Friday, 2017-01-20

rderosemorgan: my environment is toast (rebuilding)00:01
morganlocal tests work for me00:01
morganso i'm just baffled00:01
rderosemorgan: but I don't see any problem with your tests00:01
rderosewhat's the error?00:01
rderosemorgan: or, is it that you are just not seeing the table in mysql?00:01
morganhttp://logs.openstack.org/17/422817/1/check/gate-keystone-python35-db/1d68383/console.html#_2017-01-19_19_14_55_37443400:01
rderosemorgan: okay, now I'm baffled as well00:11
morganrderose: yeah.00:12
morganit's... weird00:12
openstackgerritMorgan Fainberg proposed openstack/keystone: Add SQL Upgrade Tests for MFA rules  https://review.openstack.org/42281700:13
morgananyway fixed the pep8 issue00:13
openstackgerritDavid Stanek proposed openstack/keystone: Updates to project mapping documentation  https://review.openstack.org/42285200:14
rderosemorgan: I wonder...00:15
dstanekrderose: and oslo.db isn't changing that for us?00:15
rderosemorgan: we did have an issue where the migration file would get cached00:15
morganrderose: not sure?00:15
rderosedstanek: not sure00:15
rderosemorgan: so 014_user_mfa_table_add.py is the same name for expand, migrate, contract00:16
rderosemorgan: I wonder if the contract version is some how getting cached and being execute instead of expand00:16
rderosemorgan: you could try changing the file names, so that each one is unique00:17
rderosee.g. 014_expand_user_mfa_table_add00:17
rderosemorgan: try that and see if that fixes the issue00:17
dstanekrderose: it looks like it can be configured, but i don't know if anyone could or would ever do that00:18
rderosedstanek: I could explicitly set it (just in case)00:18
morgan*rolls eyes* that would be stupid00:19
rderosemorgan: tell me about it :)00:19
morgani also want to point out the expand/contract/migrate repos kindof suck to work with00:20
*** chris_hultin is now known as chris_hultin|AWA00:20
openstackgerritMorgan Fainberg proposed openstack/keystone: Add user_mfa_rules table  https://review.openstack.org/41816600:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Method Handlers now return a response object always  https://review.openstack.org/42095500:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Plugins pass data back via AuthHandlerResponse  https://review.openstack.org/42291200:22
rderosemorgan: welcome to the zero downtime world we've created!00:22
rderose:)00:22
morgan*rolls eyes*00:22
morgani know people clamour for zero downtime00:22
morganbut ... it's mostly an absurd request that upgrades and schema changes are done "live"00:22
rderosemorgan: agree00:24
dstanekrderose: in memory it's probably a few hundred mb so probably not too much. something feels wrong about it00:24
rderosedstanek: I could try to paginate, but just concerned about folks deleting records in the middle and potentially missing records00:24
morganrderose: welcome to why pagnination is terrible00:26
morgans/why/one of the many reasons why/00:26
morgananyone who says "pagination is a good ui" needs to seriously think about that statement and think about how many pages deep they are willing to go on google.00:27
rderosemorgan: :)00:27
morganfiltering > pagination00:27
knikollamorgan: amen00:28
*** thorst_ has joined #openstack-keystone00:28
dstanekmorgan: :-) different reason, but i hear you00:28
dstanekrderose: what could be deleted to cause an issue00:29
*** voelzmo has joined #openstack-keystone00:30
rderosedstanek: if you delete a row after I've selected it, the next batch will be off by one00:32
rderosedstanek and I'll miss updating a record00:32
rderosedstanek: deleting a user... hmm...00:33
*** voelzmo has quit IRC00:35
rderosedstanek: have to think that through, the only way a local_user would be deleted is if a user is deleted, so that might actually be okay00:36
rderosedstanek: hmm... but adding users could be problematic... depends on how they are ordered I suppose...00:37
rderosedstanek: makes my head hurt. anyway, I'm off to the gym. I'll think on this later.00:37
*** adrian_otto has joined #openstack-keystone00:38
*** jose-phillips has quit IRC00:38
dstanekrderose: ah, no you'd have to use a filtered query where the total population is reduced each time00:40
dstanekrderose: for example 'select from local where the connected user doesn't have a domain'00:41
dstanek^ not valid SQL :-P00:41
*** thorst_ has quit IRC00:45
*** thorst_ has joined #openstack-keystone00:45
*** thorst_ has quit IRC00:50
*** hoangcx has joined #openstack-keystone00:53
*** bradjones has quit IRC00:55
morganrderose: looks like it was cache on the file name01:07
morganrderose: *rolls eyes*01:07
*** knikolla has quit IRC01:07
*** knikolla has joined #openstack-keystone01:08
*** knikolla has quit IRC01:08
*** knikolla has joined #openstack-keystone01:08
*** knikolla has quit IRC01:08
*** knikolla has joined #openstack-keystone01:09
*** knikolla has quit IRC01:09
*** knikolla has joined #openstack-keystone01:09
*** knikolla has left #openstack-keystone01:10
*** liujiong has joined #openstack-keystone01:19
*** thorst_ has joined #openstack-keystone01:19
*** adrian_otto has quit IRC01:20
*** gyee has quit IRC01:23
*** agrebennikov_ has quit IRC01:27
*** stingaci has joined #openstack-keystone01:43
*** woodster_ has quit IRC01:45
*** stingaci has quit IRC01:48
openstackgerritMerged openstack/keystone: Add documentation for auto-provisioning  https://review.openstack.org/42157301:49
*** furface has quit IRC02:01
*** thorst_ has joined #openstack-keystone02:01
*** thorst_ has quit IRC02:01
rderosedstanek: looks like still have a caching problem with the migration files being cached, morgan 's problem above02:12
*** browne has quit IRC02:20
openstackgerritRon De Rose proposed openstack/keystone: Add domain_id to the user table  https://review.openstack.org/40987402:20
*** edmondsw_ has quit IRC02:36
*** links has joined #openstack-keystone02:53
*** edmondsw has joined #openstack-keystone02:57
*** edtubill has joined #openstack-keystone03:01
*** edmondsw has quit IRC03:02
*** edtubill has quit IRC03:02
*** furface has joined #openstack-keystone03:17
*** tovin07 has joined #openstack-keystone03:18
tovin07breton, this one got 2 +2 https://review.openstack.org/#/c/294535/ can you review that? thanks! :D03:21
stevemarkeystone at night going on?03:27
*** itisha has joined #openstack-keystone03:30
*** edtubill has joined #openstack-keystone03:30
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833203:36
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833203:37
*** edtubill has quit IRC03:39
*** thorst_ has joined #openstack-keystone03:39
*** thorst_ has quit IRC03:40
tovin07stevemar, now: morning at my location :D03:41
*** nicolasbock has quit IRC03:41
stevemartovin07: early morning keystone then :)03:41
*** agrebennikov_ has joined #openstack-keystone03:52
*** chris_hultin|AWA is now known as chris_hultin04:09
*** links has quit IRC04:16
*** adrian_otto has joined #openstack-keystone04:17
*** links has joined #openstack-keystone04:18
*** agrebennikov_ has quit IRC04:25
*** voelzmo has joined #openstack-keystone04:32
*** voelzmo has quit IRC04:37
*** lucas has joined #openstack-keystone04:45
*** lucas has quit IRC04:46
openstackgerritSteve Martinelli proposed openstack/keystone: Allow user to change own expired password  https://review.openstack.org/40402204:47
stevemargagehugo: i fixed some of the tests for you ^04:48
stevemarbut theres one that you added "test_changing_password_with_invalid_token_fails" which is now failing04:48
*** catinthe_ has quit IRC04:54
*** portdirect is now known as portdirect_away04:55
*** chris_hultin is now known as chris_hultin|AWA04:59
*** agrebennikov_ has joined #openstack-keystone04:59
*** voelzmo has joined #openstack-keystone05:00
stevemargagehugo: commented on it05:01
*** voelzmo has quit IRC05:01
*** catintheroof has joined #openstack-keystone05:02
*** dikonoor has joined #openstack-keystone05:02
*** adrian_otto has quit IRC05:02
*** sheel has joined #openstack-keystone05:04
*** jerrygb has quit IRC05:05
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833205:12
*** catintheroof has quit IRC05:14
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833205:21
openstackgerritKen Johnston proposed openstack/keystone: Readability enhancements to architecture doc  https://review.openstack.org/42237505:23
openstackgerritKen Johnston proposed openstack/keystone: Readability enhancements to architecture doc  https://review.openstack.org/42237505:25
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833205:26
*** voelzmo has joined #openstack-keystone05:37
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833205:38
*** jerrygb has joined #openstack-keystone05:39
*** thorst_ has joined #openstack-keystone05:40
*** edtubill has joined #openstack-keystone05:41
*** voelzmo has quit IRC05:41
*** stingaci has joined #openstack-keystone05:45
*** Jack_V has joined #openstack-keystone05:46
*** catintheroof has joined #openstack-keystone05:46
*** thorst_ has quit IRC05:48
gagehugostevemar: thanks!05:49
gagehugostevemar: I think that test is redundant now since we removed @protected05:49
*** stingaci has quit IRC05:49
gagehugoredundant/incorrect05:50
*** agrebennikov_ has quit IRC05:50
stevemargagehugo: maybe05:51
stevemargagehugo: i would expect the tokens used from an old password to be invalid though05:51
gagehugoIt's tested above I think05:51
gagehugoin test_changing_password05:51
stevemargagehugo: i auth with passA, get a token -- tokenA, expire (somehow?), change passwd to passB, then tokenA should be invalidated05:52
stevemaroh is it05:52
stevemarmy flying metal tube is taking off in 7 hours, i should get to bed :)05:52
gagehugostevemar: yes05:52
gagehugohave fun in the metal tube05:53
gagehugoI'll fix this real quick before I head to bed05:53
stevemargagehugo: okie, you can look into it :)05:53
stevemari'll buy special metal tube wifi and take a look at it tmrw05:53
gagehugoThat test I wrote doesn't really make sense if we aren't checking the token for change_password I think05:54
* stevemar shrugs05:55
stevemarits weird05:55
stevemarif a user is expired, do their tokens get marked as invalid?05:55
stevemari guess there is no way of knowing "when" a user expires, we don't poll05:55
gagehugoI don't think so?05:55
stevemartovin07: yeah, i was waiting for breton to +A it, i don't know much about rally or osprofiler05:57
stevemargagehugo: hmm05:57
stevemargagehugo: point of note, we don't actually set the password_expires_days option btw05:57
stevemarin that test05:57
gagehugoyeah05:58
gagehugoI think I may have just been making redundant tests there05:58
gagehugocause it's checked here: https://github.com/openstack/keystone/blob/master/keystone/tests/unit/test_v3_identity.py#L83805:59
stevemaryeah06:00
stevemaryou could try something exotic like i mentioned above06:00
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833206:00
stevemarauth the user, get a token, mark him as expired, try to get him to change his password, see if the original token is valid or not06:00
gagehugosure06:01
stevemarbut any time a user changes their password, if expired or not, will invalidate their tokens06:01
stevemarlike you said, its in the test case above06:02
stevemarah, just remove it06:02
stevemarlets get this merged and you can play around with a fancy test case afterward06:02
gagehugook06:02
openstackgerritGage Hugo proposed openstack/keystone: Allow user to change own expired password  https://review.openstack.org/40402206:03
*** adriant has quit IRC06:03
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833206:04
stevemargagehugo: why remove "test_changing_expired_password_fails" ?06:05
stevemarthat one was fine, i thought06:05
gagehugoJust commenting on that now heh06:05
gagehugosince the config option was removed, it's also redundant06:05
gagehugothere is another test for checking incorrect passwords06:06
gagehugoI can add it back if we want to check incorrect password + expired06:06
*** furface has quit IRC06:06
stevemargagehugo: yeah, thats the combo i was looking for, but again i guess redundant06:07
stevemarokay06:07
gagehugoI think I like the change more now, it seems much simpler06:07
stevemar\o/06:07
stevemarbed time for me06:08
stevemarsee ya tmrw06:08
gagehugobye! have a safe flying metal tube trip06:08
*** edtubill has quit IRC06:09
rderosestevemar: wait! what about https://review.openstack.org/#/c/409874/?06:09
rderosestevemar: jk, go to sleep :)06:09
bretonstevemar: tovin07: and i am waiting for DinaBelova to make a quick look at the patch06:15
bretonmorning, keystone06:16
*** voelzmo has joined #openstack-keystone06:30
tovin07stevemar, breton oh, thanks, will wait for DinaBelova to confirm that :D06:32
*** edmondsw has joined #openstack-keystone06:34
*** voelzmo has quit IRC06:34
*** edmondsw has quit IRC06:38
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833206:39
openstackgerritwanghongtaozz proposed openstack/keystone: Modify the spelling mistakes  https://review.openstack.org/42307906:42
*** richm has quit IRC06:42
openstackgerritwanghongtaozz proposed openstack/keystone: Modify the spelling mistakes  https://review.openstack.org/42307906:56
*** portdirect_away is now known as portdirect06:59
*** voelzmo has joined #openstack-keystone07:17
openstackgerritzhangyanxian proposed openstack/keystone-specs: Fix typo in role-check-from-middleware.rst  https://review.openstack.org/42310307:37
openstackgerritzhangyanxian proposed openstack/keystone-specs: Fix typo in role-check-from-middleware.rst  https://review.openstack.org/42310307:38
*** liujiong_66 has joined #openstack-keystone07:42
*** pcaruana has joined #openstack-keystone07:43
*** dolphm_ has joined #openstack-keystone07:46
*** ChanServ sets mode: +o dolphm_07:46
*** melwitt_ has joined #openstack-keystone07:48
*** liujiong has quit IRC07:51
*** dgonzalez has quit IRC07:51
*** melwitt has quit IRC07:51
*** dolphm has quit IRC07:51
*** masterjcool has quit IRC07:51
*** dgonzalez has joined #openstack-keystone07:51
*** dolphm_ is now known as dolphm07:51
*** masterjcool has joined #openstack-keystone07:51
*** tesseract has joined #openstack-keystone08:05
*** stingaci has joined #openstack-keystone08:07
*** jlwhite has quit IRC08:29
*** tovin07 has quit IRC08:30
*** afazekas has quit IRC08:30
*** tovin07 has joined #openstack-keystone08:30
*** jlwhite has joined #openstack-keystone08:31
*** liujiong_66 is now known as liujiong08:35
*** afazekas has joined #openstack-keystone08:35
*** zzzeek has quit IRC09:00
*** zzzeek has joined #openstack-keystone09:00
*** openstackgerrit has quit IRC09:02
*** namnh has joined #openstack-keystone09:05
*** johnthetubaguy has quit IRC09:16
*** johnthetubaguy has joined #openstack-keystone09:19
*** dgonzalez_ has joined #openstack-keystone09:23
*** dgonzalez has quit IRC09:27
*** dgonzalez_ is now known as dgonzalez09:27
*** timburke has quit IRC09:32
*** jascott1 has joined #openstack-keystone09:33
*** timburke has joined #openstack-keystone09:35
*** jerrygb_ has joined #openstack-keystone09:41
*** jerrygb has quit IRC09:43
*** jerrygb has joined #openstack-keystone09:46
*** thorst_ has joined #openstack-keystone09:46
*** mvk has quit IRC09:46
*** jerrygb_ has quit IRC09:48
*** thorst_ has quit IRC09:51
*** stingaci has quit IRC09:56
*** stingaci has joined #openstack-keystone09:59
*** stingaci has quit IRC10:02
*** stingaci has joined #openstack-keystone10:02
*** liujiong has quit IRC10:04
*** edmondsw has joined #openstack-keystone10:10
*** jerrygb has quit IRC10:13
*** jerrygb has joined #openstack-keystone10:14
*** edmondsw has quit IRC10:15
*** mvk has joined #openstack-keystone10:17
timssHi! Got a LDAP Keystone domain (AD) which is working fine, but when users are deleted in AD I'm unable to show/delete role of a given user, or list the users in a project with deleted users. Error message is "Could not found resource <user id>". Not quite sure what changes I need to do, any inputs? http://paste.openstack.org/show/EFif6iJPjp38GAqWk4R7/10:22
*** hoangcx has quit IRC10:25
*** namnh has quit IRC10:29
*** pnavarro has joined #openstack-keystone10:31
*** richm has joined #openstack-keystone11:13
bretontimss: file a bugreport probably11:20
timssbreton: Figured it might be a config issue, but if not I'll make a report11:23
*** nicolasbock has joined #openstack-keystone11:35
*** stingaci has quit IRC11:39
*** stingaci has joined #openstack-keystone11:41
*** stingaci has quit IRC11:46
*** thorst_ has joined #openstack-keystone11:47
*** thorst_ has quit IRC11:52
*** pcaruana has quit IRC11:59
*** pcaruana has joined #openstack-keystone12:06
*** edmondsw has joined #openstack-keystone12:13
*** catinthe_ has joined #openstack-keystone12:32
*** catintheroof has quit IRC12:33
*** openstackgerrit has joined #openstack-keystone12:34
openstackgerritMerged openstack/keystone-specs: Fix typo in role-check-from-middleware.rst  https://review.openstack.org/42310312:34
*** stingaci has joined #openstack-keystone12:42
*** jerrygb_ has joined #openstack-keystone12:46
dstanekmorning all12:47
*** thorst_ has joined #openstack-keystone12:47
*** stingaci has quit IRC12:47
*** voelzmo has quit IRC12:48
*** jerrygb has quit IRC12:49
stevemaro/12:49
stevemardstanek: lets see if this flight has wifi12:50
*** voelzmo has joined #openstack-keystone12:50
dstanekstevemar: good luck12:53
dstanekstevemar: where are you off to?12:53
*** links has quit IRC12:55
asettleThank stevemar :)13:09
asettleThanks*13:09
*** stingaci has joined #openstack-keystone13:09
dstanektimss: did you end up creating a bug?13:22
dstanekstevemar: looks like your wifi question was answered :-P13:22
*** clenimar has quit IRC13:23
*** iurygregory has quit IRC13:23
*** voelzmo has quit IRC13:30
*** edtubill has joined #openstack-keystone13:31
*** voelzmo has joined #openstack-keystone13:33
timssdstanek: no not yet, I'll give it a go now :)13:36
*** bradjones has joined #openstack-keystone13:38
*** bradjones has quit IRC13:38
*** bradjones has joined #openstack-keystone13:38
dstanektimss: ok, make sure you include the version you are running13:39
timssdstanek: aye13:39
openstackgerritRodrigo Duarte proposed openstack/keystone: Test cross domain authentication via implied roles  https://review.openstack.org/42281913:41
*** voelzmo has quit IRC13:42
openstackgerritRodrigo Duarte proposed openstack/keystone: Test cross domain authentication via implied roles  https://review.openstack.org/42281913:43
rodrigodslbragstad, ^ we can't authenticate using domain specific roles13:49
*** pnavarro has quit IRC13:49
rodrigodslbragstad, think this check is missing in the shadow mapping, right?13:49
dstanekrodrigods: what check would be missing?13:52
rodrigodsdstanek, if the mapping uses a domain specific role, the user can't authenticate at all (not just if the role domain_id is different from the idp domain_id)13:53
dstanekrodrigods: doesn't shadow mapping just create project/assignments? i don't know why it would be doing that check13:55
rodrigodsdstanek, the assignment can't be used to authenticate the user13:56
dstanekrodrigods: wouldn't that check only be applicable when getting a scoped token?13:56
rodrigodsdstanek, right13:56
rodrigodsto get a scoped token13:56
dstanekrodrigods: at that point you would already be authenticated.13:56
rodrigodsdstanek, so we let the mapping create an assignment, but we won't let the user get an scoped token?13:57
rodrigodswhat do we gain than?13:57
rodrigodshmm, the project auto provisioning...13:58
rodrigodsi have the feeling this should be documented, at least13:58
dstanekrodrigods: also you very well be able to scope to something else right?13:58
rodrigodsdstanek, with further actions, yes13:59
*** nicodemus_ has joined #openstack-keystone13:59
dstanekrodrigods: what type of token do you get with a federated auth? scoped or unscoped?13:59
rodrigodsdstanek, the first one is unscoped14:00
rodrigodsthe one returned after the SP redirect14:00
rodrigodsbut... our saml2 plugin in keystoneauth only returns a scoped token, iirc14:00
rodrigodsso it would fail14:01
dstanekrodrigods: ok, that's what i thought. so the authentication succeeds and you are authenticated. it's when you try to scope to something you can't scope to that it should fail14:01
rodrigodsdstanek, exactly14:01
dstanekisn't that working as intended then?14:01
rodrigodsdstanek, yeah, already figured that out at "rodrigods> i have the feeling this should be documented, at least"14:02
openstackgerritSamuel Pilla proposed openstack/keystone: Add password expiration queries for PCI-DSS  https://review.openstack.org/40389814:02
dstaneki still don't fully understand implied roles :-(14:02
*** knikolla has joined #openstack-keystone14:02
*** knikolla has quit IRC14:02
dstaneklol14:02
*** knikolla has joined #openstack-keystone14:03
rodrigodsdstanek, implied roles is simpler, the mixture with domain specific that is confusing to me14:03
*** spilla has joined #openstack-keystone14:03
knikollao/ morning14:03
dstanekrodrigods: yeah, i think we went overboard with features14:04
*** Dinesh_Bhor has quit IRC14:04
rodrigodsdstanek, we need to document that behavior (the fact we can only get a unscoped token)14:05
rodrigodsdstanek, because our saml2 plugin from keystoneauth only returns a scoped token - so it won't properly work for this specific case14:05
*** dgonzalez has quit IRC14:06
*** dave-mccowan has joined #openstack-keystone14:07
dstanekrodrigods: it would already have the problem without the shadow mapping14:09
dstaneka user could currently be mapped to groups that only have those kinds of role assignments14:10
rodrigodsdstanek, right!14:10
rodrigodsthat's true14:10
dstanekwe're all about the hidden failures here14:10
rodrigodsheh exactly14:10
rodrigodsthe interaction between the features is absurd in this case14:11
rodrigodsdstanek, imagine the next time we talk about this, will take a while to figure out the complete stack of details14:11
*** dgonzalez has joined #openstack-keystone14:11
*** voelzmo has joined #openstack-keystone14:13
*** woodster_ has joined #openstack-keystone14:27
*** edtubill has quit IRC14:31
*** catintheroof has joined #openstack-keystone14:33
*** catinthe_ has quit IRC14:36
*** Jack_V has quit IRC14:41
*** smruf has joined #openstack-keystone14:43
*** sheel has quit IRC14:47
*** lamt has joined #openstack-keystone14:51
*** clenimar has joined #openstack-keystone14:51
*** iurygregory has joined #openstack-keystone14:51
timssdstanek: While digging up useful info for the bug report (LDAP deleted users) it hit me that the upstream AD might not actually delete the users. Checked with the ones responsible, and the users are actually moved (different OU/DN). Not sure what this implicates, could it mean that the identity mapping is off, is it based on the DN?14:55
*** melwitt_ is now known as melwitt14:55
*** dikonoor has quit IRC14:58
*** pnavarro has joined #openstack-keystone14:59
rderosestevemar fyi: https://bugs.launchpad.net/keystone/+bug/165811615:09
openstackLaunchpad bug 1658116 in OpenStack Identity (keystone) "Wrong migration step run when file names are the same" [Undecided,New]15:09
*** jaugustine has joined #openstack-keystone15:13
*** david-lyle has joined #openstack-keystone15:13
dstaneklbragstad: i can't reproduce that issue15:16
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833215:18
rderosemorgan fyi: https://bugs.launchpad.net/keystone/+bug/165811615:20
openstackLaunchpad bug 1658116 in OpenStack Identity (keystone) "Wrong migration step run when file names are the same" [Undecided,New] - Assigned to Ron De Rose (ronald-de-rose)15:20
dstanekrderose: i think i remember someone having that problem in the past15:23
rderosedstanek: :)15:24
*** david-lyle has quit IRC15:25
rderosedstanek: me and alexander15:25
*** david-lyle has joined #openstack-keystone15:25
*** smruf has left #openstack-keystone15:26
rderosewhatever happened to amakarov15:26
knikollarderose: his linkedin page says he left mirantis15:29
*** ravelar has joined #openstack-keystone15:30
rderoseknikolla: ah, I see15:30
rderoseknikolla: he should have at least said goodbye :)15:31
rderoseto us15:31
lbragstadgoing to refill coffee quick15:33
*** edtubill has joined #openstack-keystone15:37
*** jaosorior has joined #openstack-keystone15:39
*** david-lyle has quit IRC15:42
openstackgerritSamuel Pilla proposed openstack/python-keystoneclient: Allow Multiple Filters of the Same Key  https://review.openstack.org/42333915:44
*** chris_hultin|AWA is now known as chris_hultin15:48
*** mvk has quit IRC15:48
*** adrian_otto has joined #openstack-keystone15:51
knikollain the first paragraph of http://docs.openstack.org/developer/keystone/external-auth.html it says that "this makes possible to use an SQL identity backend together with, X.509 authentication or Kerberos", what is meant by 'together', does that refer to the mapped plugin?15:56
dstanekknikolla: no i think it means that you can allow password login (identity backend) and external (kerberos, etc) at the same time. method=password,external15:58
knikolladstanek: got it. i'll have a patch that rephrases that.15:58
*** pcaruana has quit IRC16:03
*** voelzmo has quit IRC16:05
dstanekknikolla: great. add me to the review16:06
*** tovin07 has quit IRC16:08
dstanekrderose: why was this commit necessary? https://github.com/openstack/keystone/commit/7ba53701989490667d220a3faecae2b484a007c5#diff-123d55255e45e44f9baa492e882762b5R38616:08
*** tovin07 has joined #openstack-keystone16:14
*** diazjf has joined #openstack-keystone16:15
rderosedstanek: let me ping you in a few, be right back16:20
openstackgerritKristi Nikolla proposed openstack/keystone: Improvements to external auth documentation page  https://review.openstack.org/42335616:26
knikolladstanek ^^16:26
*** diazjf has quit IRC16:27
*** dave-mccowan has quit IRC16:29
dstanekrderose: k, i know why you did it.... just trying to track something down16:30
dstanekknikolla: nice16:31
dstanekgoing to do lunch for a bit16:35
*** arunkant has quit IRC16:35
openstackgerritKristi Nikolla proposed openstack/keystone: Improvements to external auth documentation page  https://review.openstack.org/42335616:39
*** jaosorior has quit IRC16:48
*** stingaci has quit IRC16:49
*** jaosorior has joined #openstack-keystone16:49
*** jaosorior has quit IRC16:51
*** itisha has quit IRC16:52
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472016:54
*** diazjf has joined #openstack-keystone16:56
*** jose-phillips has joined #openstack-keystone17:00
*** lamt has quit IRC17:10
*** jose-phillips has quit IRC17:12
*** lamt has joined #openstack-keystone17:14
*** diazjf has quit IRC17:16
openstackgerritSamuel Pilla proposed openstack/keystone: Update endpoint api for optional region_id  https://review.openstack.org/42008517:16
*** agrebennikov_ has joined #openstack-keystone17:17
*** nicolasbock has quit IRC17:18
*** nicolasbock has joined #openstack-keystone17:18
*** stingaci has joined #openstack-keystone17:19
*** jaugustine has quit IRC17:21
*** jaugustine has joined #openstack-keystone17:24
stevemardstanek: yep, no wifi, just got to hotel17:28
stevemarrderose: whaaaa17:29
*** stingaci has quit IRC17:29
*** mvk has joined #openstack-keystone17:29
stevemarrderose: for reals: 1658116 ?17:29
*** diazjf has joined #openstack-keystone17:30
rderosestevemar: yep17:30
stevemarrderose: i thought it was designed that way, bah17:32
rderosestevemar: yeah, it's a feature :)17:32
*** jaosorior has joined #openstack-keystone17:32
rderosestevemar: I think the fix will be to just make the files unique17:33
rderosestevemar: working on a test, to test that the file names are the same, but have the prefix expand, migrate, contract17:33
rderosestevemar: so that at least it is consistent17:33
openstackgerritSean Dague proposed openstack/keystone: Don't treat api-ref warnings as errors due to missing params  https://review.openstack.org/42338717:35
rderoseam I the only one that keeps failing this gate: gate-grenade-dsvm-neutron-ubuntu-xenial17:36
rderosecan't figure out what's wrong: https://review.openstack.org/#/c/408332/17:36
dstanekstevemar: rderose: when dolphm, lbragstad and i were talking about this in a coffee shop i think we concluded the names needed to be different17:36
dstanekwe should have done something to enforce that17:37
knikollarderose: TRACE keystone AttributeError: Could not locate column in row for column 'idp_id'17:37
knikollahttp://logs.openstack.org/32/408332/26/check/gate-grenade-dsvm-neutron-ubuntu-xenial/a56ee36/logs/grenade.sh.txt.gz#_2017-01-20_15_56_11_56417:38
rderoseknikolla: thanks!! that was quick :)17:38
knikollarderose: :)17:39
openstackgerritSean Dague proposed openstack/keystone: Fix warnings generated by os-api-ref 1.2.0  https://review.openstack.org/42338717:39
stevemardstanek: i don't get why it has to be different, but i assume its a sqlalchemy thing17:45
openstackgerritSean Dague proposed openstack/keystone: Allow user to change own expired password  https://review.openstack.org/40402217:45
*** ravelar has quit IRC17:50
openstackgerritRon De Rose proposed openstack/keystone: Set the domain for federated users  https://review.openstack.org/40833217:55
*** tovin07 has quit IRC17:56
dstanekrderose: stevemar: it was...but i fixed it in the tests -> https://review.openstack.org/#/c/371075/17:58
*** ravelar has joined #openstack-keystone17:59
*** diazjf has quit IRC17:59
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472018:03
rderosedstanek: regarding: "why was this commit necessary? https://github.com/openstack/keystone/commit/7ba53701989490667d220a3faecae2b484a007c5#diff-123d55255e45e44f9baa492e882762b5R386"18:03
rderosedstanek: this was to remove the requirement that a mappings had to result in group memberships18:04
rderosedstanek: with concrete role assignments for federated users, we no longer needed this requirement18:04
rderoseoh dam, here comes a merge conflict: https://review.openstack.org/#/c/404022/!18:05
rderosequick stevemar, push mine through first: https://review.openstack.org/#/c/403916/18:06
stevemarheheh18:06
stevemarits already gating :P18:06
rderose:)18:06
stevemarrderose: you could be douchey and push a new change for 404022 :P18:07
stevemar*bump*18:07
rderosehaha, that would be great!18:07
rderosebut yeah, douchey18:07
*** stingaci has joined #openstack-keystone18:09
*** adrian_otto has quit IRC18:10
*** tovin07 has joined #openstack-keystone18:12
stevemarrderose: with 404022 merging i feel much more comfortable with your patch now :)18:12
rderosestevemar: that's good18:12
rderosestevemar: and me too!18:12
*** stingaci has quit IRC18:13
knikollastevemar: i had to write a microwebapp that does the same thing as both reviews, so I'm happy having to discontinue it18:15
*** adrian_otto has joined #openstack-keystone18:30
*** mvk has quit IRC18:30
*** jaosorior has quit IRC18:35
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472018:36
*** jefrite has quit IRC18:40
*** browne has joined #openstack-keystone18:47
stevemarknikolla: oh really?18:47
* morgan spams dolphm on twitter and IRC.18:49
*** jefrite has joined #openstack-keystone18:50
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472018:51
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472018:57
samueldmqMorning Keystone!18:59
samueldmqNot really... Good $(localtime)!18:59
morgansoooo18:59
stevemarsamueldmq: howdy!19:00
stevemarmorgan: soooo19:00
morganPike target: HTTP 2.019:00
samueldmqstevemar: o/19:00
morgansupport in KSA and keystone server19:00
morganfaster, guaranteed https (required), etc19:00
morganstevemar: fixed the mfa migration tests19:01
stevemarnice19:01
morganstevemar: also almost all the MFA work is done now except loading rules and validating them19:01
morganno hard-core test changes needed, all 100% compat with current workflow19:01
morganfeedback on the code would be welcome at this point. i expect to have the rule loader, parser, and validation in the auth path proposed today as well19:02
morganstevemar: so question, should we make the MFA rules something toggle-able per user (like disable all MFA rules)19:03
morgan?19:03
morganthe way this is structured, it would be easy to add that metadata into the MFA rules table19:03
stevemarmorgan: great to hear that19:03
stevemarmorgan: i think per user makes sense19:04
morganwell no it is per user now, it just would be a flag for ALL rules enable/disable19:04
morganregardless if rules were set.19:04
*** voelzmo has joined #openstack-keystone19:05
morganor should we make it user->[MFA_rule, MFA_rule], with each rule being toggleable19:05
morgan(one user->many rules, a row per rule)19:05
morgan?19:06
* morgan is inclined to say do it as a single blob19:06
morganbut it means if you need to snipe/add a rule with SQL (please don't do this) it is a lot harder19:06
stevemarmorgan: oh i see19:07
stevemarmorgan: handle it like fed mapping? just overwrite it19:07
morganthat is the current design19:07
morganbut since i don't have any loader/parser code yet19:07
morganwe could make it row-by-row and a one-to-many relationship19:07
morganvs a one-to-one19:07
morganand each rule could be enabled/disabled.19:07
morgani think that is much more over-engineerd, but figured i'd bounce the options off you first19:08
stevemarmorgan: we could always migrate to the latter IMO19:09
stevemarif we one day get a yubikey auth plugin or something :P19:10
morganThe only real downside to the all-in-one API19:10
morganis that you have to set all the rules at once19:10
morganyou can't easily just "add a single rule" via the api19:10
morganwell i guess you could, but it'd be weird via REST19:10
morgansince it would be string add/delete with string match.19:11
morganbasically.19:11
morgani really don't think we're going to see a ton of crazy rules19:11
morgani think it will be something like: [[password,mfa],[token],[external]]19:12
morganfor most19:12
morganif anything19:12
stevemaryeah, that's what i am assuming the bulk will be19:13
morganor [mapped] in there19:13
morgani'm fully expecting to see a lot of [[mapped]]19:13
morganonly19:13
morganwhich requires the federated login19:14
stevemarrderose: i think https://bugs.launchpad.net/keystone/+bug/1658116/ only affects tests19:14
openstackLaunchpad bug 1658116 in OpenStack Identity (keystone) "Wrong migration step run when file names are the same" [High,New] - Assigned to Ron De Rose (ronald-de-rose)19:14
stevemardolphm: ^19:14
morganstevemar: not sure if it affects more than tests. but it makes testing annoying19:14
stevemar99% sure it only affects tests19:15
stevemarhttps://github.com/openstack/keystone/blob/master/keystone/cmd/cli.py#L451-L46719:15
openstackgerritOpenStack Release Bot proposed openstack/oslo.policy: Update reno for stable/ocata  https://review.openstack.org/42345419:15
morganstevemar: ok so, we're good with a single blob and just saying "yeah it's not amazing, but if you have insane rules, sorry, just propose the whole ruleset list"19:15
stevemarmorgan: i think that's fine for now, we'll see what P and Q bring us19:16
morgani'll add in an "enabled" column for the user's MFA rule blob19:16
morganso we can totally disable the rules for a user if needed.19:16
morganbut otherwise i'll just roll with what we have proposed and get the parser/loader/validate bits into the auth path19:16
*** pnavarro has quit IRC19:17
*** david-lyle has joined #openstack-keystone19:17
stevemar++19:18
stevemari need food19:18
morgani need moar coffee19:18
*** david-lyle has quit IRC19:24
*** nkinder has joined #openstack-keystone19:27
*** tesseract has quit IRC19:32
*** sshen has quit IRC19:34
rderosestevemar: yeah, I think so19:36
ayoungmorgan, https://fedoraproject.org/wiki/Changes/Making_sudo_pip_safe19:42
*** diazjf has joined #openstack-keystone19:43
morganayoung: i have bigger issues, gnome3 in f25 just doesn't work well, renders all wonky (title bars, etc are horrible widths) and wayland has so many bugs the whole system freezes a bunch19:44
morganayoung: =/19:44
ayoungf25?  Really19:44
morganyep.19:44
ayoungNo problem here19:44
ayoungmorgan, is wayland the default?19:45
morganyep19:45
morganwayland is the default in f2519:45
morgani also have a hidpi screen19:45
ayounghow do I confirm?19:45
morgantry and do the x-restart and it'll say "restart unable in wayland"19:45
morganfrom the ui. not logout/login19:45
ayoung1920X1080 24" here19:45
morgansec19:45
morganyeah. i've got one of the wonky screen rezes high dpi19:46
morganand it doesn't play nice at all19:46
morgani think it's gnome319:47
morgannot wayland itself19:47
morganfor example, the tabs on chrome render with a font and spacing ~4x bigger than the rest of the UI19:47
morganayoung: ubuntu's ui renders the right size(s) to be usable.19:47
morganayoung: *shrug* iu'll try again in F2619:48
*** jose-phillips has joined #openstack-keystone19:48
ayoungmorgan, I'd ask the desktop team.  Make use of the fact you work for RH, and it provides them feedback19:48
morgani saw some of the same complaints on the memo-list btw19:49
morganrecently19:49
*** voelzmo has quit IRC19:49
ayoungAh19:49
morganand there are actuve bugs open19:49
morganit's not a big deal. i'm running linux directly, it works.19:49
morganand i can do my work (not doing fedora/rhel specific things)19:49
morgananyway, sudo pip thing19:50
morganinteresting19:50
ayoungmorgan, anyway, look at the link I posted.  IIUC it means we could run devstack on the desktop without polluting the system19:50
*** voelzmo has joined #openstack-keystone19:50
ayoungat least for py319:50
morganyes19:50
morganit's a good proposal, did it land?19:50
*** catinthe_ has joined #openstack-keystone19:50
morganah f26 target19:51
morganyes, it is a good change19:51
morganbut you could also just use VENVs today19:51
morganand do it on the desktop19:51
morganand not pollute anything19:51
*** jaosorior has joined #openstack-keystone19:52
*** catintheroof has quit IRC19:53
*** voelzmo has quit IRC19:55
*** agrebennikov_ has quit IRC19:58
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472019:59
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472020:00
openstackgerritMorgan Fainberg proposed openstack/keystone: Add user_mfa_rules table  https://review.openstack.org/41816620:01
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Method Handlers now return a response object always  https://review.openstack.org/42095520:01
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Plugins pass data back via AuthHandlerResponse  https://review.openstack.org/42291220:01
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472020:06
*** jefrite has quit IRC20:12
*** jefrite has joined #openstack-keystone20:18
*** jefrite has quit IRC20:25
*** adrian_otto has quit IRC20:27
*** adrian_otto has joined #openstack-keystone20:28
*** MasterOfBugs has joined #openstack-keystone20:30
*** pramodrj07 has joined #openstack-keystone20:32
*** jefrite has joined #openstack-keystone20:33
*** adrian_otto has quit IRC20:33
*** dave-mccowan has joined #openstack-keystone20:34
dstanekrderose: did you see my comment about the migration issue?20:42
openstackgerritMerged openstack/keystone: Updates to project mapping documentation  https://review.openstack.org/42285220:42
*** voelzmo has joined #openstack-keystone20:44
*** adrian_otto has joined #openstack-keystone20:46
*** david-lyle has joined #openstack-keystone20:47
*** adrian_otto has quit IRC20:48
*** adrian_otto has joined #openstack-keystone20:50
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472020:55
*** jaosorior has quit IRC20:57
*** thiagolib has quit IRC20:58
*** adrian_otto1 has joined #openstack-keystone21:00
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472021:00
*** adrian_otto has quit IRC21:00
*** nicodemus_ has quit IRC21:02
*** catinthe_ has quit IRC21:02
*** pnavarro has joined #openstack-keystone21:03
*** catintheroof has joined #openstack-keystone21:03
*** catintheroof has quit IRC21:07
*** Jack_V has joined #openstack-keystone21:14
*** voelzmo has quit IRC21:17
brownedstanek: lbragstad: I've added more details on bug 1654409.  If you'd like me to try something else today let me know.  I can reproduce very easily21:17
openstackbug 1654409 in OpenStack Identity (keystone) "Duplicate users (federated and sql) results in 401" [High,Incomplete] https://launchpad.net/bugs/1654409 - Assigned to Eric Brown (ericwb)21:17
lbragstadbrowne sounds good - wrapping a few things up here and I'll take a look21:18
brownesure thx21:18
*** jamielennox is now known as jamielennox|away21:28
*** diazjf has quit IRC21:28
dstanekhi browne21:29
dstanektrying to get travel booked, but i can look again in a second21:30
dstanekbrowne: can you only reproduce with that particular IdP?21:30
browneits the only one i've used21:30
brownebut i suspect is has less to do with the idp21:31
brownei think it has something to do with domains (Federated vs. Default vs local)21:31
browneis a Federated user always mapped to the Federated domain?21:31
brownei should mention everything works fine without having the same user defined in keystone21:32
*** jerrygb_ has quit IRC21:41
*** chris_hultin is now known as chris_hultin|AWA21:41
dstanekbrowne: yes, it should be21:42
dstanekbrowne: i have the same user defined in keystone and i don't have an issue21:43
dstanekone thing that would be awesome is to log the traceback the the user_id is erroneously set on the context21:43
dstanekyou get an error because something sets a user id and then tries to set it to something different21:44
*** david-lyle has quit IRC21:45
brownei can add more debug if needed21:45
brownewhere would help?21:46
morganhmm21:47
brownedstanek: here's a traceback at the point when the dup is found http://paste.openstack.org/show/595846/21:55
*** jaugustine has quit IRC21:58
*** thorst_ has quit IRC22:02
*** adrian_otto1 has quit IRC22:02
*** thorst_ has joined #openstack-keystone22:03
*** chris_hultin|AWA is now known as chris_hultin22:07
*** thorst_ has quit IRC22:07
*** Jack_V has quit IRC22:07
brownedstanek: lbragstad ah ha! the root cause is that i have "external" in the authentication methods.22:13
browneapparently that conflcits with saml22:13
dstaneksay what?22:13
brownemethods = external,password,token,saml222:14
browneto:22:14
brownemethods = password,token,saml222:14
*** edtubill has quit IRC22:15
browneI "think" this occurs because my mapping uses REMOTE_USER and if external is configured, it creates an AuthContext using the external method and then later attempts to set the user_id using the saml auth method, resulting in a dup.22:17
dstanekbrowne: oh, that is interesting22:18
lbragstadbrowne so did you remove external? or add it?22:21
brownelbragstad:  i removed it22:21
dstanekbrowne: i'm still unclear on how it got the wrong user22:23
dstaneki have external in my methods and i'm not having the same issue22:24
brownedoes your mapping use REMOTE_USER22:25
brownedoes your idp send REMOTE_USER in the assertion?22:25
browneactually i guess apache2 does that22:25
dstanekbrowne: yeah that would be apache. i don't use remote user, but i don't know why that would change anything22:26
dstanekyou could in theory hard code the username in the local section22:26
browneso i was browsing the code (no expert) trying to see where AuthContext is set22:28
brownehttps://github.com/openstack/keystone/blob/master/keystone/auth/controllers.py#L54222:28
brownei think if this block of code is executed, the auth_context sets a user_id mapping to the sql based local keystone user named "admin"22:29
brownebut then later on, the user_id is attempted to be set to the user_id that maps to the federated user named "admin"22:29
knikollanot sure if it applies or anything, but there's a caution box in the docs about having both external and federation methods http://docs.openstack.org/developer/keystone/external-auth.html#configuration22:29
browneknikolla:  ha, yep that seems to apply22:30
dstanekbrowne: so at that point the auth_context should have been created by the middleware using the user_id from the unscoped token22:31
brownewe should probably have that comment right in keystone.conf instead of just the admin doc22:31
*** stingaci has joined #openstack-keystone22:32
dstanekthat warning is crazy. i can't see why it would actually be a problem unless we are doing something wrong22:32
knikolladstanek: either i'm too tired, but I couldn't make much sense of it.22:36
*** stingaci has quit IRC22:36
dstaneki just want to reproduce so i can understand :-(22:38
dstanekbrowne: when the authcontext is create what is used for the user_id?22:38
browneso i logged __setitem__ in AuthContext and it was only called once22:39
brownethe time it resulted in a dup22:39
*** spilla has quit IRC22:39
*** jerrygb has joined #openstack-keystone22:40
dstanekbrowne: how does it ever get set then?22:41
brownei thought through an __init__ but don't see that in the code, so unsure22:41
dstanekbrowne: can you add an __init__ that just logs and passes the args through to the parent?22:42
brownesure22:42
*** thorst_ has joined #openstack-keystone22:43
*** dave-mccowan has quit IRC22:46
*** thorst_ has quit IRC22:47
brownedstanek: looks like the __init__ doesn't set anything {'bind': {}, 'extras': {}, 'method_names': []} __init__22:55
*** masber has quit IRC22:59
*** masber has joined #openstack-keystone23:00
lbragstaddstanek you didn't have a repo for the office hours LP stuff did you?23:01
openstackgerritMorgan Fainberg proposed openstack/keystone: Add user_mfa_rules table  https://review.openstack.org/41816623:03
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Method Handlers now return a response object always  https://review.openstack.org/42095523:03
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Plugins pass data back via AuthHandlerResponse  https://review.openstack.org/42291223:03
openstackgerritMorgan Fainberg proposed openstack/keystone: Process and validate auth methods against MFA rules  https://review.openstack.org/42354823:03
morganpushed while running unit tests locally (since that takes a good bit now)23:04
morganthat should be most everyrhing except some tests prior to adding new APIs for setting MFA rules.23:04
morganugh missed some things =/23:05
morganhmm. lazy load not working...23:07
morganrderose: ping. since you did password things23:08
morganrderose: i am thinking i am a bit confused on the lazy load functionality23:08
morganit is claiming it is not bound to a session...23:09
knikollabrowne: i had a quick look at the code23:13
knikollaand that caution box was right23:14
*** thorst_ has joined #openstack-keystone23:15
knikollahttps://github.com/openstack/keystone/blob/master/keystone/auth/controllers.py#L542-L54723:15
*** adrian_otto has joined #openstack-keystone23:16
browneknikolla:  yeah, that's the same spot i linked to earlier23:16
knikollabrowne: yeah, just saw it23:16
knikollabrowne: authcontext doesn't allow changing values, so both plugins point to different user_ids23:16
knikollai guess it makes sense23:17
knikollaI'll rewrite that part of the documentation tomorrow23:17
knikollato make it clearer23:17
*** portdirect has quit IRC23:18
*** thorst_ has quit IRC23:20
browneshould i create a patch for this bug to update the conf help on auth.methods?23:20
openstackgerritRichard Avelar proposed openstack/keystone: Add queries for federated attributes in list_users  https://review.openstack.org/41472023:21
knikollabrowne: yeah, and make it related23:22
knikollathe bug would be invalid in this case?23:23
morganhmm23:24
morgani'm not understanding the lazy='subquery' correctly apparently23:24
*** portdirect has joined #openstack-keystone23:25
knikollamorgan: what's the issue?23:25
knikollai'm feeling in a debugging mood23:25
morgani'm getting sqlalchemy.orm.exc.DetachedInstanceError: Parent instance <User at 0x7f350cc65ef0> is not bound to a Session; lazy load operation of attribute 'mfa' cannot proceed"23:25
morganwith my addition of the mfa stuff23:25
morganin _create_user23:25
morganuser_ref.to_dict23:26
morganit's failing23:26
morgansee code at https://review.openstack.org/#/c/423548/23:26
knikollamorgan: looking23:27
morganahh nvm23:28
morgani found it.23:28
morgani need to add the MFA object to the _create_user23:28
morgani think?23:29
*** v1k0d3n has joined #openstack-keystone23:29
morganhuh but nonlocal and local user works23:29
morgan*blink*23:29
morganooh but they aren't in attrs23:29
morganoookay23:29
morganyeah23:29
morgani need to add the ref23:29
morganobject23:29
morganyup23:30
morganknikolla: ^23:31
knikollamorgan: cool23:32
*** chris_hultin is now known as chris_hultin|AWA23:32
morganknikolla: looks like i need to add another couple things for our tests23:33
morganbut, overall looks pretty good.23:33
morganclose. now just need to the tests for the new code paths and then the API changes23:34
knikollamorgan: good work!23:35
knikollathis release is looking sweet23:36
*** v1k0d3n has quit IRC23:43
*** edmondsw has quit IRC23:53
*** edmondsw has joined #openstack-keystone23:54
morganstevemar: ping - Deprecated: update_user for the LDAP identity backend has been deprecated in the Mitaka release in favor of read-only identity LDAP access. It will be removed in the "O" release.' we good to nuke that?23:57
*** edmondsw has quit IRC23:58
*** lamt has quit IRC23:58
knikollamorgan: the review that nukes that has been stuck in tests limbo. all tests depend on creating the users in the fakeldap backend.23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!