Wednesday, 2016-11-02

*** guoshan has joined #openstack-keystone00:03
*** jperry has joined #openstack-keystone00:06
*** browne has quit IRC00:09
*** iurygregory_ has joined #openstack-keystone00:11
openstackgerritMerged openstack/keystoneauth: Add a service token wrapper  https://review.openstack.org/38480500:14
*** jerrygb has joined #openstack-keystone00:17
*** adrian_otto has joined #openstack-keystone00:17
openstackgerritSteve Martinelli proposed openstack/keystone: cache_on_issue default to true  https://review.openstack.org/38333300:18
openstackgerritSteve Martinelli proposed openstack/keystone: Allow running expand & migrate at the same time  https://review.openstack.org/39232000:19
*** jerrygb_ has joined #openstack-keystone00:20
*** richm has joined #openstack-keystone00:20
*** LamT__ has quit IRC00:22
*** jerrygb has quit IRC00:23
*** adrian_otto has quit IRC00:28
*** agrebennikov has quit IRC00:30
*** lamt has joined #openstack-keystone00:30
openstackgerritSteve Martinelli proposed openstack/keystone: Switch fernet to be the default token provider.  https://review.openstack.org/34568800:31
openstackgerritSteve Martinelli proposed openstack/keystone: Switch fernet to be the default token provider.  https://review.openstack.org/34568800:33
*** kiran-r has quit IRC00:43
*** kiran-r has joined #openstack-keystone00:48
openstackgerritTin Lam proposed openstack/keystone-specs: PCI-DSS Expired Password Users  https://review.openstack.org/38383200:50
*** jerrygb_ has quit IRC00:52
openstackgerritGage Hugo proposed openstack/keystone-specs: PCI-DSS Expired Password Users  https://review.openstack.org/38383200:57
*** hoangcx has joined #openstack-keystone01:01
*** guoshan has quit IRC01:05
*** Zer0Byte__ has quit IRC01:10
openstackgerritTin Lam proposed openstack/keystone-specs: PCI-DSS Expired Password Users  https://review.openstack.org/38383201:20
*** guoshan has joined #openstack-keystone01:24
*** guoshan has quit IRC01:31
*** guoshan has joined #openstack-keystone01:32
ayoungjamielennox, as I recall, termie -2ed that out of termieness01:35
*** adrian_otto has joined #openstack-keystone01:36
*** adrian_otto has quit IRC01:38
jamielennoxayoung: it was a giant patch from a fairly new contributor, i'm not bitter about it, but it was a good change01:42
*** richm has quit IRC02:00
*** jerrygb has joined #openstack-keystone02:05
openstackgerritChangBo Guo(gcb) proposed openstack/oslo.policy: Add missing parameter description in module _cache_handler  https://review.openstack.org/38791702:39
stevemarayoung: jamielennox what did he -2?02:44
jamielennoxstevemar: oh, a test refactor i did years ago02:45
stevemarah02:45
ayoungstevemar, and it was out of spite, too.  Just nasty02:46
ayoungHe was concerned about things getting overly complicated, and didn't want the tests moved out of the top level directory (they were not under keystone/keystone back then) either02:47
ayoungthen he disappeared02:47
stevemar:)02:47
stevemargood times02:47
ayoungjamielennox, did you catch my whole spiel during the meeting today?02:48
jamielennoxayoung: no i haven't looked at the meeting this morning02:48
ayoungI think I have a solution to most of the remaining issues with RBAC split from the rest of policy02:48
jamielennoxayoung: have been distracted02:48
ayoungYou;ll either love it or hate it02:48
ayoungbut it does remove the need to return the role with the failed attempt.02:49
ayounghttps://review.openstack.org/#/c/391624/02:49
jamielennoxif it's what i think it is, it was something i had involved in reservations and has a huge caching problem02:49
ayoungI know you want to Nuke Policy from Orbit, and this does not do that02:49
ayoungno. no caching02:49
ayoung the role check is in Keystone02:49
ayoungyou pass the URL to Keystone to do the role check02:50
ayoungI added 2 params to the token validate call02:50
ayoungservice=compute and then the URL itself02:50
stevemarnuke policy from orbit, thats pretty much what i want to do02:50
ayoungthen use routes.Mapping style matching to figure out what rule to apply02:51
openstackgerritSteve Martinelli proposed openstack/keystone: cache_on_issue default to true  https://review.openstack.org/38333302:51
jamielennoxthis is kind of what alexander wanted right? actually do the policy check in keytsone02:52
ayoungjamielennox, Oh and I added verb=PUT  too02:52
ayoungjamielennox, yeah, I think so02:52
ayoungI have trouble understanding his writing.  Let me go look at his again,02:52
jamielennoxso at least with reservations i combined that step with token validate, because there's no reason to ask keystone for the token info and then ask it again to validate the roles in the tokne02:53
ayoungI think he was going further than I was02:53
ayoungjamielennox, that was why I put it all into the validate_token call02:54
ayoung   curl02:54
ayoung     -H "X-Auth-Token:    3d0b48b7bcdd"  \02:54
ayoung     -H "X-Subject-Token: adb5c708a55f"  \02:54
ayoung     -H "Content-type: application/json" \02:54
ayoung     -H "X-Request-URL: https://nova1:8774/v2.1/2497f6​/servers/​83cbdc \02:54
ayoung     GET \02:54
ayoung     https://keystone1:35357/v3/auth/tokens?service=compute&verb=PUT&nocatalog=True02:54
ayoungI put the request URL in a header for security reasons02:55
openstackgerritAdrian Turjak proposed openstack/keystone-specs: User self management of TOTP credentials  https://review.openstack.org/34570502:55
ayoungthe others go as Request Params02:55
ayoungdoing it as a POST would probably be better, but I didn't want to add a new API02:56
ayoungjamielennox, the actual enforcement would be based on the role inference rules.02:56
openstackgerritAdrian Turjak proposed openstack/keystone-specs: User self management of TOTP credentials  https://review.openstack.org/34570502:56
*** dave-mccowan has quit IRC02:57
jamielennoxso middleware is only passing url and standard http things02:57
jamielennoxso still a owner problem, but not a big deal02:57
ayoungso what we would have to set up would be rules like:  Member implies "COMPUTE PUT /v2.1/{id}/servers/​{id}"02:57
ayoungowner (scoping) is still done by existing policy mechanism02:58
jamielennoxyep02:58
ayoungand we work to move that into code like Nova did02:58
jamielennoxso reservations used something like this extensively02:58
jamielennoxand the killer for reservations (after being unnecessary) was it was uncacheable02:58
ayoungIf horizon wants to query operations for a role, they can use the Keystone API now to do it, or what roles are needed for an operation02:58
jamielennoxalso horizon needs a bulk query - not a one off02:59
ayoungnot as restful as what we discussed this summit, but should make the security-concerns go away02:59
ayoungyep02:59
ayoungso nova would have a single config file that gets uploaded with a bunch of rules in it03:00
ayoungand then the admins can modify those as they see fit03:00
jamielennoxso my version of this always maintained an out of band policy check for this rather that do it via keystone03:01
*** iurygregory_ has quit IRC03:02
jamielennoxmostly cause i don't mind if keysotne controls this and i didn't want to figure out the policy API :)03:02
ayoungYou OK with this approach, then?03:02
ayoungWe can axe the policy API03:02
ayoungI am not going to use it03:02
ayoungthis is going to be an extension of the roles API03:02
jamielennoxso i mean the high level concept is always what we've been moving towards, auth_token=PEP, something else=PDP03:04
jamielennoxand we should be calling that from either auth_token middleware or another middleware03:04
jamielennoxi'm not sure that something else should be keystone or something a bit faster03:04
ayoungBut faster is getting it down to one remote call, no?03:05
jamielennoxmostly i've been trying to encourage things to move in that direction, split role enforcement from owner enforcement and hopefully move people to url based policy enforcement03:05
jamielennoxdepends03:05
ayoungthis does all that03:05
jamielennoxdepends how heavily your deployment utilizes token caching03:06
jamielennoxand my understanding is most do it a lot03:06
ayoungyeah, we'd have to deal with that03:06
jamielennoxso you can cache tokens and then do the call independantly if you can speed up the policy03:07
jamielennoxor you can do it all in one step03:07
ayoungthe case that would hurt is where the same token is used for multiple, different calls03:07
jamielennoxyep03:07
ayoungfor the same call, we could cache.  We could also optimize the cache on keystone for rapid subsequent calls of the same token but different URLs03:08
jamielennoxi think the exact same call is unlikely when you starting putting object ids in the url03:09
ayounghmmm....we could do the URL to pattern parsing in middleware, to strip out the object IDs03:10
*** adrian_otto has joined #openstack-keystone03:10
jamielennoxdid i have this conversation with you at summit or someone else?03:10
ayoungsomeone else03:10
jamielennoxthe problem with regexp in middleware is there's no way to make it a key lookup03:10
jamielennoxso you have to scan big lists of urls to do policy match via url03:10
ayoungright...I say punt on caching for the first approximation03:11
ayoungactually, the same problem exists in Keystone.  And, since the services need to do it a second time for the actual logic, we pay twice for it03:11
ayoungI don;'t know how to work around that, though03:11
ayoungI mean, in Keystone we could optimize...03:12
ayoungbut that is cheating03:12
jamielennoxright, but if you intermingle that regexp policy list with token validation and remove caching i don't know if we can handle the performance hit03:12
jamielennoxhence my last proposal was token caching and small localized policy enforce checks03:12
jamielennoxbut we have no data for any of this03:13
jamielennoxi'll admit i was hoping in like 6 months or so i'd have a nice big platform to test this sort of thing out on, and i won't anymore03:14
ayoungyeah03:16
ayoungwell,  distributed Keystone should be a reality for this03:16
*** jperry has quit IRC03:16
jamielennoxayoung: my point is - i don't disagree and i think something like this is the right way to do dynamic policy there are just some big performance issues here that we haven't had to deal with yet03:17
jamielennoxi'm not sure keystone today can handle it03:17
ayoungDo you really think that many tokens hit cache?  I guess they probably do in Horizon driven workloads03:18
jamielennoxbut i think everything we're doing is working towards this, splitting role & url enforcement from ownership enforcement03:18
jamielennoxi think they do03:19
ayoungSo we are going to hammer Keystone in the token validation pipeline03:19
jamielennoxeveryone complains about CLI not reusing tokens (being fixed), but most communication is done service to service and they should be fairly good at token reuse03:19
ayoungknowing that two URLs would hit the same policy rule would go a long way to mitigate the hammer03:20
ayoungor that any two APIs hit the same role, for that matter03:20
ayoungthe validation could pass back a set of matching patterns and say "these all would match, too"03:21
jamielennoxthis is the sort of thing i thought we could control better via a unix socket or something to a local process rather than stick it all on a request03:24
ayoungis a remote call to Keystone with a cache that much worse?  I guess we hit apache and the whole wsgi pipeline there03:26
jamielennoxdepends03:26
jamielennoxa) i don't know03:26
openstackgerritayoung proposed openstack/keystone-specs: Token Verify Role Check  https://review.openstack.org/39162403:26
jamielennoxb) in my mind this was a small dedicated, possibly not python process that did local communications from in-memory policy info03:27
ayoungWe could still do that. Maybe as a performance tune afterwards03:27
jamielennoxpolicy distribution was handling internally in any number of ways03:27
ayoungAll the info we want is still queryable03:27
ayoungthe service already has the token's auth data03:28
ayoungso the local process queries the rules from Keystone and applies them locally03:28
ayoungPhase 2 that as a performance tune03:28
jamielennoxit's a different model though03:29
jamielennoxwhether you put it as token validation or a seperate step03:29
ayoungWell, there is the possiblity that the first token validation would fail due to RBAC but that is not a deal breaker03:30
ayoungwe could provide sufficient information to the service so it knows the difference, and does not try to re-validate if the token itself is bad03:30
ayoungDon't seriously see that as a problem, though03:31
ayoungOK...off to bed.  THanks for the input.03:37
*** markvoelker has quit IRC03:41
*** lifeless has quit IRC03:41
jamielennoxayoung: lots more to talk about03:42
*** lifeless has joined #openstack-keystone03:42
*** g2[cubs-ATL] is now known as g203:48
*** lamt has quit IRC03:48
*** nicolasbock has quit IRC03:59
*** guoshan has quit IRC04:03
morgan_jamielennox: you're still on the other side of the world eh... I can tell because youre talking at weird times west coast.04:12
jamielennoxmorgan_: i'm in my regular timezone04:12
jamielennoxso yes, the otherside of the world, but not the otherside of the world i was in last week :)04:13
jamielennoxmorgan_: oh! i'm going to be in portland on sunday/monday - beer?04:14
*** jerrygb has quit IRC04:19
*** ravelar has joined #openstack-keystone04:21
*** jerrygb has joined #openstack-keystone04:24
*** chlong has quit IRC04:24
*** ravelar has quit IRC04:26
*** ravelar has joined #openstack-keystone04:27
*** ravelar has quit IRC04:31
*** markvoelker has joined #openstack-keystone04:42
*** markvoelker has quit IRC04:48
morgan_jamielennox: i fly out on Tuesday, but yes. beer in PDX on sunday04:52
jamielennoxmorgan_: great - i'm flying out tuesday too, i'll let you know what's happening, catching up with greg and others for some time too04:53
morgan_jamielennox: nice.04:53
morgan_yeah def ping me04:54
*** hoangcx has quit IRC04:54
jamielennoxmorgan_: got a whatsapp or hangouts or something?04:54
morgan_yeah hangouts and whatsapp04:55
jamielennoxmorgan_: or i can twitter dm i guess. i need to figure out a better phone IRC than i have04:55
morgan_twtter = badd choice too04:55
morgan_use sms, whatsapp, or hangouts04:55
jamielennoxmorgan_: msg me a phone number04:55
morgan_just did04:55
jamielennoxmorgan_: cool, msg sent, i wasn't planning on having data - didn't expect to need it - but i'll let you know what's happening04:58
morgan_greg can also poke at me04:58
*** jerrygb has quit IRC05:03
*** guoshan has joined #openstack-keystone05:03
*** jerrygb has joined #openstack-keystone05:06
*** guoshan has quit IRC05:07
*** sheel has joined #openstack-keystone05:33
*** jerrygb has quit IRC05:53
*** jerrygb has joined #openstack-keystone05:57
*** guoshan has joined #openstack-keystone06:04
*** guoshan has quit IRC06:09
*** adriant has quit IRC06:11
*** guoshan has joined #openstack-keystone06:21
*** jerrygb has quit IRC06:22
openstackgerritNITIN GUPTA proposed openstack/keystone: Added test cases for hints  https://review.openstack.org/38854106:23
*** jerrygb has joined #openstack-keystone06:27
*** namnh has joined #openstack-keystone06:27
*** adrian_otto has quit IRC06:37
*** markvoelker has joined #openstack-keystone06:44
*** dikonoor has joined #openstack-keystone06:47
*** dikonoor has quit IRC06:48
*** markvoelker has quit IRC06:50
*** rcernin has joined #openstack-keystone06:50
*** dikonoor has joined #openstack-keystone06:53
*** tobberydberg has joined #openstack-keystone07:01
*** LiYuenan has joined #openstack-keystone07:01
*** jerrygb has quit IRC07:06
*** belmoreira has joined #openstack-keystone07:09
*** jerrygb has joined #openstack-keystone07:10
*** tesseract has joined #openstack-keystone07:17
*** tesseract is now known as Guest4871207:17
openstackgerritAbhishek Kekane proposed openstack/keystoneauth: Log request-id for each api call  https://review.openstack.org/39244207:30
*** jerrygb has quit IRC07:42
*** jerrygb has joined #openstack-keystone07:46
*** openstackgerrit has quit IRC07:48
*** openstackgerrit has joined #openstack-keystone07:48
*** jerrygb_ has joined #openstack-keystone07:50
*** jerrygb has quit IRC07:52
*** jerrygb has joined #openstack-keystone07:56
*** jerrygb_ has quit IRC07:58
*** zzzeek has quit IRC08:00
*** zzzeek has joined #openstack-keystone08:01
*** jerrygb has quit IRC08:08
*** pcaruana has joined #openstack-keystone08:09
*** markvoelker has joined #openstack-keystone08:13
*** jerrygb has joined #openstack-keystone08:13
*** markvoelker has quit IRC08:19
*** jerrygb_ has joined #openstack-keystone08:27
*** xek__ is now known as xek08:28
*** jerrygb has quit IRC08:29
*** mdovgal has quit IRC08:42
*** jaosorior has joined #openstack-keystone08:45
*** jpich has joined #openstack-keystone08:47
*** haplo37 has quit IRC08:51
*** haplo37_ has joined #openstack-keystone08:54
*** GB21 has joined #openstack-keystone08:55
*** jerrygb_ has quit IRC09:08
*** jerrygb has joined #openstack-keystone09:12
*** jaosorior has quit IRC09:14
*** jaosorior has joined #openstack-keystone09:14
*** GB21 has quit IRC09:15
*** kiran-r has quit IRC09:23
openstackgerritNITIN GUPTA proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854109:38
*** markvoelker has joined #openstack-keystone09:41
*** markvoelker has quit IRC09:46
*** jaosorior has quit IRC09:48
*** guoshan has quit IRC09:48
*** jaosorior has joined #openstack-keystone09:49
*** guoshan has joined #openstack-keystone09:49
*** jerrygb has quit IRC09:54
*** jerrygb has joined #openstack-keystone09:58
*** jaosorior is now known as jaosorior_lunch10:08
*** LiYuenan has quit IRC10:21
*** guoshan has quit IRC10:28
openstackgerritNITIN GUPTA proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854110:38
*** guoshan has joined #openstack-keystone10:46
*** namnh has quit IRC10:48
*** pnavarro has joined #openstack-keystone11:00
*** GB21 has joined #openstack-keystone11:15
*** nicolasbock has joined #openstack-keystone11:15
*** jaosorior_lunch is now known as jaosorior11:21
*** daemontool has joined #openstack-keystone11:25
*** GB21 has quit IRC11:33
*** Administrator__ has quit IRC11:34
*** Administrator__ has joined #openstack-keystone11:35
*** dave-mccowan has joined #openstack-keystone11:35
*** zhugaoxiao has joined #openstack-keystone11:37
*** Administrator__ has quit IRC11:40
*** markvoelker has joined #openstack-keystone11:42
openstackgerritNITIN GUPTA proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854111:45
*** jperry has joined #openstack-keystone11:46
*** markvoelker has quit IRC11:46
*** guoshan has quit IRC11:56
*** guoshan has joined #openstack-keystone12:08
*** jperry has quit IRC12:10
*** edmondsw has joined #openstack-keystone12:21
*** jvarlamova has quit IRC12:34
*** jvarlamova has joined #openstack-keystone12:34
*** markvoelker has joined #openstack-keystone12:41
*** jerrygb has quit IRC12:42
*** jerrygb has joined #openstack-keystone12:45
*** sheel has quit IRC13:00
*** haplo37_ has quit IRC13:07
*** haplo37_ has joined #openstack-keystone13:09
*** prashkre has joined #openstack-keystone13:14
*** jperry has joined #openstack-keystone13:18
*** iurygregory_ has joined #openstack-keystone13:29
*** ktychkova has joined #openstack-keystone13:34
*** agrebennikov has joined #openstack-keystone13:38
*** adrian_otto has joined #openstack-keystone13:39
openstackgerritayoung proposed openstack/keystone-specs: Token Verify Role Check  https://review.openstack.org/39162413:40
*** adrian_otto1 has joined #openstack-keystone13:41
*** rodrigods has quit IRC13:43
*** rodrigods has joined #openstack-keystone13:43
*** adrian_otto has quit IRC13:44
jvarlamova@dolphm Hi Dolph! Could you please tell what are plans of the Keystone community regarding multinode grenade job for upgradability testing? Is anyone already working on it?13:46
*** adrian_otto1 has quit IRC13:47
*** adrian_otto has joined #openstack-keystone13:48
*** edtubill has joined #openstack-keystone13:49
*** LamT__ has joined #openstack-keystone13:51
*** jaosorior has quit IRC13:53
*** guoshan has quit IRC14:00
*** GB21 has joined #openstack-keystone14:01
lbragstadjvarlamova o/14:05
jvarlamovalbragstad: hi14:05
lbragstadjvarlamova dolphm is out for the rest of the week - but I don't think he has anything laid down yet for the multinode stuff14:06
lbragstadjvarlamova (i'm kind of illiterate when it comes to the multi-node grenade approach) did you have any approaches in mind on how you'd start?14:07
*** guoshan has joined #openstack-keystone14:09
*** chris_hultin|AWA is now known as chris_hultin14:11
*** bjolo_ has joined #openstack-keystone14:12
openstackgerritNITIN GUPTA proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854114:16
lbragstadstevemar your pki patch merged ;)14:19
stevemarlbragstad: i noticed!14:19
stevemarlbragstad: i was kinda surprised )14:19
stevemar:)14:19
lbragstadme too14:19
lbragstadin a good way14:19
lbragstadI was wondering why all my token refactor patches had merge conflicts14:20
stevemar:)14:20
knikollao/14:21
jvarlamovalbragstad: This need to be discussed:) We cannot test Keystone in the same way as other projects. Probably we need to deploy multi-controller OpenStack with 2 Keystones and then upgrade one of them. But I saw discussion http://lists.openstack.org/pipermail/openstack-dev/2016-February/085781.html, it was an idea of just testing how Keystone stable works with master DB. Maybe it would be enough? What's your opinion?14:22
*** guoshan has quit IRC14:23
openstackgerritLance Bragstad proposed openstack/keystone: Remove format_token method  https://review.openstack.org/38936414:30
openstackgerritLance Bragstad proposed openstack/keystone: Remove issue_v2_token  https://review.openstack.org/38676214:30
openstackgerritLance Bragstad proposed openstack/keystone: Remove metadata from token provider  https://review.openstack.org/38936514:30
openstackgerritLance Bragstad proposed openstack/keystone: Remove issue_v3_token in favor of issue_token  https://review.openstack.org/38683714:30
openstackgerritLance Bragstad proposed openstack/keystone: Clarify the v2.0 validation path  https://review.openstack.org/38936614:30
openstackgerritLance Bragstad proposed openstack/keystone: Use issue_v3_token instead of issue_v2_token  https://review.openstack.org/38666514:30
openstackgerritLance Bragstad proposed openstack/keystone: refactor the token controller  https://review.openstack.org/38672614:30
openstackgerritLance Bragstad proposed openstack/keystone: Remove the v2.0 validate path from validate_token  https://review.openstack.org/38937114:30
lbragstadjvarlamova that sounds like it would work14:31
lbragstadjvarlamova the multi-node testing it only testing master -1 and upgrading to master, right?14:31
*** daemontool has quit IRC14:31
*** daemontool has joined #openstack-keystone14:32
lbragstader.. latest stable branch and upgrading it to master14:33
openstackgerritLance Bragstad proposed openstack/keystone: Move V2TokenDataHelper to the v2.0 controller  https://review.openstack.org/38938314:34
jvarlamovalbragstad: <the multi-node testing it only testing master -1 and upgrading to master, right> yes, master-1, and master14:35
jvarlamovalbragstad: <that sounds like it would work> do you mean multi-node testing?14:36
*** narasimha_SV has joined #openstack-keystone14:37
lbragstadjvarlamova right - from an infrastructure perspective I think all we would need would be a controller node (with all default services enabled - assuming keystone is in that list) and another devstack node (that really only just needs keystone, mysql, etc enabled)14:38
lbragstadthen the bits to tie the two together14:38
*** dikonoor has quit IRC14:40
dstanekjvarlamova: I think that's a good start14:40
*** prashkre has quit IRC14:41
*** jaosorior has joined #openstack-keystone14:41
*** dmellado is now known as dmellado|lunch14:42
lbragstadluckily - keystone doesn't require other services in order to run... so standing up the second node shouldn't be too bad14:43
morgan_lbragstad: heh.14:43
morgan_lbragstad: famous last words14:43
lbragstadmorgan_ i know, right?14:43
lbragstad"they said it would be easy" - http://www.memecreator.org/static/images/templates/1321291.jpg14:45
*** guoshan has joined #openstack-keystone14:48
jvarlamovalbragstad: <a controller node (with all default services enabled - assuming keystone is in that list) and another devstack node (that really only just needs keystone, mysql, etc enabled)> agree14:49
lbragstadjvarlamova do you know if the multi-node deployments are orchestrated with something?14:49
lbragstadlike ansible?14:49
dstanekmorgan_: you're a debbie downer14:53
morgan_dstanek: shhhhhhhhh14:53
jvarlamovalbragstad: actually I don't know. But I could create a BP related to multinode job and start doing investigation in this direction.14:53
lbragstadjvarlamova that would be awesome14:56
jvarlamovalbragstad: ok14:56
lbragstadjvarlamova thanks for taking the initiative on this :)14:56
lbragstadjvarlamova dolphm has an interest in this work, too.. but he'll be back on Monday I think14:56
jvarlamovalbragstad: no problem14:57
*** daemontool has quit IRC14:58
*** guoshan has quit IRC14:59
jvarlamovalbragstad: I'll get in touch with him on Monday15:01
lbragstadjvarlamova great!15:01
*** Zer0Byte__ has joined #openstack-keystone15:03
*** sdoherty has joined #openstack-keystone15:11
*** sdoherty has left #openstack-keystone15:12
*** browne has joined #openstack-keystone15:13
*** guoshan has joined #openstack-keystone15:13
*** ravelar has joined #openstack-keystone15:13
*** woodster_ has joined #openstack-keystone15:21
*** guoshan has quit IRC15:23
openstackgerritOpenStack Proposal Bot proposed openstack/oslo.policy: Updated from global requirements  https://review.openstack.org/39281015:39
openstackgerritOpenStack Proposal Bot proposed openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/39282115:40
*** woodburn has joined #openstack-keystone15:46
*** dmellado|lunch is now known as dmellado15:47
*** Zer0Byte__ has quit IRC15:48
*** adrian_otto has quit IRC15:53
*** adrian_otto has joined #openstack-keystone16:01
*** narasimha_SV has quit IRC16:01
*** tobbery__ has joined #openstack-keystone16:02
*** adrian_otto has quit IRC16:02
*** anushkrishnamurt has joined #openstack-keystone16:02
*** tobberydberg has quit IRC16:06
*** pcaruana has quit IRC16:06
*** tobbery__ has quit IRC16:06
openstackgerritRichard Avelar proposed openstack/keystone: Remove unused statements in matches  https://review.openstack.org/38754816:09
*** rcernin has quit IRC16:09
*** spilla has joined #openstack-keystone16:13
*** adrian_otto has joined #openstack-keystone16:22
*** jaosorior has quit IRC16:28
*** bjolo_ has quit IRC16:31
openstackgerritDavid Stanek proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854116:33
*** Guest48712 has quit IRC16:34
lbragstadbreton are you still working https://bugs.launchpad.net/python-keystoneclient/+bug/1520244 ?16:35
openstackLaunchpad bug 1520244 in python-keystoneclient "flag "truncated" in responses to list operations is not supported" [Medium,Triaged] - Assigned to Boris Bobrov (bbobrov)16:35
lbragstadbreton or can I unassign in case someone else has bandwidth to pick it up?16:36
*** dikonoor has joined #openstack-keystone16:36
dstanek^ that one should be a relatively easy one16:36
bretonlbragstad: yes, i do. But we decided that i will wait for https://review.openstack.org/#/c/267456/16:37
*** pnavarro has quit IRC16:38
lbragstadbreton got it - was that something that was decided at the summit?16:39
lbragstador was that in a meeting?16:39
*** ayoung has quit IRC16:40
bretonlbragstad: we decided it... a year ago in a meeting16:40
*** anushkrishnamurt has quit IRC16:40
lbragstadbreton ah - cool16:41
lbragstadso https://review.openstack.org/#/c/267456/ will have to be a prerequisite for fixing that bug?16:41
bretonlbragstad: kinda. I'll take the same approach as there.16:41
lbragstadwill https://review.openstack.org/#/c/267456/ close that bug?16:42
bretonlbragstad: no.16:43
*** LamT__ has quit IRC16:52
*** belmoreira has quit IRC16:53
openstackgerritDavid Stanek proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854116:56
openstackgerritRichard Avelar proposed openstack/keystone: Fix test_revoke to run all tests after pki removal  https://review.openstack.org/39288316:56
openstackgerritRichard Avelar proposed openstack/keystone: Fix test_revoke to run all tests after pki removal  https://review.openstack.org/39288316:58
*** xarses has joined #openstack-keystone17:01
*** LamT__ has joined #openstack-keystone17:02
openstackgerritSteve Martinelli proposed openstack/python-keystoneclient: Support domain-specific configuration management  https://review.openstack.org/35877017:03
stevemarlbragstad: thanks for updating the domain config bug17:04
*** ravelar has quit IRC17:04
stevemarrodrigods: fyi -- https://review.openstack.org/#/c/358770/ needs an update to functional tests17:04
xarsesI'm having some problems with the openstack client and auth under a v3 policy highly similar to https://github.com/openstack/keystone/blob/master/etc/policy.v3cloudsample.json. I can auth the user with --os-user-domain and it can do admin operations, but the compute endpoint is missing from catalog, where if I include --os-project-name it is, but then I can't do admin things with out building another auth context.17:09
*** adrian_otto has quit IRC17:11
knikollastevemar: about removing ldap write support, any ideas on the approach to take about unit tests? i've been slowly poking at it for a while now but layer upon layer of the unit tests assumes write access to the identity_api.17:11
xarsesJust to be extra annoying, the openstack client --debug between me and a co-worker, on the same host, with the same creds and evn (ostensibly) theirs will print the body of the token response, and mine will not17:11
*** jaosorior has joined #openstack-keystone17:13
knikollagoing all the way down to core.py https://github.com/openstack/keystone/blob/master/keystone/tests/unit/core.py#L74717:14
openstackgerritMerged openstack/oslo.policy: Updated from global requirements  https://review.openstack.org/39281017:15
openstackgerritDavid Stanek proposed openstack/keystone: Add test cases for passing "None" as a hint  https://review.openstack.org/38854117:18
openstackgerritMerged openstack/keystoneauth: Updated from global requirements  https://review.openstack.org/39273317:19
*** harlowja has quit IRC17:21
*** Marcellin__ has joined #openstack-keystone17:30
dstanekknikolla: you will probably have to fake the write access in the setup17:32
knikolladstanek: subclass a writeable driver, or monkeypatch?17:35
openstackgerritKam Nasim proposed openstack/keystone: Network conn timeout on Identity LDAP backend  https://review.openstack.org/39094817:37
morgan_dstanek: i'd argue the answer is break out the ldap write tests17:37
morgan_dstanek: and only run them on SQL/non-ldap17:37
morgan_dstanek: rather than "mocking" write capability17:37
morgan_knikolla: ^ cc17:37
morgan_erm the identiy write tests17:38
morgan_also lining things into setUp instead of calling identity_api17:38
morgan_so it does direct writes in the case of LDAP setup17:39
knikollamorgan_: that was my approach too, but even load_fixtures expects to be able to call create_users17:39
morgan_knikolla: work around it. if you need to install data in fixtures, directly populate the data.17:40
dstanekmorgan_: you'll still need to write data somehow in order to read it17:42
morgan_i am not sure the best plan though. you could mock it out but... i think that we should work to provide a way to directly populate17:42
morgan_not assuming you have write access via identity_api17:42
openstackgerritKam Nasim proposed openstack/keystone: Network conn timeout on Identity LDAP backend  https://review.openstack.org/39094817:43
dstanekmy though is that the tests would create a "fake" implementation of the API that would populate the data store17:43
dstanekwe already have an api for adding the data - we just don't have a way to do it in this particular case17:43
lbragstadstevemar no problemo17:44
*** harlowja has joined #openstack-keystone17:44
openstackgerritMerged openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/39282117:45
*** jpich has quit IRC17:47
knikolladstanek: will see what i can do. i'll poke at it longer and then maybe add it to next weeks agenda.17:48
dstanekknikolla: which review is it?17:49
*** pnavarro has joined #openstack-keystone17:50
knikolladstanek: https://review.openstack.org/#/c/374482/17:50
dstanekknikolla: another option is to override load_fixtures to preload the backend17:50
knikolladstanek: steve's orignal attempt removed every single line of ldap code related to writing. most of that will probably have to go back in if we're mocking.17:50
openstackgerritMerged openstack/keystone: Updated from global requirements  https://review.openstack.org/39273217:51
*** ravelar has joined #openstack-keystone17:52
stevemarknikolla: yeah, my bad. i went down the rabbit hole way too far17:54
stevemarknikolla: sucks that we'll need to leave code around only for setting up data for tests17:55
knikollastevemar: no worries. if we could preload the fixtures we might avoid that. ldapdb is faked in sql right?17:56
morgan_knikolla: afaik in memory17:56
morgan_not in sql17:56
morgan_but... i also might be mis-remembering17:57
*** dikonoor has quit IRC17:58
knikollamorgan_: you're right. it's shelve17:59
morgan_knikolla: so, it should be possible to at least maintain part of the fixture (move the write bits into the fixture?)18:00
*** andreww has joined #openstack-keystone18:01
knikollamorgan_: by moving into the fixture you mean load the fixture already written?18:02
morgan_knikolla: make the fixture handle the write, if the backend is lddapdb, write via the methods to handle writes18:03
morgan_or make the fixture mock ldapdb write interactions18:03
morgan_you don't want to globally mock write or keep the write capabilities in the dirver18:03
morgan_otherwise you end up with possible continued write in production18:04
morgan_or partial wtites18:04
*** xarses has quit IRC18:04
dstaneki don't know that the fixture should mock the write api - that's better done with a fake implementation18:04
morgan_ideally we would populate the SQL and shelve data independant of identity_api unless you are explicitly testing write functionality18:04
dstaneka fake impl wouldn't have be be at detailed at the code we are deleting18:04
* morgan_ shrugs18:05
*** haplo37_ has quit IRC18:05
*** haplo37_ has joined #openstack-keystone18:08
* knikolla going for lunch18:08
knikollai have enough info to give it another go after lunch18:09
*** adriant has joined #openstack-keystone18:16
*** openstackgerrit has quit IRC18:18
*** openstackgerrit has joined #openstack-keystone18:18
*** andreww has quit IRC18:21
*** GB21 has quit IRC18:24
*** jperry has quit IRC18:27
*** pnavarro has quit IRC18:27
*** jperry has joined #openstack-keystone18:28
openstackgerritRichard Avelar proposed openstack/keystone: Fix test_revoke to run all tests after pki removal  https://review.openstack.org/39288318:33
*** rocketballs has joined #openstack-keystone18:40
*** rocketballs has left #openstack-keystone18:45
*** jperry has quit IRC18:52
*** jperry has joined #openstack-keystone18:53
*** lamt has joined #openstack-keystone19:04
*** prometheanfire has joined #openstack-keystone19:06
*** knikolla has left #openstack-keystone19:12
*** knikolla has joined #openstack-keystone19:12
*** knikolla has left #openstack-keystone19:13
*** andreww has joined #openstack-keystone19:13
*** knikolla has joined #openstack-keystone19:13
*** andreww has quit IRC19:13
prometheanfireroles are domain wide, admin in domain1 cannot view users in domain2?19:14
prometheanfireor if they can view, cannot change?19:14
*** jerrygb has quit IRC19:21
*** jerrygb has joined #openstack-keystone19:22
stevemarprometheanfire: roles are global actually19:22
prometheanfireya, talking to dstanek about it now19:23
prometheanfireseems like I'm SOL19:23
prometheanfiredstanek: might as well talk here19:25
prometheanfireas far as I can tell roles are domain specific, but the admin role is still admin everywhere19:26
*** jerrygb has quit IRC19:26
dstanekadmin is more of a cloud admin19:26
*** lamt has quit IRC19:27
dstanekthis is something that i'm hoping our policy discussions will work out19:27
*** ayoung has joined #openstack-keystone19:34
*** ChanServ sets mode: +v ayoung19:34
jamielennoxergh, god i hate the request-id thing19:35
jamielennoxhaving to log every link from request to created requests took an easy debugging idea and screwed it for everyone19:37
*** jerrygb has joined #openstack-keystone19:42
jamielennoxstevemar: does https://review.openstack.org/#/c/392442/1 seem reasonable to you? i want to ask someone because we are now going to add another debug log entry for every client request19:43
jamielennox"We have made these changes in python-glanceclient, python-cinderclient, python-novaclient and python-neutronclient." - gah, how is fixing keystoneauth so far down this list19:44
*** rcernin has joined #openstack-keystone19:45
stevemarjamielennox: i'm not a huge fan of it19:46
*** raj_singh has joined #openstack-keystone19:46
jamielennoxstevemar: neither, but if its correct that they've already got those clients support, and have already put it through the ML19:47
jamielennoxthe only name i recognize from the mail chain is dhellmann who seems skeptical19:47
*** dave-mcc_ has joined #openstack-keystone19:47
jamielennoxignoring the fact i don't like the code, they've done everything right it just seems to me it is a whole lot more logging19:47
*** dave-mccowan has quit IRC19:48
jamielennoxand god i hate the request-id linking thing19:48
stevemaruep19:48
stevemaryep19:48
raj_singhjamielennox: I have WIP spec up for Nova to use "Allow expired user token" functionality. https://review.openstack.org/#/c/38771119:50
prometheanfireit doesn't look like assigning admin to a group helps either19:53
jamielennoxraj_singh: oh cool,19:54
jamielennoxraj_singh: did you see https://review.openstack.org/#/c/384805/19:54
raj_singhlooking19:54
jamielennoxdamn, looks like it just missed being a part of the last release19:56
*** adrian_otto has joined #openstack-keystone19:56
*** openstack has joined #openstack-keystone19:58
raj_singhjamielennox: Is there any functional test or sample to test the full path? Like creating a service token and passing it along with expired user token?19:58
jamielennoxraj_singh: not really :)19:58
jamielennoxraj_singh: do you have a WIP for nova?19:58
jamielennoxif not i can do a full end-to-end19:59
raj_singhnot yet, I will try to have something this week or early next week. I might ping you for some details around that.19:59
jamielennoxraj_singh: ok, i was just thinking if you had something i would look at modifying that, but i can write you a script that will load and send stuff20:00
raj_singhjamielennox: that will be nice!20:00
jamielennoxraj_singh: i'll try and get that done today and put it on a paste somewhere, you have an irc bouncer or want me to email you a link?20:04
raj_singhI do have a bouncer20:04
jamielennoxcool, i'll just link you to it later then20:05
raj_singhBut do shoot me an email on sarafraj.singh@intel.com if you don't mind20:05
*** anushkrishnamurt has joined #openstack-keystone20:05
jamielennoxok20:05
*** gagehugo has quit IRC20:07
*** anushkrishnamurt has quit IRC20:09
*** knikolla has left #openstack-keystone20:11
*** knikolla has joined #openstack-keystone20:11
*** xarses has joined #openstack-keystone20:14
*** openstackgerrit has quit IRC20:18
*** openstackgerrit has joined #openstack-keystone20:18
*** kiran-r has joined #openstack-keystone20:31
*** richm has joined #openstack-keystone20:42
*** adrian_otto has quit IRC20:45
*** adrian_otto has joined #openstack-keystone20:47
*** adrian_otto has quit IRC20:49
*** edmondsw has quit IRC20:50
*** adrian_otto has joined #openstack-keystone20:54
*** adrian_otto has quit IRC20:55
*** adrian_otto has joined #openstack-keystone20:56
openstackgerritMerged openstack/python-keystoneclient: Support domain-specific configuration management  https://review.openstack.org/35877020:59
* morgan_ looks around21:00
* morgan_ eyes the review queue.21:01
* morgan_ debates doing mass code review today21:01
*** ravelar has quit IRC21:09
*** xarses has quit IRC21:12
andrewbogottI'm trying to get role inheritance to work… would y'all expect any role set on a domain to be automatically inherited by projects in that domain, or are there other steps?21:14
*** edtubill has quit IRC21:16
openstackgerritMerged openstack/keystone: Fix test_revoke to run all tests after pki removal  https://review.openstack.org/39288321:16
*** tobberyd_ has joined #openstack-keystone21:17
*** spilla has quit IRC21:17
*** dave-mcc_ has quit IRC21:24
stevemarmorgan_: lol21:24
stevemarmorgan_: that is something you would do!21:24
stevemaranyone want to review a presentation i have to give tomorrow? :P21:25
*** g2 is now known as g2[CUBS-ATL]21:32
*** adrian_otto has quit IRC21:34
knikollastevemar: what kind of presentation? lol21:37
*** browne has quit IRC21:41
stevemarknikolla: presenting to university faculty and grad students, research ideas21:49
stevemarknikolla: i was given a rather vague set of requirements21:49
stevemarknikolla: "present about openstack"21:49
*** Zer0Byte__ has joined #openstack-keystone21:49
rodrigodsstevemar, knikolla lol22:00
*** adrian_otto has joined #openstack-keystone22:00
rodrigodsthe university you've studied?22:00
morgan_stevemar: sorry... pass :P22:01
*** jperry has quit IRC22:02
*** harlowja has quit IRC22:02
*** tobberyd_ has quit IRC22:06
*** chris_hultin is now known as chris_hultin|AWA22:09
*** xarses has joined #openstack-keystone22:09
*** adrian_otto has quit IRC22:12
*** gyee has joined #openstack-keystone22:14
*** Marcellin__ has quit IRC22:18
*** browne has joined #openstack-keystone22:23
*** flaper87 has quit IRC22:29
*** LamT__ has quit IRC22:32
*** adrian_otto has joined #openstack-keystone22:33
knikollastevemar: that's very vague. good luck :P22:36
knikollai still have no idea how to go about presenting openstack22:37
*** xarses has quit IRC22:39
*** xarses has joined #openstack-keystone22:39
jlkstevemar: I made this to present at a Python meetup, a generic OpenStack primer. http://slides.com/jessekeating/openstack-primer22:44
jlkaww, a link got broken22:45
jlkhuh, hasn't aged well.22:46
knikollajlk: looks pretty cool. though yeah, i can see from the old gerrit interface that it's pretty old.22:48
*** kiran-r has quit IRC22:49
*** gagehugo has joined #openstack-keystone22:55
*** david-lyle has quit IRC23:04
*** chris_hultin|AWA is now known as chris_hultin23:08
*** harlowja has joined #openstack-keystone23:08
*** jaosorior has quit IRC23:10
*** chris_hultin is now known as chris_hultin|AWA23:15
*** xarses has quit IRC23:17
*** ravelar has joined #openstack-keystone23:18
*** ravelar has quit IRC23:23
*** agrebennikov has quit IRC23:27
*** david-lyle has joined #openstack-keystone23:30
*** rcernin has quit IRC23:31
*** dave-mccowan has joined #openstack-keystone23:31
*** gyee has quit IRC23:39
*** gyee has joined #openstack-keystone23:48

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!