview" docs to APIs19:39
stevemarotherwise, i was just gonna punt it through...19:40
*** gordc has joined #openstack-keystone19:41
edtubillstevemar, dstanek: so I think that a user can create a credential for another user. I confirmed it on my devstack... So my cloud_admin user can create a TOTP credential for my admin user. And just to clarify the RBAC setting, I set the credential policies to a non admin role. Should I open up a bug to say that a credential can only be created/updated/viewed/listed by the user that created it?19:47
*** julim has quit IRC19:47
*** ddieterly[away] is now known as ddieterly19:49
*** julim has joined #openstack-keystone19:49
*** adu has joined #openstack-keystone19:49
*** spzala has joined #openstack-keystone19:51
openstackgerritRichard Avelar proposed openstack/keystone: Improve user experience involving token flush  https://review.openstack.org/34116519:52
*** adu has quit IRC19:53
*** roxanaghe has quit IRC19:56
*** ravelar159 has quit IRC19:57
*** ametts has quit IRC20:00
dstanekstevemar: i +2ed it - do you want me to +A it too?20:01
*** ravelar159 has joined #openstack-keystone20:02
dstanekedtubill: yes, i think so. if we really want to use this for totp then that can't happen20:04
clenimarstevemar: wouldnt it be better to move os-inherit first then update based on the commit you just pointed?20:05
edtubilldstanek: ok.20:07
edtubillstevemar, dstanek: do you know what types there are for credentials? Is it just totp, cert, and ec2? or are there potentially numerous because it's a string?20:08
*** adu has joined #openstack-keystone20:09
*** rderose has quit IRC20:10
*** rderose has joined #openstack-keystone20:11
*** timcline has joined #openstack-keystone20:12
*** timcline has quit IRC20:12
dstanekedtubill: it can be whatever. keystone doesn't dictate what can be stored there20:12
*** timcline has joined #openstack-keystone20:13
*** gyee has joined #openstack-keystone20:13
*** ChanServ sets mode: +v gyee20:13
*** ametts has joined #openstack-keystone20:15
openstackgerritClenimar Filemon proposed openstack/keystone: Update identity endpoint in v3 samples  https://review.openstack.org/34182920:18
*** rderose has quit IRC20:19
edtubilldstanek: ok, so do you think there is a way (besides totp) for a non admin user to create a credential for the admin user and then use that credential to log in as the admin user?20:19
*** rderose has joined #openstack-keystone20:20
*** roxanaghe has joined #openstack-keystone20:20
dstanekedtubill: i don't think so. i don't think that keystone (other than totp) uses that data for anything relasted to auth20:24
edtubilldstanek: ok thanks!20:25
dstanekedtubill: as i understand the history is was just for someone to store their own secrets (like barbican), but using keystone instead of another dependency20:25
edtubilldstanek: oh okay, so it was supposed to store some type of secret blob for a user?20:26
stevemardstanek: sure, start gating those changes20:27
stevemarclenimar: sure, we can do that20:28
clenimarstevemar: also the samples need to be put in json files in order to match what we've been doing already20:29
stevemarclenimar: yeppers20:29
*** tonytan4ever has quit IRC20:31
henrynashstevemar: hi20:32
stevemarhenrynash: yo20:32
stevemarhenrynash: just wanted you to review clenimar's change for os-inherit20:32
stevemarbut its late now!20:32
openstackgerritSteve Martinelli proposed openstack/keystone-specs: Remove the v2.0 section from our APIs  https://review.openstack.org/34239520:33
henrynashok, sorry20:33
*** dan_nguyen has joined #openstack-keystone20:34
henrynashwhat was the link, I’ll review and make a follow up patch if needed20:34
clenimarhenrynash: https://review.openstack.org/#/c/341912/20:35
patchbotclenimar: patch 341912 - keystone - Move OS-INHERIT api-ref from extensions to core20:35
*** ravelar159 has quit IRC20:35
clenimarit certainly needs a follow up patch :)20:35
henrynashstevemar: actually that’s teh one I am looking at now…it hasnn’t merged yet20:35
clenimarthis is just moving the old stuff into the core20:35
henrynashclenimar: looks good to me20:39
*** roxanaghe has quit IRC20:40
openstackgerritSteve Martinelli proposed openstack/keystone-specs: Put the APIs in the attic  https://review.openstack.org/34239920:42
*** roxanaghe has joined #openstack-keystone20:42
stevemardstanek: henrynash thoughts on https://review.openstack.org/#/c/342395/1 and https://review.openstack.org/#/c/342399/120:42
patchbotstevemar: patch 342395 - keystone-specs - Remove the v2.0 section from our APIs20:42
patchbotstevemar: patch 342399 - keystone-specs - Put the APIs in the attic20:42
henrynashdstanek: looking20:43
stevemari don't really care to keep the v2 stuff around, there were no APIs there per say, just random notes20:43
*** rderose has quit IRC20:44
henrynashstevemar: ++ agreed20:44
*** rderose has joined #openstack-keystone20:45
openstackgerritSteve Martinelli proposed openstack/keystone: Correct normal response codes for v2.0 extensions  https://review.openstack.org/34178320:46
henrynashyadq (yet another dumb question)…so how do I actually see the api-ref changes for a given patch?20:47
henrynashi mean, see them formatted nicely20:47
henrynashahh, just seen it!  foolishly thought it was part of teh docs job!20:49
stevemar:)20:51
stevemarhenrynash: it's the only cleverly named api-ref20:51
henrynashindeed! subte that, eh?20:51
henrynashwhodathought20:51
stevemarhenrynash: note that it shows you the index.html that lists all of them, you gotta go to the direct one (or the top level one)20:52
stevemaroh another https://review.openstack.org/#/c/342294/220:52
patchbotstevemar: patch 342294 - keystone - Add v2.0 /endpoints/ api-ref20:52
stevemari missed it20:52
stevemarhenrynash: why no +A https://review.openstack.org/#/c/341912/ ?20:53
patchbotstevemar: patch 341912 - keystone - Move OS-INHERIT api-ref from extensions to core20:53
henrynashstevemar: oh, yes, hsould have done….no reason20:53
stevemari flipped it :)20:53
henrynash:-)20:53
stevemarclenimar: missed a few here: https://review.openstack.org/#/c/341829/220:58
patchbotstevemar: patch 341829 - keystone - Update identity endpoint in v3 samples20:58
stevemarclenimar: also need to do the v3-ext samples :(20:58
clenimarstevemar: whops... gonna fix it :)20:59
openstackgerritSteve Martinelli proposed openstack/keystone-specs: Put the APIs in the attic  https://review.openstack.org/34239920:59
*** adrian_otto has quit IRC21:00
*** thumpba has quit IRC21:01
lbragstadwow - we have so much federation documentation21:05
openstackgerritClenimar Filemon proposed openstack/keystone: Update identity endpoint in v3 and v3-ext samples  https://review.openstack.org/34182921:05
*** raildo has quit IRC21:07
stevemarlbragstad: it's a biggie21:08
*** roxanagh_ has joined #openstack-keystone21:12
openstackgerritClenimar Filemon proposed openstack/keystone: Update identity endpoint in v3 and v3-ext samples  https://review.openstack.org/34182921:12
*** dan_nguyen has quit IRC21:16
*** roxanagh_ has quit IRC21:16
*** adu has quit IRC21:16
*** ddieterly has quit IRC21:18
*** edtubill has quit IRC21:20
*** rcernin has quit IRC21:24
*** Nexus_ has quit IRC21:27
henrynashstevemar, dstanek: so I’m taking a crack and making query params work properly for an example listing API (roles and role assignmnets in this case)….will post shorlty21:28
henrynash(shortly)21:28
*** tonytan4ever has joined #openstack-keystone21:32
*** adu has joined #openstack-keystone21:33
*** tonytan4ever has quit IRC21:37
stevemarclenimar: still a few more comments to address here: https://review.openstack.org/#/c/341829/ :)21:40
patchbotstevemar: patch 341829 - keystone - Update identity endpoint in v3 and v3-ext samples21:40
openstackgerritGage Hugo proposed openstack/keystone: (WIP) Add scheme for endpoint_policy  https://review.openstack.org/34244021:40
*** catintheroof has quit IRC21:40
openstackgerritClenimar Filemon proposed openstack/keystone: Update identity endpoint in v2 samples  https://review.openstack.org/34184121:41
openstackgerrithenry-nash proposed openstack/keystone: Improve readability of the api-ref roles section  https://review.openstack.org/34232521:41
openstackgerrithenry-nash proposed openstack/keystone: Fix up the api-ref for role query paramaters  https://review.openstack.org/34244121:41
*** pauloewerton has quit IRC21:41
openstackgerritGage Hugo proposed openstack/keystone: (WIP) Add schema for endpoint_policy  https://review.openstack.org/34244021:41
clenimarstevemar: oh lord why21:43
clenimarthank you, steve21:44
clenimari'll fix it soon21:44
*** gagehugo has quit IRC21:46
*** jaugustine has quit IRC21:49
*** edmondsw has quit IRC21:52
*** roxanaghe has quit IRC21:53
openstackgerrithenry-nash proposed openstack/keystone: Improve readability of the api-ref roles section  https://review.openstack.org/34232521:56
openstackgerrithenry-nash proposed openstack/keystone: Fix up the api-ref for role query paramaters  https://review.openstack.org/34244121:56
openstackgerritMerged openstack/keystone: Add "v2 overview" docs to APIs  https://review.openstack.org/34173922:00
openstackgerritMerged openstack/keystone: Add OS-EP-FILTER to api-ref  https://review.openstack.org/34178722:00
openstackgerritMerged openstack/keystone: Move OS-INHERIT api-ref from extensions to core  https://review.openstack.org/34191222:01
*** ametts has quit IRC22:01
*** phalmos has quit IRC22:02
*** openstackgerrit has quit IRC22:03
*** openstackgerrit has joined #openstack-keystone22:03
openstackgerrithenry-nash proposed openstack/keystone: Fix up the api-ref for role query paramaters  https://review.openstack.org/34244122:04
*** dan_nguyen has joined #openstack-keystone22:05
*** mvk has joined #openstack-keystone22:05
*** adu has quit IRC22:11
*** spzala has quit IRC22:12
openstackgerrithenry-nash proposed openstack/keystone: Improve readability of the api-ref roles section  https://review.openstack.org/34232522:14
openstackgerrithenry-nash proposed openstack/keystone: Fix up the api-ref for role query paramaters  https://review.openstack.org/34244122:17
henrynashstevemar: first two role api-ref updates are up and ready: https://review.openstack.org/342325 and https://review.openstack.org/34244122:18
*** KevinE has quit IRC22:25
*** ntpttr has quit IRC22:31
*** ntpttr has joined #openstack-keystone22:31
*** tonytan4ever has joined #openstack-keystone22:33
*** spzala has joined #openstack-keystone22:37
*** tonytan4ever has quit IRC22:38
openstackgerritMerged openstack/keystone: Remove a validate_token_bind call  https://review.openstack.org/34204622:44
openstackgerritMerged openstack/keystone: Pass request to normalize_domain_id  https://review.openstack.org/34205222:44
*** timcline has quit IRC22:49
*** adu has joined #openstack-keystone22:50
*** timcline has joined #openstack-keystone22:50
*** slberger has left #openstack-keystone22:53
*** roxanaghe has joined #openstack-keystone22:53
*** itlinux has joined #openstack-keystone22:54
*** timcline has quit IRC22:55
openstackgerritEric Brown proposed openstack/keystone: Add support for Python 3.5  https://review.openstack.org/33795222:57
*** ddieterly has joined #openstack-keystone22:59
openstackgerritMerged openstack/keystone: Correct normal response codes for v2.0 extensions  https://review.openstack.org/34178323:01
*** tonytan4ever has joined #openstack-keystone23:05
*** ddieterly has quit IRC23:06
*** chrisshattuck has quit IRC23:08
*** jerrygb has joined #openstack-keystone23:08
*** adrian_otto has joined #openstack-keystone23:13
*** praneshp has joined #openstack-keystone23:19
*** jerrygb has quit IRC23:24
openstackgerrithenry-nash proposed openstack/keystone: Fix up numerous errors in params in api-ref for roles  https://review.openstack.org/34246823:28
*** roxanaghe has quit IRC23:28
*** spzala has quit IRC23:32
openstackgerritMerged openstack/keystone: Improve user experience involving token flush  https://review.openstack.org/34116523:35
*** praneshp has quit IRC23:39
*** itlinux has quit IRC23:45
*** spzala has joined #openstack-keystone23:46
*** itlinux has joined #openstack-keystone23:48
*** tonytan4ever has quit IRC23:49
*** spzala has quit IRC23:51
*** thumpba has joined #openstack-keystone23:54
*** david-lyle has quit IRC23:54
*** dan_nguyen has quit IRC23:55
*** gordc has quit IRC23:56

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!