Friday, 2016-09-16

*** itsuugo has quit IRC00:06
*** itsuugo has joined #openstack-keystone00:07
*** ddieterly has joined #openstack-keystone00:18
*** tqtran has quit IRC00:22
*** asettle has joined #openstack-keystone00:23
*** ddieterly has quit IRC00:24
*** Marcellin__ has quit IRC00:27
*** asettle has quit IRC00:28
*** thumpba has quit IRC00:29
*** markvoelker has joined #openstack-keystone00:34
openstackgerritMerged openstack/keystone: Refactor find_migrate_repo(): require caller to specify repo  https://review.openstack.org/37085600:35
openstackgerritMerged openstack/keystone: Rename sql.migration_helpers to sql.upgrades  https://review.openstack.org/37104900:35
*** itsuugo has quit IRC00:45
*** itsuugo has joined #openstack-keystone00:46
*** thumpba has joined #openstack-keystone00:55
*** gyee has quit IRC00:56
*** itsuugo has quit IRC00:56
*** asettle has joined #openstack-keystone00:57
*** itsuugo has joined #openstack-keystone00:58
*** asettle has quit IRC01:01
*** itsuugo has quit IRC01:06
*** itsuugo has joined #openstack-keystone01:08
*** roxanaghe has joined #openstack-keystone01:09
*** browne has quit IRC01:14
*** itsuugo has quit IRC01:15
*** itsuugo has joined #openstack-keystone01:17
stevemarcrinkle: i look forward to reviewing your doc change :D01:21
*** EinstCrazy has joined #openstack-keystone01:21
*** EinstCrazy has quit IRC01:22
*** itsuugo has quit IRC01:22
*** EinstCrazy has joined #openstack-keystone01:22
*** itsuugo has joined #openstack-keystone01:22
*** itsuugo has quit IRC01:30
*** itsuugo has joined #openstack-keystone01:31
*** itsuugo has quit IRC01:40
*** itsuugo has joined #openstack-keystone01:41
*** itsuugo has quit IRC01:51
*** itsuugo has joined #openstack-keystone01:53
*** itsuugo has quit IRC02:03
*** itsuugo has joined #openstack-keystone02:03
*** thumpba has quit IRC02:08
*** itsuugo has quit IRC02:11
*** itsuugo has joined #openstack-keystone02:12
*** itsuugo has quit IRC02:17
*** itsuugo has joined #openstack-keystone02:18
*** iurygregory_ has quit IRC02:22
*** itsuugo has quit IRC02:23
*** itsuugo has joined #openstack-keystone02:23
*** catintheroof has joined #openstack-keystone02:27
*** EinstCrazy has quit IRC02:30
*** EinstCrazy has joined #openstack-keystone02:30
*** henrynash has quit IRC02:33
*** henrynash has joined #openstack-keystone02:34
*** EinstCrazy has quit IRC02:34
*** thumpba has joined #openstack-keystone02:35
*** EinstCrazy has joined #openstack-keystone02:36
*** EinstCrazy has quit IRC02:41
*** EinstCrazy has joined #openstack-keystone02:51
*** itsuugo has quit IRC02:51
*** itsuugo has joined #openstack-keystone02:53
*** browne has joined #openstack-keystone02:53
stevemardolphm & lbragstad -- check out https://bugs.launchpad.net/keystone/+bug/162410902:55
openstackLaunchpad bug 1624109 in OpenStack Identity (keystone) "keystone-manage fernet_setup fails silently" [Undecided,New]02:55
*** asettle has joined #openstack-keystone02:59
*** itsuugo has quit IRC03:01
*** sdake_ has quit IRC03:01
*** itsuugo has joined #openstack-keystone03:02
*** asettle has quit IRC03:03
*** itsuugo has quit IRC03:09
*** itsuugo has joined #openstack-keystone03:11
*** browne has quit IRC03:12
*** code-R has joined #openstack-keystone03:14
*** code-R_ has joined #openstack-keystone03:15
*** itsuugo has quit IRC03:15
*** itsuugo has joined #openstack-keystone03:16
*** code-R has quit IRC03:18
*** EinstCrazy has quit IRC03:21
*** EinstCrazy has joined #openstack-keystone03:21
*** itsuugo has quit IRC03:23
*** itsuugo has joined #openstack-keystone03:25
*** EinstCrazy has quit IRC03:26
stevemardolphm: or someone else with stable privs: https://review.openstack.org/#/c/367025/3003:27
stevemarwho the heck even has stable privs any more, i feel like it's just dolphm and myself03:28
*** itsuugo has quit IRC03:30
*** itsuugo has joined #openstack-keystone03:31
*** roxanaghe has quit IRC03:33
*** mordred has quit IRC03:38
*** roxanaghe has joined #openstack-keystone03:39
*** thumpba has quit IRC03:40
*** thumpba has joined #openstack-keystone03:40
*** mordred has joined #openstack-keystone03:43
*** itsuugo has quit IRC03:48
*** itsuugo has joined #openstack-keystone03:50
*** itsuugo has quit IRC03:54
*** itsuugo has joined #openstack-keystone03:56
*** thumpba has quit IRC03:58
*** thumpba has joined #openstack-keystone03:58
*** thumpba has quit IRC03:58
*** thumpba has joined #openstack-keystone03:59
*** thumpba has quit IRC03:59
*** thumpba has joined #openstack-keystone03:59
*** thumpba has quit IRC04:00
*** itsuugo has quit IRC04:00
*** itsuugo has joined #openstack-keystone04:01
*** chrisshattuck has joined #openstack-keystone04:07
*** EinstCrazy has joined #openstack-keystone04:08
*** dave-mccowan has quit IRC04:08
*** itsuugo has quit IRC04:08
*** itsuugo has joined #openstack-keystone04:11
openstackgerritSteve Martinelli proposed openstack/keystone-specs: move py3 spec from ongoing to newton  https://review.openstack.org/37126204:13
openstackgerritMerged openstack/keystone-specs: move py3 spec from ongoing to newton  https://review.openstack.org/37126204:19
*** itsuugo has quit IRC04:20
*** itsuugo has joined #openstack-keystone04:21
*** markvoelker has quit IRC04:28
*** itsuugo has quit IRC04:28
*** itsuugo has joined #openstack-keystone04:29
*** stevemar changes topic to "Newton Deadlines: http://releases.openstack.org/newton/schedule.html | Meeting Agenda https://etherpad.openstack.org/p/keystone-weekly-meeting | Newton retrospective: https://etherpad.openstack.org/p/keystone-newton-retrospective"04:35
stevemarif anyone wants to chime in: https://etherpad.openstack.org/p/keystone-newton-retrospective04:35
stevemarnewton retrospective, would be great to hear thoughts about what worked04:35
stevemarand what didn't work04:35
*** rcernin has quit IRC04:37
*** itsuugo has quit IRC04:37
*** itsuugo has joined #openstack-keystone04:39
*** itsuugo has quit IRC04:43
*** itsuugo has joined #openstack-keystone04:45
*** harlowja has quit IRC04:45
*** itsuugo has quit IRC04:50
*** itsuugo has joined #openstack-keystone04:51
*** itsuugo has quit IRC04:56
*** itsuugo has joined #openstack-keystone04:57
*** jaosorior has joined #openstack-keystone04:57
*** asettle has joined #openstack-keystone05:01
*** itsuugo has quit IRC05:04
*** itsuugo has joined #openstack-keystone05:05
*** asettle has quit IRC05:05
*** esp has quit IRC05:09
*** itsuugo has quit IRC05:12
*** tqtran has joined #openstack-keystone05:13
*** itsuugo has joined #openstack-keystone05:14
*** itsuugo has quit IRC05:18
*** woodster_ has quit IRC05:20
*** itsuugo has joined #openstack-keystone05:20
*** EinstCrazy has quit IRC05:24
*** EinstCrazy has joined #openstack-keystone05:24
*** markvoelker has joined #openstack-keystone05:28
*** EinstCrazy has quit IRC05:29
*** markvoelker has quit IRC05:33
*** itsuugo has quit IRC05:36
*** itsuugo has joined #openstack-keystone05:36
*** richm has quit IRC05:39
*** adriant has quit IRC05:40
*** itsuugo has quit IRC05:41
*** esp has joined #openstack-keystone05:43
*** rcernin has joined #openstack-keystone05:43
*** itsuugo has joined #openstack-keystone05:43
*** esp has quit IRC05:45
*** esp has joined #openstack-keystone05:45
*** esp has quit IRC05:46
*** itsuugo has quit IRC05:48
*** itsuugo has joined #openstack-keystone05:49
*** chrisshattuck has quit IRC05:54
*** EinstCrazy has joined #openstack-keystone05:57
*** thumpba has joined #openstack-keystone06:01
*** roxanaghe has quit IRC06:02
*** EinstCrazy has quit IRC06:04
*** thumpba has quit IRC06:06
*** itsuugo has quit IRC06:07
*** itsuugo has joined #openstack-keystone06:08
*** atod has quit IRC06:10
*** EinstCrazy has joined #openstack-keystone06:14
*** rcernin has quit IRC06:14
*** itsuugo has quit IRC06:15
*** itsuugo has joined #openstack-keystone06:16
*** rcernin has joined #openstack-keystone06:19
*** pcaruana has joined #openstack-keystone06:23
*** EinstCrazy has quit IRC06:26
*** itsuugo has quit IRC06:33
*** itsuugo has joined #openstack-keystone06:34
*** EinstCrazy has joined #openstack-keystone06:35
*** dhellmann has quit IRC06:39
*** vern has quit IRC06:40
*** dhellmann has joined #openstack-keystone06:42
*** vern has joined #openstack-keystone06:43
*** itsuugo has quit IRC06:44
*** itsuugo has joined #openstack-keystone06:45
*** joerch has joined #openstack-keystone06:47
*** itsuugo has quit IRC06:54
*** itsuugo has joined #openstack-keystone06:56
*** david-lyle_ has joined #openstack-keystone06:59
*** david-lyle has quit IRC07:00
*** itsuugo has quit IRC07:01
*** itsuugo has joined #openstack-keystone07:02
*** roxanaghe has joined #openstack-keystone07:02
breton\o07:07
*** roxanaghe has quit IRC07:07
*** atod has joined #openstack-keystone07:13
*** itsuugo has quit IRC07:15
*** itsuugo has joined #openstack-keystone07:17
*** atod has quit IRC07:18
*** amoralej|off is now known as amoralej07:19
*** aloga has quit IRC07:20
*** aloga has joined #openstack-keystone07:20
*** itsuugo has quit IRC07:22
*** itsuugo has joined #openstack-keystone07:23
*** jpena|off is now known as jpena07:26
*** david-lyle has joined #openstack-keystone07:28
*** david-lyle_ has quit IRC07:29
*** markvoelker has joined #openstack-keystone07:29
*** tqtran has quit IRC07:33
*** markvoelker has quit IRC07:34
openstackgerritLucky samadhiya proposed openstack/python-keystoneclient: delete python bytecode including pyo before every test run  https://review.openstack.org/37132407:54
*** pnavarro has joined #openstack-keystone07:56
*** zzzeek has quit IRC08:00
*** zzzeek has joined #openstack-keystone08:00
openstackgerritLucky samadhiya proposed openstack/keystone: delete python bytecode including pyo before every test run  https://review.openstack.org/37133508:01
*** thumpba has joined #openstack-keystone08:01
*** openstackgerrit has quit IRC08:03
*** openstackgerrit has joined #openstack-keystone08:03
*** itsuugo has quit IRC08:08
*** itsuugo has joined #openstack-keystone08:10
*** itsuugo has quit IRC08:15
*** jed56 has joined #openstack-keystone08:15
*** itsuugo has joined #openstack-keystone08:16
*** code-R_ has quit IRC08:17
*** asettle has joined #openstack-keystone08:20
*** itsuugo has quit IRC08:21
*** itsuugo has joined #openstack-keystone08:22
*** itsuugo has quit IRC08:29
*** thumpba has quit IRC08:30
*** itsuugo has joined #openstack-keystone08:31
*** namnh has joined #openstack-keystone08:41
*** code-R has joined #openstack-keystone08:42
*** code-R_ has joined #openstack-keystone08:44
*** code-R has quit IRC08:48
*** itsuugo has quit IRC08:49
*** itsuugo has joined #openstack-keystone08:50
*** roxanaghe has joined #openstack-keystone08:51
*** itsuugo has quit IRC08:55
*** roxanaghe has quit IRC08:55
*** itsuugo has joined #openstack-keystone08:56
*** EinstCrazy has quit IRC08:57
*** itsuugo has quit IRC09:08
*** itsuugo has joined #openstack-keystone09:10
*** itsuugo has quit IRC09:15
*** itsuugo has joined #openstack-keystone09:16
*** itsuugo has quit IRC09:27
*** itsuugo has joined #openstack-keystone09:29
*** itsuugo has quit IRC09:34
*** itsuugo has joined #openstack-keystone09:36
*** itsuugo has quit IRC09:41
*** namnh has quit IRC09:41
*** namnh has joined #openstack-keystone09:41
*** itsuugo has joined #openstack-keystone09:42
*** itsuugo has quit IRC09:47
*** itsuugo has joined #openstack-keystone09:48
*** daemontool has joined #openstack-keystone09:49
*** itsuugo has quit IRC09:57
*** itsuugo has joined #openstack-keystone09:58
*** daemontool has quit IRC09:59
*** itsuugo has quit IRC10:07
*** itsuugo has joined #openstack-keystone10:09
*** richm has joined #openstack-keystone10:11
*** itsuugo has quit IRC10:14
*** itsuugo has joined #openstack-keystone10:15
*** itsuugo has quit IRC10:20
*** itsuugo has joined #openstack-keystone10:21
*** daemontool has joined #openstack-keystone10:26
*** thumpba has joined #openstack-keystone10:27
*** thumpba has quit IRC10:32
*** itsuugo has quit IRC10:33
*** itsuugo has joined #openstack-keystone10:36
*** roxanaghe has joined #openstack-keystone10:39
*** itsuugo has quit IRC10:41
*** itsuugo has joined #openstack-keystone10:42
*** sdake has joined #openstack-keystone10:42
*** roxanaghe has quit IRC10:44
*** itsuugo has quit IRC10:51
*** itsuugo has joined #openstack-keystone10:52
*** nicolasbock has joined #openstack-keystone10:56
*** itsuugo has quit IRC10:57
*** namnh has quit IRC10:57
*** itsuugo has joined #openstack-keystone10:58
*** itsuugo has quit IRC11:09
*** itsuugo has joined #openstack-keystone11:10
*** artmr has joined #openstack-keystone11:15
samueldmqmorning keystone11:18
*** itsuugo has quit IRC11:21
*** itsuugo has joined #openstack-keystone11:23
bretonsamueldmq: o/11:24
dstaneksamueldmq: !11:28
samueldmqbreton: dstanek: o/11:28
*** itsuugo has quit IRC11:30
*** markvoelker has joined #openstack-keystone11:31
*** itsuugo has joined #openstack-keystone11:31
*** markvoelker has quit IRC11:35
*** itsuugo has quit IRC11:38
*** itsuugo has joined #openstack-keystone11:39
*** catintheroof has quit IRC11:39
*** itsuugo has quit IRC11:44
*** itsuugo has joined #openstack-keystone11:45
*** jpena is now known as jpena|lunch11:49
*** jed56 has quit IRC11:55
*** asettle has quit IRC12:01
*** asettle has joined #openstack-keystone12:01
openstackgerritAlexander Makarov proposed openstack/keystone: Unified delegation model  https://review.openstack.org/20848812:05
artmrhello all12:05
*** asettle has quit IRC12:06
*** itsuugo has quit IRC12:07
artmrI have a problem with client keystoneclient.v312:07
*** amoralej is now known as amoralej|lunch12:08
*** itsuugo has joined #openstack-keystone12:09
*** code-R_ has quit IRC12:10
artmrI can't list the roles created in a specific domain filtered by it12:10
*** code-R has joined #openstack-keystone12:11
*** asettle has joined #openstack-keystone12:12
breton"issued_at": "2016-09-12T23:10:56.000000Z", "expires": "2016-09-13T00:10:55Z"12:13
bretonhave we fixed the issue with different formats of datetimes?12:13
*** raildo has joined #openstack-keystone12:15
*** itsuugo has quit IRC12:20
*** itsuugo has joined #openstack-keystone12:21
*** markvoelker has joined #openstack-keystone12:26
*** itsuugo has quit IRC12:26
*** itsuugo has joined #openstack-keystone12:27
*** catintheroof has joined #openstack-keystone12:27
catintheroofHi, quick question, suppose i have lots of users into a single OU on ldap, and i need to assign each user to a new domain, i dont need domain specific driver for that right ? i just need multidomains enabled and how to do i do to filter that every user is a new domain ? can i apply some filter on keystone to achieve that ?12:29
*** edmondsw has joined #openstack-keystone12:32
*** itsuugo has quit IRC12:34
*** itsuugo has joined #openstack-keystone12:35
*** GB21 has joined #openstack-keystone12:37
*** itsuugo has quit IRC12:40
*** itsuugo has joined #openstack-keystone12:41
*** porunov has joined #openstack-keystone12:44
*** thumpba has joined #openstack-keystone12:44
*** porunov has left #openstack-keystone12:45
stevemaro/12:56
*** jpena|lunch is now known as jpena12:58
samueldmqstevemar: hi12:58
samueldmqstevemar: morning12:58
samueldmqartmr: hi, what are the calls you're making ?12:59
samueldmqartmr: to create and list roles ?12:59
*** sdake_ has joined #openstack-keystone13:00
samueldmqcatintheroof: hi13:00
samueldmqcatintheroof: I believe you would need to have domain specifc drivers for that13:01
samueldmqcatintheroof: where each driver (connected to the same ldap) would map users to a different domain13:01
samueldmqcatintheroof: however, as they're in the same point of the LDAP tree, I am not sure you can achieve that13:02
samueldmqayoung: henrynash: any of you around ?  ^13:02
*** code-R_ has joined #openstack-keystone13:02
*** sdake has quit IRC13:03
catintheroofsamueldmq, is there any way to find that out ?13:03
catintheroofsamueldmq, for sure ? maybe here someone that might know ?13:03
*** jaosorior has quit IRC13:03
samueldmqcatintheroof: we could check with ayoung or henrynash if they're around, they will have the answers for that13:04
*** jaosorior has joined #openstack-keystone13:04
samueldmqcatintheroof: you need to map each user to a different domain, right ?13:04
samueldmqcatintheroof: but all the users are in a single point of the LDAP tree13:04
catintheroofsamueldmq, EXACTLY !13:05
*** GB21 has quit IRC13:05
*** code-R has quit IRC13:05
samueldmqcatintheroof: hmm, with federation mappings you could achieve that , but our LDAP support maps a point of the LDAP tree into a domain13:05
catintheroofsamueldmq, maybe using domains specific pointing different domains to the same tree, but i need to tell every domain how to find the user that only belongs to that domain, maybe applying some filter to look for a specidif attribute ?13:06
samueldmqcatintheroof: so you'd have a single domain for them all ... I don't think we support what you need yet13:06
catintheroofsamueldmq, that's what i need to confirm for sure13:07
samueldmqcatintheroof: I think you can apply a filter on user name ...13:07
*** dave-mccowan has joined #openstack-keystone13:07
samueldmqcatintheroof: so yes, maybe you could do with domain specific configs13:07
samueldmqcatintheroof: let me look at the code13:07
samueldmqcatintheroof: just remind that solution will require a bit of configuration13:08
catintheroofsamueldmq, no prob, if its only conf, that's what openstack is all about, jut need to confirm that config things out will work13:08
samueldmqcatintheroof: so yes, that's technically possible13:09
samueldmqcatintheroof: there is a user filter you can use: https://github.com/openstack/keystone/blob/master/keystone/conf/ldap.py#L15113:09
catintheroofsamueldmq, i was thinkign to add a DOMAIN attribute and apply a filter in the domain config to look only for user with an attribute with X value13:09
samueldmqcatintheroof: so each domain config would have a ldap config, with that filter set to something different13:09
catintheroofsamueldmq, oh, let me see13:10
artmrSamuel, https://s14.postimg.io/5df0qu3rl/oie_UDq_YPa2m9_RNw.png13:10
*** ayoung_ has joined #openstack-keystone13:11
*** atod has joined #openstack-keystone13:12
artmrThe 'foo' user, admin of cloud joined at 'domainA' creates roles in the 'domainA', but not list it13:12
artmrthe roles are present in database13:12
samueldmqartmr: looking13:12
ayoungcatintheroof, "every user is a domain?"13:13
samueldmqartmr: maybe it's an authorization issue ?13:13
samueldmqartmr: check your policy file, maybe that user is not authorized to list roles ?13:13
samueldmqartmr: list all roles (wihtout filtering) and see what happens13:13
artmrwithout filter, the same roles are listed13:16
*** thumpba has quit IRC13:17
artmrI'm check the policy file , now13:17
openstackgerritMerged openstack/keystone: Update reno for stable/newton  https://review.openstack.org/37087813:20
artmrauthorization issue?13:20
catintheroofayoung, yeahp !13:21
catintheroofayoung, that's what i need ... dunno if using user_filter would help for every domain specific config13:21
ayoungcatintheroof, you would have to create a domain each time a user logged in for the first time, then.  That seems like a lot of overhead13:21
ayoungcatintheroof, I think you want HMT and each user gets their own project, then have projects created by defua13:22
ayoungdefault13:22
catintheroofayoung, the users already exists, they are pretty much fixed already (since every user is its own company) so i need to give them a domain, but they are all into the same LDAP tree, so i need on every domain specific config a way to map that domain to just ONE user13:23
artmrI create the roles in the same domain with user 'foo' client, but he hasn't authorization for list?13:24
catintheroofayoung, talked with samueldmq and he pointed to me user_filter config feature13:24
catintheroofayoung, maybe that would help ?13:24
artmrthe user 'foo' is cloud admin13:26
*** amoralej|lunch is now known as amoralej13:27
*** tonytan4ever has joined #openstack-keystone13:27
*** ddieterly has joined #openstack-keystone13:27
openstackgerritKaren Bradshaw proposed openstack/keystone: [WIP] rebuild api ref as one page/one toc  https://review.openstack.org/37154113:31
ayoungcatintheroof, one domain per user or one domain to bring them all and in the darkness bind them?13:32
*** spilla has joined #openstack-keystone13:36
raildoayoung, one domain per user sounds like a wrong way to dealing with domains :P13:36
*** tonytan_brb has joined #openstack-keystone13:44
*** rodrigods has quit IRC13:45
*** rodrigods has joined #openstack-keystone13:45
openstackgerritAlexander Makarov proposed openstack/keystone: Unified delegation assignment driver  https://review.openstack.org/29131813:45
*** daemontool has quit IRC13:46
catintheroofayoung, raildo of course, but as sometime things are not as we want to (when reaching a customer with an ALIEN ldap structure) i need to adapt, reason why im trying to find out if that can be made, dont know if i understand ayoung sentence, but i think its one user per one domain13:46
*** tonytan4ever has quit IRC13:46
ayoungcatintheroof, probably not13:47
ayoungcatintheroof, you jumped to solutions.  Lets start with the problem.  You have an LDAP server....13:47
catintheroofayoung, probably can't be made ?13:47
openstackgerritAlexander Makarov proposed openstack/keystone: Move dependency-related trust logic to manager  https://review.openstack.org/36073513:47
openstackgerritAlexander Makarov proposed openstack/keystone: Unified delegation trust driver  https://review.openstack.org/29187113:48
catintheroofayoung, YEAH13:48
openstackgerritAlexander Makarov proposed openstack/keystone: OAuth1 driver for unified delegation  https://review.openstack.org/37096513:48
raildoayoung, ++13:48
catintheroofayoung, i have an ldap13:48
catintheroofayoung, raildo all users (every user is a company) is under OU=users,DC=company,DC=com13:49
ayoungcatintheroof, OK, so each user in LDAP, when they log in to keystone come from a dsingle domain...lets call this domain company_directory13:50
ayoungthat does not limit them to what projects they can use13:50
catintheroofayoung, exactly13:50
ayoungsay we have a new company join, with their own LDAP server in a different structure13:50
ayoungwe'll create a new domain called accquired_directory13:50
catintheroofayoung, sure13:51
ayounglets say there is one big IT project.  User from both domains can have a role on the IT project.13:51
*** sdake_ has quit IRC13:52
ayoungtheir config files would say USER_DOMAIN_NAME=[company_directory|accquire_directory] and PROJECT_DOMAIN_NAME=IT  PROJECT_NAME=common13:52
ayoung3 domains.  One for each source of users, one for common projects13:52
catintheroofayoung, hmmmm, i think is not the use case13:54
catintheroofayoung, can i elaborate ?13:55
*** pnavarro has quit IRC13:57
*** roxanaghe has joined #openstack-keystone13:58
*** gagehugo has joined #openstack-keystone14:00
*** roxanaghe has quit IRC14:03
ayoungcatintheroof, please do, and understand I am multiplexing tasks here, so don't wait for my responses14:04
*** asettle has quit IRC14:06
*** asettle has joined #openstack-keystone14:07
*** asettle has quit IRC14:07
*** asettle has joined #openstack-keystone14:07
*** ezpz has joined #openstack-keystone14:10
*** jaosorior has quit IRC14:10
*** asettle has quit IRC14:12
*** asettle has joined #openstack-keystone14:13
*** ezpz has quit IRC14:14
samueldmqartmr: sorry I was afk14:15
catintheroofayoung, i have a single LDAP tree, OU=users,DC=company,DC=com, there are two users USER1, USER2, the customer told me that each user for them is a company, they can't change the LDAP TREE, but want to give the each user a DOMAIN, so that they can create their projects there (they will allways use the same user for that domain) so my question is, taking into consideration that all users are in a single tree, and i want to associate a14:15
catintheroofsingle user there with a specific domain, how can i achieve that ? so, to give an example i was thinking for example (and its just an example that i believe will help to understand what i need) is to add an attribute to USER1 that says domain=DOMAIN1 and use on the keystone.DOMAIN1.conf config file a user_filter to make sure that for that domain, only that user matches. so, in the end, can i match a single user into a tree full of users14:15
catintheroofto match one domain only ?14:15
samueldmqartmr: so, the user may have a role that gives him authorization to create roles14:15
samueldmqartmr: but not to list roles14:15
samueldmqartmr: that's why I asked you to list roles (without any filter) with that same user (who is creating roles)14:16
samueldmqartmr: what's the status code of the response when you list roles filtering by domain? is it a 200 OK ?14:17
ayoungcatintheroof, ok, so this is not well supported, but I guess you could use the domain specific backend and the config in the database, but you would have to somehow script adding new entries14:17
ayoungI think Federation is going to be the only real option for you14:17
ayoungcatintheroof, what platform are you deployed on?14:17
*** asettle has quit IRC14:18
*** asettle has joined #openstack-keystone14:18
catintheroofayoung, ubuntu 16.04. ubuntu packages for mitaka release against an openLDAP, and, i would love to avoid federation since i want to avoid extra configs and extra hassle where i dont need to, if its possible of course14:19
*** ddieterly is now known as ddieterly[away]14:19
*** ddieterly[away] is now known as ddieterly14:19
ayoungcatintheroof, it is not possible.  Your CUstomer gave you the hassle. THis is going to suck no matter what14:19
catintheroofayoung, ahahaha true14:19
*** tonytan_brb is now known as tonytan4ever14:20
ayoungAh...ok14:20
ayoungso no federation14:20
ayoungall users come from the same domain14:20
ayoungwhat you want is the domain where they create projects, and that is a notifications issue14:20
ayoungcatintheroof, are you OK with pre-creating the domains for all users in LDAP?14:21
ayounglets ignore later additions for the moment, we can deal with that in a bit.14:21
catintheroofayoung, absolutely ! im ok with it and yes ... lets ignore that !14:21
*** asettle has quit IRC14:23
*** asettle has joined #openstack-keystone14:23
catintheroofayoung, so ... cn=demo1,ou=Users,dc=company,dc=com on DOMAIN1 and cn=demo2,ou=Users,dc=nubeliu,dc=int on DOMAIN214:24
catintheroofayoung, that what i need14:24
catintheroofayoung, suppose they all already exists and if they need to add a new one, it can be done manually and super controlled14:25
ayoungcatintheroof, of so you can do that with the Python API, or the CLI fairly easily;  for u in keystonec.users():; domain = u.username; keystoinec.domains.create(u)14:26
ayoungroughyl speaking of course14:26
*** jed56 has joined #openstack-keystone14:26
catintheroofayoung, so, how does the user_filter would look like on DOMAIN1 conf to only match user demo1?14:27
openstackgerritRodrigo Duarte proposed openstack/keystone: Return password_expires_at during auth  https://review.openstack.org/36700814:28
*** atod has quit IRC14:28
ayoungcatintheroof, it doesn't14:28
ayoungall users are in a single domain for management.  What you do is generate a new domain only for assignment for each one14:29
ayoungI forget a step in my pseduocode14:29
ayoungpseudo-code14:29
ayoungpneumatic drill14:29
ayoungdamn you autocorrect!14:29
catintheroofayoung, hahahaah14:29
catintheroofayoung, i think im not understanding, can you update your pseudo ?14:30
artmrThank you, samueldmq. I'm not sure what was happening, but I try again and the result was the expected. Later, I'm try reproduce the same scenario from the beginning14:30
ayoungfor u in keystonec.users():; domain = u.username; d=keystoinec.domains.create(u); keystoinec.roles.assign(u,d,'Member' );14:30
samueldmqartmr: you're welcome. Glad you got it working14:31
*** jaugustine has joined #openstack-keystone14:31
catintheroofayoung, that means that u use multidomains, but not domains specific ?14:34
*** ravelar has joined #openstack-keystone14:34
*** nicolasbock has quit IRC14:36
*** itsuugo has quit IRC14:38
*** itsuugo has joined #openstack-keystone14:41
ayoungrodrigods, sure do!14:43
rodrigodsayoung, :)14:43
*** spilla has quit IRC14:44
*** nicolasbock has joined #openstack-keystone14:44
*** woodburn has quit IRC14:56
ravelarrodrigods: in comment on test_token_provider.py are you talking about using the validate_token assert test before check_domain_and_project_enabled or switching the test for validate_test?15:03
ravelarrodrigods: https://review.openstack.org/#/c/371165/1/keystone/tests/unit/test_token_provider.py15:03
rodrigodsravelar, think the test is more valuable if you check if the validation works, not only the method you added15:03
ravelarrodrigods: ahh okay, just needed clarification on what you meant. Thanks for you feedback btw!15:04
*** woodburn has joined #openstack-keystone15:06
rodrigodsravelar, np :)15:12
*** sdake has joined #openstack-keystone15:14
*** rcernin has quit IRC15:15
*** chrisshattuck has joined #openstack-keystone15:17
*** sdake_ has joined #openstack-keystone15:18
*** sdake has quit IRC15:20
ayoungrodrigods, +2 FROM ME15:26
rodrigodsthanks ayoung15:26
ayounghttps://review.openstack.org/#/c/358770/715:26
*** GB21 has joined #openstack-keystone15:29
openstackgerritMerged openstack/keystone: Fixes password created_at errors due to the server_default  https://review.openstack.org/36702515:29
openstackgerritMerged openstack/keystone: Adds tests for verify_length_and_trunc_password()  https://review.openstack.org/37023915:30
*** spedione|AWAY is now known as spedione15:34
*** slberger has joined #openstack-keystone15:38
*** itsuugo has quit IRC15:39
*** itsuugo has joined #openstack-keystone15:41
*** ebalduf has joined #openstack-keystone15:43
*** roxanaghe has joined #openstack-keystone15:46
*** michauds has joined #openstack-keystone15:48
*** avozza has joined #openstack-keystone15:50
*** roxanaghe has quit IRC15:50
*** avozza has quit IRC15:52
*** avozza has joined #openstack-keystone15:53
*** code-R_ has quit IRC15:59
*** tonytan4ever has quit IRC16:04
*** roxanaghe has joined #openstack-keystone16:06
lbragstadravelar https://review.openstack.org/#/c/371083/ might help you in removing some revocation events16:09
*** gyee has joined #openstack-keystone16:11
*** avozza has quit IRC16:12
dstanekdolphm: horizon's out of the box multi-domain support confuses me16:13
*** mordred has quit IRC16:13
dstanekin a brand new devstack instance (configured with multidomain) i can seem to find a way to create domains as admin16:14
dolphmdstanek: do you have the Domains tab on the left?16:15
dstaneknope16:15
*** mordred has joined #openstack-keystone16:17
openstackgerritRichard Avelar proposed openstack/keystone: Reduce revoke events for disabled domains/projects  https://review.openstack.org/37116516:17
*** asettle has quit IRC16:22
*** NishaYadav has joined #openstack-keystone16:23
*** asettle has joined #openstack-keystone16:23
NishaYadavo/16:25
openstackgerritMerged openstack/keystone: Move test_sql_upgrade.MigrationRepository into keystone.common  https://review.openstack.org/37105816:25
*** asettle has quit IRC16:27
openstackgerritDavid Stanek proposed openstack/keystone: Ensure the sqla-migrate scripts cache is cleared  https://review.openstack.org/37107516:31
dstanekstevemar: rderose: rodrigods: lbragstad: ^16:31
lbragstaddstanek oh - i'm already on it16:32
lbragstaddstanek like RG3 and the ground... I'm on it16:32
dstanekouch16:32
dolphmdstanek: have you seen scarlise around?16:32
lbragstad;)16:32
dolphmscarlisle*16:33
*** ebalduf has quit IRC16:33
dolphmor henrynash16:33
dstanekdolphm: nope16:34
*** ddieterly is now known as ddieterly[away]16:34
*** chrisshattuck has quit IRC16:37
*** GB21 has quit IRC16:38
*** chrisshattuck has joined #openstack-keystone16:39
*** nisha_ has joined #openstack-keystone16:41
*** artmr has quit IRC16:42
*** browne has joined #openstack-keystone16:43
*** jaosorior has joined #openstack-keystone16:44
*** NishaYadav has quit IRC16:44
*** esp has joined #openstack-keystone16:44
*** agireud has quit IRC16:49
*** nisha__ has joined #openstack-keystone16:50
*** nisha_ has quit IRC16:51
*** agireud has joined #openstack-keystone16:51
*** tqtran has joined #openstack-keystone16:53
*** spilla has joined #openstack-keystone16:53
*** ddieterly[away] is now known as ddieterly16:58
*** itsuugo has quit IRC17:00
*** itsuugo has joined #openstack-keystone17:00
*** tonytan4ever has joined #openstack-keystone17:04
dolphmstevemar: how much do you know about horizon's domain features?17:09
*** tonytan4ever has quit IRC17:10
david-lyledolphm: I know a bit :)17:10
*** ddieterly is now known as ddieterly[away]17:10
*** ddieterly[away] is now known as ddieterly17:10
dolphmdavid-lyle: \o/17:10
david-lylehere or horizon?17:10
dolphmdavid-lyle: here is fine to me17:11
dolphmdavid-lyle: dstanek: so, we're trying to work through federation + multi-domain support both17:11
david-lyleok, what can I answer17:11
dolphmdavid-lyle: so, it looks like horizon can auth for a domain-scoped token17:11
david-lyleyes17:11
dolphmdavid-lyle: but we were seeing a couple issues that seem to lie between horizon and keystone's policy17:12
david-lylewe'll get a domain scoped token and a project scoped token if you have a role on a project17:12
dolphmdavid-lyle: or horizon's understanding of keystone's policy17:12
david-lyleok17:12
dolphmdavid-lyle: so, as of Mitaka, keystone supports the magic admin project, which is a more explicit form of global root cloud-level admin17:13
david-lyleah yes, this addition is not support yet unfortunately17:13
dolphmdavid-lyle: horizon (in mitaka, i believe) apparently choked on the "token.is_admin_project" flag here https://github.com/openstack/keystone/blob/master/etc/policy.v3cloudsample.json#L317:13
*** chrisshattuck has quit IRC17:14
dolphmdavid-lyle: so, we were actually able to make the cloud admin use case work, sort of, by giving a user no authz *except* the admin role on the admin project... but that user had no Domains tab in horizon, so they couldn't create domains17:14
dolphmdavid-lyle: known issue?17:15
david-lylewouldn't that be expected?17:15
dolphmdavid-lyle: i'd expect a cloud admin to be able to create domains17:15
david-lyleif I'm admin in a project aren't I a service admin not an identity admin?17:15
* david-lyle thinks I missed some finer points of the feature17:15
dolphmdavid-lyle: that's what the is_admin_project / magic admin project is supposed to convey - cloud-level authz17:16
dolphmacross domains17:16
david-lylefor identity as well?17:16
dolphmdavid-lyle: yes17:16
dolphmayoung: correct me if i'm wrong ^^17:16
david-lyleis this the offshoot of special projects and domains hiding in plain sight?17:16
*** scarlisle has joined #openstack-keystone17:16
dolphmdavid-lyle: not really17:17
david-lylebecause you're really treating that admin project like a domain?17:17
david-lyleok, I'm still confused17:17
dolphmdavid-lyle: so, in liberty and before, the "admin" role on any project basically gave you global / root / cross-domain / whatever admin access, right?17:17
scarlisleo/17:18
david-lyleright leaky admin, but not in identity IIRC17:18
*** sdake_ has quit IRC17:18
dolphmdavid-lyle: so, to solve for the "domain admin" case, or even "project admin" case, we introduced a magic project, where, if you have the (now less magical) "admin" role on the (magical) "admin" project, THAT now means you have cloud-level authz, and we suddenly open up the "admin" role to actually be meaningful within a domain or (non-magic-admin) project17:19
*** jpena is now known as jpena|away17:19
david-lylewithin a domain17:19
david-lyleso why should I see the domain tab?17:19
dolphmdavid-lyle: there are two cases i think where you should be able to manage domains...17:20
*** chrisshattuck has joined #openstack-keystone17:20
david-lyleok you should see the domain tab with the current domain listed17:20
dolphmdavid-lyle: and in both cases, the token coming from keystone will now have an is_admin_project flag set to true17:20
david-lyleI over simpified17:20
dolphmdavid-lyle: so, you should be able to rely on the is_admin_project attribute in a token to signal "cloud admin"17:21
david-lylebut the blurb you pasted above indicates "within a domain"17:21
david-lylewhich would be domain admin, no?17:21
dolphmpsh, pasted17:22
david-lyleoh I assumed that was from the spec17:22
dolphmdavid-lyle: oh, no. is_admin_project=True == cloud admin17:23
david-lylegood grief really?17:23
dolphmdavid-lyle: yes17:23
dolphmdavid-lyle: for deployments that haven't configured these bits in mitaka+, is_admin_project will be "true" for ALL projects with an "admin" role assignment17:24
*** amoralej is now known as amoralej|off17:24
david-lyleso I can be cloud admin with either a admin role on the admin domain OR an admin role on the is_admin_project project17:24
dolphmdavid-lyle: you have to configure keystone with a specific admin project for it to suddenly become specific in the API17:24
dolphmdavid-lyle: wait, is "admin domain" a thing?17:25
dolphmstevemar: ^?17:25
david-lylewasn't that the default domain?17:25
dolphmoh, the last bit of https://github.com/openstack/keystone/blob/master/etc/policy.v3cloudsample.json#L317:25
david-lyleadmin on the default domain made you cloud admin where default was the default but changeable17:25
david-lyleyup17:26
david-lylethat was all there was before is_admin_project came into being17:26
dolphmdavid-lyle: the literal string "admin_domain_id" in policy there is supposed to be a placeholder for a real domain ID17:26
*** nisha_ has joined #openstack-keystone17:26
dolphmdavid-lyle: correct17:26
david-lyledolphm: yes I understand17:26
david-lyleand it has to be configured17:26
dolphmdavid-lyle: so, "default" might be a reasonable value to put in place of "admin_domain_id", i suppose17:26
dolphmdavid-lyle: correct17:26
david-lylewhich is a bit annoying as an aside17:26
dolphmdavid-lyle: agree17:27
dolphmdavid-lyle: that's sort of where is_admin_project makes things "easier"17:27
david-lylesure, but adds another way17:27
dolphmhonestly, i think we could probably drop support for domain_id:admin_domain_id immediately... ? cc- henrynash ayoung ?17:28
david-lylewe have not fully pulled in the is_admin_project17:28
david-lylewe can update django_openstack_auth and release it for O17:28
dolphmdavid-lyle: this is also made more complicated by policy.v3cloudsample.json now trying to support multiple different use cases, it could be simplified if not split (at least)17:28
david-lyleand consider a backport to N17:28
*** tonytan4ever has joined #openstack-keystone17:29
david-lyleyes the sample is very complicated17:29
*** nisha__ has quit IRC17:29
dolphmdavid-lyle: that'd be valuable, but you're going to have to help me understand if that will address my second use case...17:29
dolphmor maybe this use case is supported some other way and i'm just lost17:29
dolphmdavid-lyle: so, while you have a very small number of cloud admins, we'd like to have many more domain-level admins, that do not have authorization across domains17:30
david-lyleyes, theoretically that should be supported now17:31
dolphmdavid-lyle: so, if you have 10 domains, i'd like to have a domain admin group of users for each of them, with domain+group+admin-role assignments17:31
david-lylewe are probably checking roles directly, you would have to have the admin role on the domain you want to administer17:32
dolphmdavid-lyle: maybe you could just point me to the code (i've been grepping through horizon and django openstack auth looking for it)... but what is horizon expecting before it exposes domain-admin UI features?17:32
dolphmdavid-lyle: so, an 'admin' role on a domain-scoped token17:32
david-lyleyes17:32
dolphmdavid-lyle: does that depend on the contents of policy at all?17:32
openstackgerritKristi Nikolla proposed openstack/keystone: WIP: Devstack plugin for Federation  https://review.openstack.org/32062317:32
dolphmdavid-lyle: or would 'admin' be hardcoded?17:32
david-lyledolphm: it shouldn't be hardcoded, I hope that it's not17:33
* david-lyle looks for the code17:33
dolphmdavid-lyle: appreciate all your help, btw17:33
*** nisha__ has joined #openstack-keystone17:33
*** ddieterly is now known as ddieterly[away]17:33
*** ddieterly[away] is now known as ddieterly17:33
david-lyleno worries, I put off the domain scoped token support in horizon for a long time because it created such a mess17:34
dolphmdavid-lyle: =D17:34
david-lylenow we have it, and it's indeed a mess17:34
*** ddieterly is now known as ddieterly[away]17:34
david-lylebecause we ended up with things like https://github.com/openstack/horizon/blob/master/openstack_dashboard/api/keystone.py#L295 which aren't very flexible17:35
*** chrisshattuck has quit IRC17:35
*** nisha__ is now known as nishaYadav17:35
david-lylebut at least it's policy driven assuming that policy rule exists17:36
*** nisha_ has quit IRC17:37
david-lyleso whatever you defined for admin_required should work17:37
*** chrisshattuck has joined #openstack-keystone17:38
dolphmdavid-lyle: *thinking*17:38
david-lylenow we ran into all sorts of problems trying to tie domain admin to any sort of project admin abiliity17:38
david-lyleso a domain admin in horizon just allows managing identity17:38
david-lylefor that domain17:39
dolphmdavid-lyle: gotcha17:39
dolphmdavid-lyle: that would explain a bit of what we saw17:39
david-lylethe project token is used to determine your roles for other services17:39
dolphmdavid-lyle: so you can't even create a project?17:39
dolphmdavid-lyle: as a domain admin?17:39
david-lyleyou can create a project17:39
dolphmdavid-lyle: oh?17:39
david-lylethat's identity17:39
dolphmoooh17:39
david-lylewe had to strip quota out of it though17:40
david-lylewhich is somewhat unrelated but cobbled into the typical horizon workflow for creating a projec17:40
david-lylet17:40
ayoungdolphm, in a meeting,17:41
dolphmayoung: ack17:41
ayoung domain_id:admin_domain_id  should be superceded by is_admin project, but is really just a doc change17:41
*** ravelar has quit IRC17:42
dolphmdavid-lyle: ^17:42
ayoungso, yeah, document more than dropping it, I think17:42
david-lylerelease not for anybody using the existing mechanism17:42
david-lyle*note17:42
*** spzala has joined #openstack-keystone17:43
dolphmayoung: is the code capable of evaluating token.is_admin_project:True somewhere in keystone instead of oslo.policy?17:44
dolphmdavid-lyle: and does openstack_dashboard use oslo.policy to evaluate other service's policy files?17:44
david-lyleyes17:45
david-lylewe have to add a little strangeness up front for credentials, but essentially yes it's just oslo policy17:45
dolphmayoung: i don't see anything to evaluate is_admin_project in either keystone or oslo.policy17:47
ayoungdolphm, I think it always has been.  I had it working a while back.  The cloudsample one was changed17:47
openstackgerritKristi Nikolla proposed openstack/keystone: WIP: Devstack plugin for Federation  https://review.openstack.org/32062317:48
ayoungand I had an approach for the default policy, but...jamie had a different approach and we were working to make it happen17:48
ayoungmy approach was "if nothing is set in keystone, report all admin tokens as admin tokens"17:48
ayoungjamie's was a little more introspective17:48
ayounglet me  see17:48
dolphmayoung: i thought your approach is what we were using17:48
ayoungdolphm, http://git.openstack.org/cgit/openstack/keystone/tree/etc/policy.v3cloudsample.json#n317:49
dolphmayoung: if you have the "admin" role and keystone is not configured with an [resource] admin_project_name, then the project doesn't matter and is_admin_project appears true in all tokens, no?17:49
ayoungdolphm, in keystone, I think we are.  But that is not quite what oslo-context is doing17:49
ayoungkeystone as it is today does not use oslo-context17:49
ayoungbut it passes the whole token to policy, so we can enforce on token values17:50
ayoungthat policy rule would not work in Nova or glance17:50
dolphmoh weird17:50
ayoungtoken.is_admin_project:True17:50
ayoungyeah17:50
dolphmayoung: so that's why it doesn't work in horizon, either?17:50
ayoungso jamielennox got it fixed in context, and was working through all the other projects, cuz they do funky things17:50
rodrigodsknikolla, ^ how is this evolving?17:50
ayoungthat was what we were discussing so long in the meeting on Tuesday17:50
ayoungdolphm, probably worth you rereading the Evesdrop of that now with the additional context17:51
ayoungthe oslo-context fix went in a while back, let me see...17:51
knikollarodrigods: it basically just needs testing.17:51
rodrigodsknikolla, awesome17:52
rodrigodsknikolla, can you add in the commit message how we would use the plugin?17:52
rodrigodswhat should be added in the local.conf file17:52
dolphmayoung: tuesday this week?17:52
ayoungdolphm, yeah this one17:53
knikollarodrigods: everything is in the readme.rst in the devstack folder. when using it from the gerrit review you need to also set the keystone_repo and keystone_branch as usual.17:53
ayoungdolphm, here is the oslo fix17:53
ayounghttps://review.openstack.org/#/c/331916/17:53
ayoungdolphm, but then there is a follow on one for nova that looks like this: https://review.openstack.org/#/c/341905/17:54
ayoungI'm not certain if that is needed, or just a better way17:54
ayoungjamielennox, seemed to imply it was needed, but I can't quite track how17:55
knikollai think i want to pick up http://specs.openstack.org/openstack/keystone-specs/specs/keystone/backlog/service-providers-filters.html for ocata.17:55
*** adrian_otto has joined #openstack-keystone17:58
dolphmdavid-lyle: ayoung: thanks for your help - i have to run to a meeting, but that's given me a bunch of info to run with17:58
ayoungdolphm, YW17:59
david-lyledolphm: np, let me know what else we missed :)17:59
*** adrian_otto has quit IRC17:59
dolphmdavid-lyle: my next question will be about federation support :)18:00
david-lyledolphm: find lhcheng and bring him back18:00
david-lyleI'll do my best18:01
*** adrian_otto has joined #openstack-keystone18:04
*** slberger1 has joined #openstack-keystone18:04
*** slberger has quit IRC18:04
*** chrisshattuck has quit IRC18:10
*** chrisshattuck has joined #openstack-keystone18:11
*** dave-mcc_ has joined #openstack-keystone18:12
*** harlowja has joined #openstack-keystone18:13
*** dave-mccowan has quit IRC18:16
*** hello_world has joined #openstack-keystone18:17
*** adrian_otto has quit IRC18:17
*** hello_world is now known as Guest5929518:17
*** adrian_otto has joined #openstack-keystone18:18
Guest59295hi! Is there someone who can explain me how can I get project id by auth_url and auth_token?18:20
*** Marcellin__ has joined #openstack-keystone18:21
*** avozza has joined #openstack-keystone18:21
openstackgerritKristi Nikolla proposed openstack/keystone-specs: Move 'Service provider filters' to Ocata  https://review.openstack.org/37175418:22
*** adrian_otto has quit IRC18:23
Guest59295I went through these steps https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/v2_0/client.py#L135-L140 and then got http://paste.openstack.org/show/580216/18:23
*** spzala has quit IRC18:24
*** adrian_otto has joined #openstack-keystone18:24
*** ravelar has joined #openstack-keystone18:26
*** chlong_ has quit IRC18:27
*** avozza has quit IRC18:30
*** ddieterly[away] is now known as ddieterly18:30
*** spzala has joined #openstack-keystone18:33
*** spzala has quit IRC18:37
*** nisha_ has joined #openstack-keystone18:38
*** Guest59295 has quit IRC18:38
*** ravelar has quit IRC18:40
*** nishaYadav has quit IRC18:41
*** spzala has joined #openstack-keystone18:46
*** ravelar has joined #openstack-keystone18:46
*** nisha_ is now known as nishaYadav18:50
*** adrian_otto has quit IRC18:52
*** adrian_otto has joined #openstack-keystone18:55
*** adrian_otto has quit IRC18:55
*** adrian_otto has joined #openstack-keystone18:57
*** adrian_otto has quit IRC18:58
*** thiagolib has quit IRC18:58
*** jaosorior has quit IRC19:05
*** nishaYadav has quit IRC19:05
rodrigodsknikolla, regarding http://specs.openstack.org/openstack/keystone-specs/specs/keystone/backlog/service-providers-filters.html19:09
rodrigodsyou can take it :)19:10
rodrigods(if is there any work remaining to do)19:10
knikollarodrigods: any place i can see how much has been implemented or not? maybe a very old etherpad?19:12
rodrigodsknikolla, https://blueprints.launchpad.net/keystone/+spec/service-provider-filters19:12
*** ddieterly is now known as ddieterly[away]19:14
knikollarodrigods: only one of the reviews in the list there got merged19:15
rodrigodsknikolla, hmm so you should definitely take it!19:16
knikollarodrigods: cool. i'll add it to the list of topics for tuesday's meeting.19:18
rodrigods++19:18
*** ddieterly[away] is now known as ddieterly19:20
*** adrian_otto has joined #openstack-keystone19:20
rodrigodsdid something break kcs functional tests?19:23
*** spedione is now known as chris_hultin19:27
*** roxanaghe has quit IRC19:28
*** david-lyle has quit IRC19:30
*** david-lyle has joined #openstack-keystone19:30
*** roxanaghe has joined #openstack-keystone19:30
openstackgerritKristi Nikolla proposed openstack/keystone: WIP: Devstack plugin for Federation  https://review.openstack.org/32062319:31
*** adrian_otto has quit IRC19:32
*** adrian_otto has joined #openstack-keystone19:35
*** atod has joined #openstack-keystone19:38
*** roxanaghe has quit IRC19:38
*** adrian_otto has quit IRC19:39
*** esp has quit IRC19:40
*** nicolasbock has quit IRC19:42
*** david-lyle has quit IRC19:43
*** jpena|away is now known as jpena|off19:44
*** itsuugo has quit IRC19:50
*** itsuugo has joined #openstack-keystone19:50
*** ddieterly is now known as ddieterly[away]19:53
*** roxanaghe has joined #openstack-keystone19:55
openstackgerritKristi Nikolla proposed openstack/keystone: WIP: Devstack plugin for Federation  https://review.openstack.org/32062319:56
openstackgerritRichard Avelar proposed openstack/keystone: Reduce revoke events for disabled domains/projects  https://review.openstack.org/37116519:58
*** openstackstatus has quit IRC19:58
*** sdake has joined #openstack-keystone19:59
*** openstackstatus has joined #openstack-keystone20:00
*** ChanServ sets mode: +v openstackstatus20:00
*** slberger1 has quit IRC20:01
*** slberger has joined #openstack-keystone20:04
*** alex_xu has quit IRC20:04
*** alex_xu has joined #openstack-keystone20:07
openstackgerritRichard Avelar proposed openstack/keystone: Reduce revoke events for disabled domains/projects  https://review.openstack.org/37116520:07
*** atod has quit IRC20:08
*** chris_hultin is now known as spedione|AWAY20:08
*** dave-mcc_ has quit IRC20:11
*** ddieterly[away] is now known as ddieterly20:15
*** AndyWojo has quit IRC20:16
*** AndyWojo has joined #openstack-keystone20:17
*** Marcellin__ has quit IRC20:21
*** Marcellin__ has joined #openstack-keystone20:23
*** woodburn has left #openstack-keystone20:31
*** iurygregory has quit IRC20:32
*** dave-mccowan has joined #openstack-keystone20:33
lbragstadravelar hah - looks like we test this already https://github.com/openstack/keystone/blob/3b24a6fca67ff595b5e37fb020eea37717ab7ce1/keystone/tests/unit/test_v3_auth.py#L62320:37
*** sdake has quit IRC20:37
ravelarlbragstad haha nice, one less thing now20:37
lbragstadravelar and here - https://github.com/openstack/keystone/blob/3b24a6fca67ff595b5e37fb020eea37717ab7ce1/keystone/tests/unit/test_v3_auth.py#L99120:37
lbragstadyep!20:37
lbragstadravelar so that's the behavior we want to make sure we preserve20:37
*** dave-mccowan has quit IRC20:38
*** raildo has quit IRC20:38
lbragstadravelar another thing we can probably refactor once one of our patches merges is this - https://github.com/openstack/keystone/blob/3b24a6fca67ff595b5e37fb020eea37717ab7ce1/keystone/token/provider.py#L163-L16420:39
*** itsuugo has quit IRC20:40
lbragstadmerge*20:40
*** itsuugo has joined #openstack-keystone20:41
ravelarlbragstad sounds good to me, looking forward to cleaning this up more ha20:41
*** Marcellin__ has quit IRC20:47
*** gyee has quit IRC20:48
*** atod has joined #openstack-keystone20:49
*** spzala has quit IRC20:50
*** edmondsw has quit IRC20:51
*** ebalduf has joined #openstack-keystone20:55
*** sdake has joined #openstack-keystone20:55
*** itsuugo has quit IRC21:02
*** itsuugo has joined #openstack-keystone21:04
openstackgerritRichard Avelar proposed openstack/keystone: Reduce revoke events for disabled domains/projects  https://review.openstack.org/37116521:09
*** ravelar has quit IRC21:17
*** wasmum has quit IRC21:18
*** sdake has quit IRC21:20
*** wasmum has joined #openstack-keystone21:20
*** sdake has joined #openstack-keystone21:21
*** adrian_otto has joined #openstack-keystone21:21
*** ebalduf has quit IRC21:23
*** adrian_otto has quit IRC21:24
*** sdake has quit IRC21:25
*** spilla has quit IRC21:26
*** michauds has quit IRC21:28
lbragstadso...21:29
lbragstadthis confuses me https://github.com/openstack/keystone/blob/3b24a6fca67ff595b5e37fb020eea37717ab7ce1/keystone/tests/unit/token/test_backends.py#L466-L47321:29
lbragstadhow it is possible to create a token when the project you're scoping to doesn't exist?21:29
lbragstadO.o21:29
*** jaugustine has quit IRC21:30
lbragstador the user?!21:32
*** ddieterly is now known as ddieterly[away]21:33
*** ddieterly[away] is now known as ddieterly21:34
*** itsuugo has quit IRC21:43
*** itsuugo has joined #openstack-keystone21:44
*** slberger has left #openstack-keystone21:46
*** scarlisle has quit IRC21:55
*** ddieterly has quit IRC22:04
*** ravelar has joined #openstack-keystone22:05
*** ravelar has quit IRC22:06
*** gyee has joined #openstack-keystone22:16
*** itsuugo has quit IRC22:18
*** itsuugo has joined #openstack-keystone22:19
*** chrisshattuck has quit IRC22:21
*** ayoung_ has quit IRC22:24
ayounglbragstad, it was based on isolating the back ends.  Old stuff, and possibly from the termie time frame22:26
ayounglets see22:26
*** catintheroof has quit IRC22:31
*** markvoelker has quit IRC22:34
*** itsuugo has quit IRC22:39
*** itsuugo has joined #openstack-keystone22:41
*** chrisshattuck has joined #openstack-keystone22:44
*** chrisshattuck has quit IRC22:45
*** david-lyle has joined #openstack-keystone22:48
*** spzala has joined #openstack-keystone22:54
*** itsuugo has quit IRC22:55
*** itsuugo has joined #openstack-keystone22:56
*** erhudy has quit IRC23:02
*** itsuugo has quit IRC23:06
*** itsuugo has joined #openstack-keystone23:08
*** spzala has quit IRC23:20
*** atod has quit IRC23:43
openstackgerritMerged openstack/keystone: Ensure the sqla-migrate scripts cache is cleared  https://review.openstack.org/37107523:55

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!