Sunday, 2017-01-29

*** stingaci has quit IRC00:01
*** stingaci has joined #openstack-keystone00:17
*** thorst_ has joined #openstack-keystone00:19
*** thorst_ has quit IRC00:20
*** stingaci has quit IRC00:21
*** rcernin has quit IRC00:45
*** spotz_zzz is now known as spotz00:48
*** rcernin has joined #openstack-keystone00:54
*** spotz is now known as spotz_zzz00:58
*** stingaci has joined #openstack-keystone01:03
*** stingaci has quit IRC01:07
*** mgarza_ has joined #openstack-keystone01:21
*** jvarlamova____ has quit IRC01:27
*** mgarza_ has quit IRC01:35
*** rcernin has quit IRC01:45
*** spotz_zzz is now known as spotz01:49
*** stingaci has joined #openstack-keystone01:50
*** stingaci has quit IRC01:54
*** rcernin has joined #openstack-keystone01:56
*** spotz is now known as spotz_zzz01:59
*** tqtran has joined #openstack-keystone02:02
*** tqtran has quit IRC02:07
*** thorst_ has joined #openstack-keystone02:20
*** thorst_ has quit IRC02:25
*** stingaci has joined #openstack-keystone02:36
*** stingaci has quit IRC02:41
*** rcernin has quit IRC02:48
*** thorst_ has joined #openstack-keystone03:00
*** thorst_ has quit IRC03:03
*** tqtran has joined #openstack-keystone03:05
*** tqtran has quit IRC03:10
*** rcernin has joined #openstack-keystone03:12
*** stingaci has joined #openstack-keystone03:18
*** rcernin has quit IRC03:20
*** stingaci has quit IRC03:23
*** dave-mccowan has joined #openstack-keystone03:27
*** stingaci has joined #openstack-keystone03:50
*** spotz_zzz is now known as spotz03:51
*** stingaci has quit IRC03:55
*** dave-mccowan has quit IRC03:57
*** spotz is now known as spotz_zzz04:01
*** stingaci has joined #openstack-keystone04:23
*** stingaci has quit IRC04:27
openstackgerritSteve Martinelli proposed openstack/keystone: cleanup release notes from PCI options  https://review.openstack.org/42646304:30
*** lamt has joined #openstack-keystone04:31
*** adrian_otto has joined #openstack-keystone04:51
*** spotz_zzz is now known as spotz04:52
*** stingaci has joined #openstack-keystone04:54
*** stingaci has quit IRC04:59
*** nicolasbock has quit IRC05:00
*** spotz is now known as spotz_zzz05:01
*** lamt has quit IRC05:02
*** adrian_otto has quit IRC05:03
*** tqtran has joined #openstack-keystone05:06
*** tqtran has quit IRC05:11
*** stingaci has joined #openstack-keystone05:11
*** stingaci has quit IRC05:15
*** richm has joined #openstack-keystone05:20
*** stingaci has joined #openstack-keystone05:43
*** stingaci has quit IRC05:47
*** spotz_zzz is now known as spotz05:53
*** spotz is now known as spotz_zzz06:02
*** lamt has joined #openstack-keystone06:04
*** stingaci has joined #openstack-keystone06:15
*** stingaci has quit IRC06:20
*** lamt has quit IRC06:24
*** thorst_ has joined #openstack-keystone06:30
*** stingaci has joined #openstack-keystone06:30
*** lamt has joined #openstack-keystone06:34
*** stingaci has quit IRC06:34
*** thorst_ has quit IRC06:35
*** spotz_zzz is now known as spotz06:53
*** lamt has quit IRC06:59
*** spotz is now known as spotz_zzz07:03
*** tqtran has joined #openstack-keystone07:08
*** tqtran has quit IRC07:12
*** spotz_zzz is now known as spotz07:54
*** spotz is now known as spotz_zzz08:04
*** richm has quit IRC08:23
*** thorst_ has joined #openstack-keystone08:31
*** thorst_ has quit IRC08:35
*** zzzeek has quit IRC09:00
*** zzzeek has joined #openstack-keystone09:00
*** Jack_I has joined #openstack-keystone09:01
*** richm has joined #openstack-keystone09:11
*** richm has quit IRC09:12
*** richm has joined #openstack-keystone09:18
*** richm has quit IRC09:53
*** spotz_zzz is now known as spotz09:56
*** richm has joined #openstack-keystone10:02
*** spotz is now known as spotz_zzz10:05
*** thorst_ has joined #openstack-keystone10:32
*** thorst_ has quit IRC10:37
*** richm has quit IRC10:53
*** spotz_zzz is now known as spotz10:57
*** richm has joined #openstack-keystone11:01
*** spotz is now known as spotz_zzz11:06
*** richm has quit IRC11:57
*** spotz_zzz is now known as spotz11:57
stevemarlbragstad: 3 more patches to land for rc1 and we're done, i think we can safely release at that level12:04
stevemarhttps://review.openstack.org/#/c/426431/ (better validation for options) (morgan)12:04
stevemarhttps://review.openstack.org/#/c/424220/ (deprecate `lockout_ignored_user_ids` conf option) (stevemar)12:04
stevemarhttps://review.openstack.org/#/c/426463/ (release note cleanup) (stevemar)12:04
*** spotz is now known as spotz_zzz12:07
*** thorst_ has joined #openstack-keystone12:33
*** thorst_ has quit IRC12:38
*** spotz_zzz is now known as spotz13:58
*** spotz is now known as spotz_zzz14:10
*** thorst_ has joined #openstack-keystone14:29
*** thorst_ has quit IRC14:33
*** richm has joined #openstack-keystone14:57
*** spotz_zzz is now known as spotz15:01
*** spotz is now known as spotz_zzz15:11
*** thorst_ has joined #openstack-keystone15:14
*** richm has quit IRC15:28
*** adrian_otto has joined #openstack-keystone15:36
*** dims has quit IRC15:38
*** adrian_otto has quit IRC15:40
*** thorst_ has quit IRC16:00
*** spotz_zzz is now known as spotz16:02
*** adrian_otto has joined #openstack-keystone16:04
*** adrian_otto has quit IRC16:07
*** spotz is now known as spotz_zzz16:12
*** nicolasbock has joined #openstack-keystone16:19
*** rcernin has joined #openstack-keystone16:29
morganstevemar: let me respin the lockout one16:35
morganstevemar: oh wait nvm you got it all updated16:35
*** v1k0d3n has quit IRC16:46
*** v1k0d3n has joined #openstack-keystone16:47
*** v1k0d3n has quit IRC16:54
*** v1k0d3n has joined #openstack-keystone16:55
*** spotz_zzz is now known as spotz17:03
*** spotz is now known as spotz_zzz17:12
*** lamt has joined #openstack-keystone17:29
*** brad[] has quit IRC17:45
*** rcernin has quit IRC17:46
openstackgerritMorgan Fainberg proposed openstack/keystone: Add MFA Rules and Enabled User options  https://review.openstack.org/41816617:48
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Method Handlers now return a response object always  https://review.openstack.org/42095517:48
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Plugins pass data back via AuthHandlerResponse  https://review.openstack.org/42291217:49
morganstevemar: ^17:59
morganreworking the next MFA one that does the auth-plugin validation bits now.17:59
morganto use the option vs the table.17:59
morganstevemar: then it needs tests.17:59
morgani also need to work with someone on dev docs for the new resource options bit17:59
morganstevemar: also... you're not here and it's sunday, i am surprised :P18:00
*** thorst_ has joined #openstack-keystone18:00
*** spotz_zzz is now known as spotz18:04
*** thorst_ has quit IRC18:05
* morgan yells at the gerrit web ui18:12
morganis this thing even ever tested...18:12
morganfirst they break mobile usage horribly.. this whole "javascript" thing ... now i can't even copy code from it and paste it18:12
*** lamt has quit IRC18:13
morgangod. it's like they don't want anyone to use it18:13
*** spotz is now known as spotz_zzz18:13
*** brad[] has joined #openstack-keystone18:34
openstackgerritMorgan Fainberg proposed openstack/keystone: Add MFA Rules and Enabled User options  https://review.openstack.org/41816618:40
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Method Handlers now return a response object always  https://review.openstack.org/42095518:40
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Plugins pass data back via AuthHandlerResponse  https://review.openstack.org/42291218:40
morganstevemar: i'm restructuring auth to move the common code into keystone.auth.core, which is where the MFA helper objects will live18:43
morganso AuthInfo, AuthContext will en dup there18:43
morganetc18:43
*** nicolasbock has quit IRC18:44
morgandebugging a small bit with that and then i'll add in the MFA helpers and the auth validation itself18:45
morganlooks like MFA might be landable in Ocata as well.18:45
morganstevemar: also we will need to add an index to useroptions for both the user column and the option id18:46
morganso we can so some filtering on it more easily18:47
*** lamt has joined #openstack-keystone18:58
*** spotz_zzz is now known as spotz19:04
*** lamt has quit IRC19:12
*** lamt has joined #openstack-keystone19:13
*** spotz is now known as spotz_zzz19:14
*** lamt has quit IRC19:25
*** lamt has joined #openstack-keystone19:29
stevemarmorgan: hey!19:57
stevemarmorgan: yeah, gerrit on mobile is TERRIBLE!19:57
stevemarmorgan: i can volunteer to do the dev docs for the options code19:57
*** thorst_ has joined #openstack-keystone20:01
morganstevemar: cool. i'm finishing the MFA code refactor to process from user options20:04
morganthen we just need to test it20:04
morganand maybe? write an API for it20:04
morgani'll prob submit a followup to move AuthContext, AuthInfo and associated functions to auth.core20:05
morganbut for now the new mfa stuff is all that is in there20:05
*** spotz_zzz is now known as spotz20:05
*** thorst_ has quit IRC20:06
*** spotz is now known as spotz_zzz20:15
stevemarmorgan: for posterity https://review.openstack.org/#/c/426463/ -- before i push it through myself20:21
openstackgerritMorgan Fainberg proposed openstack/keystone: Process and validate auth methods against MFA rules  https://review.openstack.org/42354820:22
morganstevemar: +2/+A20:23
stevemarty20:23
morganso need some tests for the MFA thing20:24
morganand then we should figure out the API bits (if we want a self-service API or not)20:24
morganand documentation on it20:24
morgannot too far out20:25
*** r1chardj0n3s_afk is now known as r1chardj0n3s20:25
morganstevemar: i am acutally liking the new option code a lot w/ the JSON schema bits20:25
morganstevemar: i look forward to implementing it for project/domain, group, etc20:26
morganstevemar: annnnnnnd pushing one step closer to dropping "extras"20:26
* morgan is pondering a way to allow vendor data (in a specific area) of the resources using a similar mechanism20:26
morganlike a loadable 'vendor data' plugin20:27
morganand it would work like resource_options20:27
morganbut be vendor-data specific.20:27
morganand show up in like user['vendor_data']20:27
morganand then we could 100% ditch extras (deprecate/remove)20:27
morganor deprecate and default to "off"20:27
morganstevemar: so... do we want a self-service API for MFA rules or do we want to just push to pike where we can implement policy on user['options']20:29
*** nicolasbock has joined #openstack-keystone20:31
*** Jack_I has quit IRC20:47
openstackgerritMorgan Fainberg proposed openstack/keystone: Process and validate auth methods against MFA rules  https://review.openstack.org/42354820:51
morganstevemar: responded to comments.20:57
stevemarmorgan: pull out meant ... just define the schema above the option registry or something20:58
stevemarso you don't have the schema in line20:58
morganah, *shrug* we could20:59
morgani think it's about the same either way. jsonschema is genrally not super readable20:59
morganstevemar: so... since you're here...20:59
morganstevemar: are we good with leaving MFA admin-set for the moment21:00
morganand future (PIKE) do the user-option policy thing21:00
morganwould make it much easier to land.21:00
openstackgerritMorgan Fainberg proposed openstack/keystone: Add comment to clarify resource-options jsonschema  https://review.openstack.org/42660421:02
stevemarmorgan: thats what i figured it would be21:04
morganokie21:04
morganwfm21:04
morganugh.21:04
morganw.t.f21:04
morgangah python2.7 does a bad job of managing circular deps21:05
*** flwang has joined #openstack-keystone21:06
flwanglbragstad: ping21:16
morganflwang: lbragstad might not be around since it's the weekend21:17
morganflwang: FYI.21:17
morganbut then again.. he might be ;), worst case he'll be around tomorrow for sure.21:17
flwangmorgan: thanks21:17
flwangmorgan: would you mind helping take a look this error http://logs.openstack.org/58/423658/4/check/gate-rally-dsvm-zaqar-zaqar-ubuntu-xenial-nv/c943347/logs/apache/keystone.txt.gz ?21:17
morgansec.21:17
flwangour zaqar rally gate always failed because failed to get token from keystone21:18
flwangmorgan: thank you!21:18
morganstevemar: ugh. things are broken somehow between last run and this run with DeprecationWarnings.21:19
morgan*blink*21:19
morganstevemar: nvm.21:20
morganstevemar: i needed a rebase *wince*21:20
morganflwang: waiting for it to load. oncethe log loads i might be able to help more21:20
flwangmorgan: thanks a lot21:21
morganflwang: so.. this log looks normal to me? i need more context to dig up what you're having an issue with21:21
flwanghttp://logs.openstack.org/58/423658/4/check/gate-rally-dsvm-zaqar-zaqar-ubuntu-xenial-nv/c943347/logs/21:22
morganit looks like you might be making a v3 user auth request with v2 data (no domain in the user)21:22
morganflwang: i'm sorry i'm going to need more specifics, digging through every log is not in the books for me today21:23
morganpoint me at the specific error21:23
*** lamt has quit IRC21:23
flwangmorgan: http://logs.openstack.org/58/423658/4/check/gate-rally-dsvm-zaqar-zaqar-ubuntu-xenial-nv/c943347/console.html21:24
morganit looks like rally is making a bad auth request21:24
morganmy guess is it is making a v2 auth request to the v3 api21:24
morganflwang: BadRequest: Expecting to find domain in user. The server could not comply with the request since it is either malformed or otherwise incorrect. The client is assumed to be in error. (HTTP 400) (Request-ID: req-511d48a5-5c2a-428c-b89d-34162d20473d)21:25
morganflwang: if you use username in auth in v3, you must specify a domain21:25
flwangmorgan: yep, but seems the other services's rally job work fine, that's weird21:25
morganyou cannot assume keysotne knows the domain you're talking to21:25
morganthat i can't tell you why, it may be that zaqar is misconfigured21:25
*** agrebennikov__ has joined #openstack-keystone21:26
morganflwang: looking here: http://logs.openstack.org/58/423658/4/check/gate-rally-dsvm-zaqar-zaqar-ubuntu-xenial-nv/c943347/logs/etc/zaqar/zaqar.conf.txt.gz the trustee config might be wrong21:27
morganbut it doesn't look off21:28
morganit may also be rally's config21:28
flwangmorgan: but the trustee options shouldn't be used for a normal queue action21:28
flwangi will dig more and get back to ask more question :) thank  you very much21:29
morganthen it might be rally's config is just wrong itself. it's def something making a v3 auth request without domain in the user block in auth21:29
flwangmorgan: cool, and another weird thing is, i can't reproduce it locally :(21:30
morgancheck to make sure v2 keystone is enabled in that test21:31
morganwe have some things not enabling v2 keystone iirc.21:31
* morgan points out things need to start gating on v3-only, so it is good to find these issues.21:31
flwangmorgan: is it possible that zaqarclient is doing a bad thing http://logs.openstack.org/58/423658/4/check/gate-rally-dsvm-zaqar-zaqar-ubuntu-xenial-nv/c943347/console.html#_2017-01-27_16_07_45_203789 ?21:34
morganperhaps21:34
morganusually that means what is being passed to the client is incorrect21:35
flwangmorgan: yep,i think you're correct21:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Add MFA Rules and Enabled User options  https://review.openstack.org/41816621:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Process and validate auth methods against MFA rules  https://review.openstack.org/42354821:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Method Handlers now return a response object always  https://review.openstack.org/42095521:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Auth Plugins pass data back via AuthHandlerResponse  https://review.openstack.org/42291221:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Implement better validation for resource options  https://review.openstack.org/42643121:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Create user option `ignore_lockout_failure_attempts`  https://review.openstack.org/42422021:38
openstackgerritMorgan Fainberg proposed openstack/keystone: cleanup release notes from PCI options  https://review.openstack.org/42646321:38
openstackgerritMorgan Fainberg proposed openstack/keystone: Add comment to clarify resource-options jsonschema  https://review.openstack.org/42660421:38
morganstevemar: ^ lots of rebase.21:42
morganstevemar: but mostly ready to go, working on some cleanup and then testing21:42
Adobemanorz.. I built the entire top level ldap tree where I can do ldapsearch and stuff, keystone still tells me user is disabled..21:42
Adobemanwhat the hell is it trying to read #!*&%#!)21:42
Adobemanits almost as of it should just go with an objectClass or something..21:43
Adobemaneven went as far as getting cinder/nova/swift.. created in ldap.. mapping the user ID back to whatever it was internal to the SQL server..21:47
Adobemanadding all of them into a enabled_users group..21:48
*** lamt has joined #openstack-keystone21:52
openstackgerritMorgan Fainberg proposed openstack/keystone: Cleanup TODO about auth.controller code moved to core  https://review.openstack.org/42660722:01
*** thorst_ has joined #openstack-keystone22:02
*** spotz_zzz is now known as spotz22:07
*** thorst_ has quit IRC22:07
*** lamt has quit IRC22:07
openstackgerritMorgan Fainberg proposed openstack/keystone: Cleanup TODO, AuthContext and AuthInfo to auth.core  https://review.openstack.org/42660822:09
morganstevemar: ok working on MFA tests now.22:13
morganactually going to take a break and cook something then do MFA tests22:14
*** spotz is now known as spotz_zzz22:16
morgan#success implemented a far better architecture for resource-specific options in keystone (initially used for Users)22:24
openstackstatusmorgan: Added success to Success page22:24
*** thorst_ has joined #openstack-keystone22:29
*** adrian_otto has joined #openstack-keystone22:39
*** adrian_otto1 has joined #openstack-keystone22:41
*** adriant has joined #openstack-keystone22:43
*** adrian_otto has quit IRC22:44
*** martinlopes has joined #openstack-keystone22:45
*** lamt has joined #openstack-keystone22:52
*** ianw_pto is now known as ianw22:53
*** agrebennikov__ has quit IRC22:56
adriantmorgan: you about?22:58
*** spotz_zzz is now known as spotz23:08
morganadriant: o/23:08
*** lamt has quit IRC23:08
morganadriant: whats up?23:08
adriantmorgan: hello! Have been going through your patches for MFA, they look great! Was curious though if I could convince you to do a set of global default rules in the conf. :P23:09
adriantmorgan: user rules if present, of global defaults if present, or any of active plugins,23:09
adriantbecause I don't want users using TOTP by itself for example23:10
adriantand the only way to do that otherwise is set that as a rule for everyone...23:10
adriantas long as there is a good fall back if the globals aren't there, it won't break anything and will be purely optional23:11
adriantmorgan: can be done as a follow up later, just wondering if you're open to the idea.23:12
morgannope23:12
morgannot in this cycle23:12
morganright now the options will be landing (if this cycle) as Admin-set only23:13
morganin the future you can still maintain that and guarantee the logic such as not using totp in isolation is done23:13
*** adrian_otto1 has quit IRC23:13
adriantOh yeah, I was mainly thinking for Pike23:13
morganin pike i'd be open to discussion23:14
morganbut i wont commit one way or another at this point23:14
morgan:)23:14
adriantnot a problem. I don't expect us to have fully working MFA until at least Pike anyway. :P23:14
*** adrian_otto has joined #openstack-keystone23:15
*** spotz is now known as spotz_zzz23:17
adriantmorgan: looking at the patches up, seems the only thing left (apart from more review) is the API for actually adding rules.23:18
morgannot needed this cycle23:19
morganin fact, the rules are validated in the jsonschema and on the backend, the only thing we aren't validating *atm* is if the strings are valid auth methods23:19
morganbut the enforcement of such things is ensured at the auth controller23:19
adriantmorgan: yeah, so all that is missing is the API which uses that validation, which will come in Pike.23:20
morganif an invalid auth-method is supplied, it is removed. if an auth rule has no methods, the rule is removed (from processing) and if there are no rules, auth works like it does today23:20
adriantso for now the rules need to be set in the database?23:20
morganthe enforcement is already built.23:20
morganno, you set it with a post to update_user23:20
adriant OH23:20
adriantnvm ignore me23:21
morganuser['options']['multi_factor_auth_rules'] = [['password', 'totp'], ['token'], ...]23:21
adriantyeah, that's right23:21
morganit's baked in to use the new resource options23:21
morgani need to add some tests for it in the next patch23:21
morganbut that is all that is missing (and docs)23:21
adriantnice23:22
adriantI'll start looking at keystoneauth1 code for what we'll need to do there in Pike, and possibly even at the django openstack auth code23:23
adriantfrom what I remember from the discussion with jamielennox we'll need to make a "multi" plugin for keystoneauth23:24
adriantor something of the sort23:24
*** adrian_otto has quit IRC23:24
morganyep23:25
adriantwith sub-plugins for it which tell keystone auth what each auth method actually requires23:25
morgansub-plugins?23:28
morganjust allow ksa to accept multiple plugins cleanly23:28
morganit is likely just the multi-plugin can process multiple of the main plugins23:28
morgannot really any sub or "extra" plugins23:29
adriantThat was one of the things i was considering. Have the multi-plugin be a special case that wraps around multiple of the other ones.23:29
adriantwould be odd though, but likely the easiest way to do it without changing how ksa handles plugins entirely23:30
*** martinlopes has quit IRC23:37
*** martinlopes has joined #openstack-keystone23:39
*** thorst_ has quit IRC23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!