Tuesday, 2017-05-16

*** hoonetorg has joined #openstack-keystone00:09
*** thorst_afk has joined #openstack-keystone00:10
*** gyee has quit IRC00:22
*** piliman974 has joined #openstack-keystone00:25
*** dikonoor has joined #openstack-keystone00:45
*** harlowja has joined #openstack-keystone00:49
*** Shunli has joined #openstack-keystone00:56
*** zzzeek has quit IRC01:03
*** zzzeek has joined #openstack-keystone01:05
*** gongysh has joined #openstack-keystone01:07
*** zsli_ has joined #openstack-keystone01:08
*** Shunli has quit IRC01:11
*** masuberu has joined #openstack-keystone01:17
*** thorst_afk has quit IRC01:19
*** shuyingya has joined #openstack-keystone01:25
*** shuyingya has quit IRC01:26
*** shuyingya has joined #openstack-keystone01:26
*** shuyingya has quit IRC01:26
*** shuyingya has joined #openstack-keystone01:28
*** thorst_afk has joined #openstack-keystone01:28
*** zsli__ has joined #openstack-keystone01:29
*** zsli_ has quit IRC01:33
*** shuyingy_ has joined #openstack-keystone01:33
*** thorst_afk has quit IRC01:35
*** shuyingya has quit IRC01:37
*** harlowja has quit IRC01:42
*** Shunli has joined #openstack-keystone01:50
*** zsli__ has quit IRC01:50
openstackgerritMerged openstack/keystonemiddleware master: Update driver config parameter from string to list  https://review.openstack.org/46473201:55
*** harlowja has joined #openstack-keystone01:56
openstackgerritMerged openstack/python-keystoneclient master: Updated from global requirements  https://review.openstack.org/46446901:58
*** thorst_afk has joined #openstack-keystone02:03
*** thorst_afk has quit IRC02:04
openstackgerritMerged openstack/keystoneauth master: Updated from global requirements  https://review.openstack.org/46439202:08
openstackgerritMerged openstack/python-keystoneclient master: Stop using oslotest.mockpatch  https://review.openstack.org/46203802:08
*** aojea has joined #openstack-keystone02:11
adriantlbragstad, I swear I'm not trying to be a pain, just genuinely confused by the feature. :P02:12
openstackgerritMerged openstack/keystone master: Updated from global requirements  https://review.openstack.org/46439102:12
adriantIt makes sense for cloud providers where users can't talk API, but in openstack, well, it just isn't a problem.02:12
openstackgerritMerged openstack/keystone master: Remove X-Auth-Token from response parameters  https://review.openstack.org/46200802:13
*** aojea has quit IRC02:16
*** harlowja has quit IRC02:20
openstackgerritMerged openstack/keystoneauth master: Fix V3ADFSPassword retrieval of scoped token  https://review.openstack.org/46321202:31
*** gongysh has quit IRC02:39
*** ducttape_ has joined #openstack-keystone02:43
*** piliman974 has quit IRC02:46
*** ducttape_ has quit IRC02:48
*** namnh has joined #openstack-keystone03:01
*** thorst_afk has joined #openstack-keystone03:04
openstackgerritMerged openstack/keystone master: Add filter explain in api ref about parents_as_list and subtree_as_list  https://review.openstack.org/45830703:13
*** zsli_ has joined #openstack-keystone03:17
*** Shunli has quit IRC03:18
*** thorst_afk has quit IRC03:25
*** zsli_ has quit IRC03:29
*** dikonoor has quit IRC03:30
*** links has joined #openstack-keystone03:30
*** Shunli has joined #openstack-keystone03:33
*** Shunli has quit IRC03:34
*** nicolasbock has quit IRC03:35
*** Shunli has joined #openstack-keystone03:35
*** Shunli has quit IRC03:42
*** Shunli has joined #openstack-keystone03:43
*** lamt has joined #openstack-keystone03:54
*** Shunli has quit IRC04:02
openstackgerritMerged openstack/python-keystoneclient master: Remove log translations in python-keystoneclient  https://review.openstack.org/44780504:11
*** dikonoor has joined #openstack-keystone04:16
*** faizy_ has joined #openstack-keystone04:22
*** lamt has quit IRC04:26
*** faizy has quit IRC04:26
adriantcmurphy, you about?04:34
*** lamt has joined #openstack-keystone04:37
openstackgerritMerged openstack/keystonemiddleware master: Updated from global requirements  https://review.openstack.org/45592704:38
cmurphyadriant: hi04:43
adriantcmurphy, Hey, I totally agree with your point, I just don't think a new user-like model is the right approach :)04:44
adriantnon-admins need some way of creating users.04:44
cmurphyadriant: i think that's valid04:45
adriantIt's a problem with keystone I've been beating my head against for ages, and just writing other stuff outside of keystone to handle for me with a admin user.04:45
cmurphyadriant: i'm currently tracking down all the open specs related to this issue, some of them propose refitting existing models rather than inventing new ones04:46
adriantI think we have all the pieces we need in keystone to do this already, just... we need better control and policy over them.04:47
adriantcmurphy, do tell me what you find, I sadly haven't been following this particular problem upstream as much as I should have04:48
cmurphyadriant: i'll add it to the thread04:48
*** lamt has quit IRC04:52
*** lamt has joined #openstack-keystone04:56
*** lamt has quit IRC05:01
*** jamielennox is now known as jamielennox|away05:10
*** thorst_afk has joined #openstack-keystone05:22
*** thorst_afk has quit IRC05:26
*** jamielennox|away is now known as jamielennox05:30
*** links has quit IRC05:33
openstackgerrityangweiwei proposed openstack/keystone master: Update utils method in federation  https://review.openstack.org/46493305:33
openstackgerritDivya K Konoor proposed openstack/keystoneauth master: Re-use token passed in for v3 Token  https://review.openstack.org/46493405:40
*** links has joined #openstack-keystone05:41
*** Shunli has joined #openstack-keystone05:43
*** harlowja has joined #openstack-keystone05:47
*** arturb has joined #openstack-keystone06:04
*** ducttape_ has joined #openstack-keystone06:06
*** ducttape_ has quit IRC06:11
*** pcaruana has joined #openstack-keystone06:22
*** gongysh has joined #openstack-keystone06:27
*** rcernin has joined #openstack-keystone06:32
*** zsli_ has joined #openstack-keystone06:34
*** gongysh has quit IRC06:35
*** zsli_ has quit IRC06:36
*** Shunli has quit IRC06:37
*** tobberydberg has joined #openstack-keystone06:39
*** tobberydberg has quit IRC06:39
*** tobberydberg has joined #openstack-keystone06:39
*** davechen has quit IRC06:40
*** davechen has joined #openstack-keystone06:41
*** harlowja has quit IRC06:50
*** edmondsw has joined #openstack-keystone06:53
*** jaosorior has quit IRC06:53
*** adriant has quit IRC06:57
*** edmondsw has quit IRC06:57
*** belmoreira has joined #openstack-keystone07:00
*** jamielennox is now known as jamielennox|away07:07
*** aojea has joined #openstack-keystone07:20
openstackgerritrocky proposed openstack/keystone master: Migrate render_token_data_response to keystone.common.controller  https://review.openstack.org/46495607:26
*** jamielennox|away is now known as jamielennox07:34
*** jaosorior has joined #openstack-keystone07:43
*** zzzeek has quit IRC08:00
*** zzzeek has joined #openstack-keystone08:00
*** ducttape_ has joined #openstack-keystone08:08
*** faizy_ has quit IRC08:11
*** ducttape_ has quit IRC08:15
*** mvk has quit IRC08:19
*** jaosorior is now known as jaosorior_lunch08:20
*** thorst_afk has joined #openstack-keystone08:24
*** thorst_afk has quit IRC08:29
*** mvk has joined #openstack-keystone08:51
*** shuyingy_ has quit IRC08:56
*** shuyingya has joined #openstack-keystone08:56
*** arturb has quit IRC08:56
*** belmoreira has quit IRC09:01
*** aojea has quit IRC09:03
*** aojea has joined #openstack-keystone09:04
*** luisnho223 has joined #openstack-keystone09:04
*** luisnho223 has left #openstack-keystone09:06
*** jaosorior_lunch is now known as jaosorior09:15
*** thorst_afk has joined #openstack-keystone09:25
*** thorst_afk has quit IRC09:44
openstackgerritDivya K Konoor proposed openstack/keystoneauth master: Re-use token passed in for v3 Token  https://review.openstack.org/46493409:48
*** piliman974 has joined #openstack-keystone09:54
*** nicolasbock has joined #openstack-keystone10:03
samueldmqmorning keystone10:06
*** mvk has quit IRC10:06
*** mvk has joined #openstack-keystone10:12
*** namnh has quit IRC10:18
bretonmorning10:26
*** thorst_afk has joined #openstack-keystone10:41
*** thorst_afk has quit IRC10:45
*** aojea has quit IRC10:53
*** raildo has joined #openstack-keystone11:02
openstackgerritrocky proposed openstack/keystone master: Migrate render_token_data_response to keystone.common.controller  https://review.openstack.org/46495611:03
*** thorst_afk has joined #openstack-keystone11:12
*** asettle_ is now known as asettle11:13
*** belmoreira has joined #openstack-keystone11:34
*** jhesketh has quit IRC11:39
*** tobberyd_ has joined #openstack-keystone11:41
*** jhesketh has joined #openstack-keystone11:41
*** shuyingy_ has joined #openstack-keystone11:42
*** tobberydberg has quit IRC11:44
*** piliman974 has quit IRC11:44
*** tobberydberg has joined #openstack-keystone11:45
*** tobberyd_ has quit IRC11:45
*** shuyingya has quit IRC11:45
*** nicolasbock has quit IRC11:58
*** nicolasbock has joined #openstack-keystone11:58
*** thorst_afk is now known as thorst12:05
*** ducttape_ has joined #openstack-keystone12:06
*** ducttape_ has quit IRC12:11
*** dave-mccowan has joined #openstack-keystone12:21
*** raildo has quit IRC12:34
*** raildo has joined #openstack-keystone12:34
*** ducttape_ has joined #openstack-keystone12:34
*** edmondsw has joined #openstack-keystone12:35
*** ducttape_ has quit IRC12:35
*** shuyingya has joined #openstack-keystone12:42
*** shuyingy_ has quit IRC12:45
*** morgan_ is now known as morgan12:49
*** lamt has joined #openstack-keystone12:50
*** lamt has quit IRC12:51
*** lamt has joined #openstack-keystone12:55
*** piliman974 has joined #openstack-keystone13:02
*** iurygregory has joined #openstack-keystone13:03
*** prashkre has joined #openstack-keystone13:04
*** edmondsw_ has joined #openstack-keystone13:08
*** tobberydberg has quit IRC13:08
*** tobberydberg has joined #openstack-keystone13:08
*** edmondsw has quit IRC13:09
*** edmondsw_ has quit IRC13:09
*** edmondsw has joined #openstack-keystone13:09
*** shuyingya has quit IRC13:15
*** admcleod has quit IRC13:18
*** prashkre_ has joined #openstack-keystone13:20
*** prashkre has quit IRC13:20
*** admcleod has joined #openstack-keystone13:21
*** aojea has joined #openstack-keystone13:21
*** aojea has quit IRC13:27
*** jrist has quit IRC13:43
*** rcernin has quit IRC13:48
*** lamt has quit IRC13:49
*** rcernin has joined #openstack-keystone13:49
*** shuyingya has joined #openstack-keystone13:51
*** spilla has joined #openstack-keystone13:52
*** aojea has joined #openstack-keystone13:52
*** ducttape_ has joined #openstack-keystone13:52
*** jaosorior is now known as jaosorior_away14:00
*** shuyingy_ has joined #openstack-keystone14:04
*** lamt has joined #openstack-keystone14:06
*** shuyingya has quit IRC14:08
*** tobberyd_ has joined #openstack-keystone14:14
*** tobberydberg has quit IRC14:16
lbragstado/14:17
*** tobberyd_ has quit IRC14:19
*** tobberydberg has joined #openstack-keystone14:20
gagehugoo/14:20
*** tobberydberg has quit IRC14:22
*** tobberydberg has joined #openstack-keystone14:22
*** tobberydberg has quit IRC14:27
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Specification for global roles  https://review.openstack.org/46476314:48
lbragstadcmurphy: ^ addressed your comments, thanks for the review!~14:48
knikollao/14:51
*** kfarr has joined #openstack-keystone14:56
*** edtubill has joined #openstack-keystone14:56
*** links has quit IRC14:58
kfarrHi Keystone team!  I am working on getting a gate running with only Keystone and Barbican, but devstack seems to be failing when it attempts to start Keystone15:01
kfarrhttp://logs.openstack.org/58/344458/5/experimental/gate-barbican-kmip-dsvm-functional-ubuntu-xenial-nv/06240aa/logs/devstacklog.txt.gz15:01
kfarrThe enabled services are as follows: ENABLED_SERVICES=barbican-pykmip,pykmip-server,tempest,keystone15:01
kfarr(the pykmip services are barbican-related)15:01
kfarrso I suspect I need the mysql service enabled as well?15:02
kfarrJust wondering if someone could please confirm which services are needed to run a standalone keystone devstack15:03
lbragstadkfarr: whenever I use devstack to stand up a stand along keystone service - I enable mysql15:03
kfarrlbragstad ok thanks, do I also need rabbit?15:04
lbragstadkfarr: this is what i use - ENABLED_SERVICES=rabbit,mysql,key15:04
bretonwhy does nova client require auth_url? Why can't it just use the session?15:05
lbragstadkfarr: i'd start by adding your barbican services to that and see if that helps15:05
bretonoh, ok, it doesn't require.15:06
openstackgerritBlake Covarrubias proposed openstack/keystoneauth master: Allow setting EndpointReference in ADFSPassword  https://review.openstack.org/46343215:07
*** piliman974 has quit IRC15:10
*** prashkre_ has quit IRC15:18
*** prashkre_ has joined #openstack-keystone15:18
kfarrlbragstad ok thank you!  I will try it out15:18
*** dikonoor has quit IRC15:23
lbragstadkfarr: cool - let me know how it works out15:29
*** arunkant_ has joined #openstack-keystone15:29
*** tobberydberg has joined #openstack-keystone15:31
*** arunkant has quit IRC15:33
openstackgerritGage Hugo proposed openstack/keystone master: is_admin_project check for non scoped operations  https://review.openstack.org/25763615:33
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Specification for global roles  https://review.openstack.org/46476315:35
*** prashkre_ has quit IRC15:39
*** prashkre_ has joined #openstack-keystone15:39
*** prashkre_ has quit IRC15:42
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Outline policy goals  https://review.openstack.org/46034415:49
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Specification for global roles  https://review.openstack.org/46476315:49
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Add policy roadmap for security  https://review.openstack.org/46273315:49
*** bkudryavtsev has joined #openstack-keystone15:49
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Outline policy goals  https://review.openstack.org/46034415:52
*** aojea has quit IRC15:52
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Add policy roadmap for security  https://review.openstack.org/46273315:52
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Specification for global roles  https://review.openstack.org/46476315:52
*** shuyingy_ has quit IRC15:55
*** tobberydberg has quit IRC15:55
*** tobberydberg has joined #openstack-keystone15:56
*** tobberydberg has quit IRC15:57
*** tobberydberg has joined #openstack-keystone15:57
lbragstadthe keystone-specs gate appears to be broken16:00
gagehugoI think it's Jenkins, the openstack-helm docs gate is borked too16:01
gagehugosame error16:01
lbragstadgagehugo:  i was able to recreate it locally16:02
*** tobberydberg has quit IRC16:02
lbragstadhttp://paste.openstack.org/show/609693/16:03
gagehugohttps://bugs.launchpad.net/pbr/+bug/169112916:03
openstackLaunchpad bug 1691129 in PBR "sphinx 1.6.1 introduces an attribute error" [Undecided,New]16:03
lbragstadaha - yeah that looks about right16:04
lbragstadsphinx 1.5.6 works for me locally16:06
bkudryavtsevMorning :-) Trying to setup keystone with LDAP backend here. Confused on how id's are created. Should they be generated by hand when creating ldap entries, or am I missing something?16:06
*** rderose has joined #openstack-keystone16:09
bkudryavtseve.g cn=a14dc9d9926ae250fb8a8313bf554be7,ou=Users,dc=openstack,dc=org16:09
*** cmurphy has quit IRC16:14
lbragstadbkudryavtsev: are you following a guide?16:18
*** kfarr has quit IRC16:18
bkudryavtsevNot quite. There is no direct guide that I could find, so I'm experimenting. Here's what my initial ldap directory looks like: http://paste.openstack.org/show/609702/16:21
bkudryavtsevThe admin id (CN) is the one generated by bootstrap for sql initially16:22
*** ducttape_ has quit IRC16:24
*** ducttape_ has joined #openstack-keystone16:25
*** tobberydberg has joined #openstack-keystone16:27
*** belmoreira has quit IRC16:30
*** tobberydberg has quit IRC16:31
bkudryavtsevIt works, but id's need to be generated by hand. Doesn't seem to be right.16:38
lbragstadbkudryavtsev: when you say "by hand" do you mean manually in LDAP?16:38
bkudryavtsevYes. I am generating the shasum and manually adding it to ldap16:39
bkudryavtsevCreating users through the openstack client does not work as well, but as I understand, that's how it should be with LDAP. Or am I wrong?16:41
lbragstadbkudryavtsev: got it - keystone doesn't support writing to ldap16:41
lbragstadfor identity backends16:41
lbragstadthat functionality was deprecated in mitaka16:41
bkudryavtsevMakes sense16:41
lbragstadhttps://docs.openstack.org/releasenotes/keystone/mitaka.html16:41
bkudryavtsevBut if users are created manually in LDAP, how should ID's be generated?16:42
lbragstadbkudryavtsev: that's a good question - keystone doesn't have an opinion on that as far as I know16:43
lbragstada safe assumption might be to use uuid4 since that's how we generate the ids when using sql backends16:43
ayoungwe meet in an hour 15, right?16:44
lbragstadayoung: yep16:44
ayoungTY16:44
lbragstadbkudryavtsev: otherwise something that ensures global uniqueness16:44
*** piliman974 has joined #openstack-keystone16:46
*** jdennis1 has joined #openstack-keystone16:46
*** jdennis has quit IRC16:47
*** jdennis1 has quit IRC16:48
*** jdennis has joined #openstack-keystone16:50
*** jdennis has quit IRC16:51
*** jdennis has joined #openstack-keystone16:52
*** pcaruana has quit IRC16:53
*** rcernin has quit IRC16:53
*** cmurphy has joined #openstack-keystone16:54
lbragstadmorgan: o/17:03
*** ducttap__ has joined #openstack-keystone17:04
bkudryavtsevIs there a specific reason that CN is the default attribute for uuid's? It seems much more convenient to use CN for names instead (and have SN or OU be the id)17:05
*** ducttape_ has quit IRC17:05
openstackgerritLance Bragstad proposed openstack/keystone master: Update sample configuration file for Pike  https://review.openstack.org/46512117:06
openstackgerritLance Bragstad proposed openstack/keystone master: Update sample configuration file for Pike  https://review.openstack.org/46512117:07
*** sjain has joined #openstack-keystone17:11
*** ducttap__ has quit IRC17:16
openstackgerritSamuel de Medeiros Queiroz proposed openstack/keystoneauth master: Allow setting EndpointReference in ADFSPassword  https://review.openstack.org/46343217:21
openstackgerritKristi Nikolla proposed openstack/keystone master: Handle NotFound when listing role assignments for deleted users  https://review.openstack.org/45895417:21
*** tobberydberg has joined #openstack-keystone17:28
samueldmqknikolla: couple of comments on the tests, otherwise looks great! ^17:28
*** tobberydberg has quit IRC17:32
*** raildo has quit IRC17:34
*** prashkre has joined #openstack-keystone17:35
*** harlowja has joined #openstack-keystone17:50
*** raildo has joined #openstack-keystone17:52
lbragstadmorgan: did you happen to have an idea of what constitutes a highly-threaded server versus a low-threaded server in this comment? https://github.com/openstack/oslo.cache/blob/master/oslo_cache/_opts.py#L32-L4517:53
*** tobberydberg has joined #openstack-keystone17:56
*** edtubill has quit IRC17:57
*** ducttape_ has joined #openstack-keystone17:58
*** ducttap__ has joined #openstack-keystone17:59
knikollasamueldmq: thanks for the quick review. :)17:59
*** henrynash has joined #openstack-keystone18:00
*** tobberydberg has quit IRC18:00
lbragstadmorgan: i'm specifically asking about https://bugs.launchpad.net/keystone/+bug/169075618:01
openstackLaunchpad bug 1690756 in oslo.cache "cache 'backend' argument description is ambiguous" [Undecided,New]18:01
knikollalbragstad: meeting time?18:01
*** mvk has quit IRC18:01
*** ducttape_ has quit IRC18:03
*** gyee has joined #openstack-keystone18:06
*** openstackgerrit has quit IRC18:17
*** henrynash has quit IRC18:22
*** rmascena has joined #openstack-keystone18:22
*** henrynash has joined #openstack-keystone18:22
*** raildo has quit IRC18:24
*** rmascena is now known as raildo18:24
*** jose-phillips has quit IRC18:27
*** jose-phillips has joined #openstack-keystone18:27
*** henrynash has quit IRC18:29
samueldmqsjain: hi18:39
*** spilla has quit IRC18:39
asettlelbragstad: yo I missed your pings :)18:47
lbragstadasettle: you going to be around in 15 minutes?18:47
asettleUhhhh18:48
asettleIn theory?18:48
asettleI'll be cooking dinner I hope :P18:48
lbragstadaha :)18:48
lbragstadasettle: couple questions on docs liaison things18:48
asettlelbragstad: shoot them my way and I'll answer intermittently? :D18:48
lbragstadasettle: we had a session at the forum about the future of the docs team, are we still going to need docs liaison?18:49
lbragstadasettle: we have a couple folks who are interested in helping out, but might not be able to commit to the entire role18:55
*** openstackgerrit has joined #openstack-keystone18:58
openstackgerritayoung proposed openstack/keystone-specs master: Commit to RBAC in middleware in Pike release  https://review.openstack.org/45219818:58
*** hrybacki has joined #openstack-keystone19:01
openstackgerritayoung proposed openstack/keystone-specs master: Role Check on Body Key  https://review.openstack.org/45697419:01
edmondswayoung there are things that are only readable by admin today... adding middleware is not going to change that19:01
ayoungedmondsw, yes it will, and I am going to make you walk me through it19:02
asettlelbragstad: A docs liaison would definitely be helpful :) just someone we can reach out to on an intermittent basis (you know, questions, concerns - a point of contact, really)19:02
edmondswayoung middleware can make things more restrictive... not less19:02
ayoungedmondsw, I know.  But I am not saying "never shall an operator edit a policy file ever again"19:02
ayoungedmondsw, I am saying we can't have people edit a policy file to manage RBAC.19:03
ayoungWhat I can do is post a sample policy file that lets them, then, manage RBAC via this API for APIS that are too restrictive19:03
*** aojea has joined #openstack-keystone19:04
edmondswayoung and if the admin role restriction is in code rather than policy?19:04
ayoungedmondsw, then file a bug and fix it.19:04
lbragstadasettle: cool - so hrybacki knikolla and cmurphy were all curious about the responsibilities19:04
edmondswayoung that's the kind of thing I'm trying to get fixed19:05
ayoungedmondsw, a lot of stupid has been done.  Mostly because the tools required to fix it were not in place.19:05
edmondswI'd give different reasons, but I agree that there's a lot of stupid19:05
asettlelbragstad (cc hrybacki knikolla and cmurphy ) - the responsibilities vary. We mostly just require that hte individual is able to be contacted for doc related questions. Occasionally this will mean verifying a patch for us on the docs gerrit page, helping us triage bugs related to keystone, and other random activities.19:06
asettleWe do have a docs meeting, butw e're probably going to change that, so, hoepfully we'll have it at a better time slot for everyone19:06
lbragstadasettle: nice19:07
hrybackiasettle: is the next meeting this or next Thursday?19:07
openstackgerritKristi Nikolla proposed openstack/keystone master: Handle NotFound when listing role assignments for deleted users  https://review.openstack.org/45895419:07
asettlehyakuhei: this thursday, 2100 UTC #openstack-meeting-alt19:10
asettleNormally hosted by me, unless I forget, and keep watching television as per last time :P19:10
asettleIt's fortnightly :)19:10
ayoungedmondsw, I'm hearing a lot of "No because something else is broken." And I am saying "without a replacement we cannot fix what is broken."  We don't need new spacs for  the 968696 work, we need current patches to be reviewed, improved, and merged.  We have a slew of people that are going to take on that work, and it is laid out in the agenda for the policy meeting tomorrow.19:10
ayoungBut if the RBAC middleware stuff gets blocked, that is it.  We are saying we can't fix it.  We have people actively working on it.19:12
ayoungAll I want is the guaranteee from keystone core that it is going to be accepted.19:12
ayoungThe majority of the concerns I've heard have been covered by the default rules.19:12
ayoungUpgrades that add a new API will be covered by a default rule like this:19:13
ayoungVERB: *  path: * role: Member19:13
ayoungAnd, unless they make a new API that should only be done by Admin, that will work just fine for the first rotation19:13
ayoungif the API should be Admin only, they continue to enforce that in policy for now19:14
*** slberger has joined #openstack-keystone19:14
ayoungonce we have a good sense of the actual library of APIs, we switch the default rule to19:14
ayoungVERB: *  path: * role: admin19:14
ayoungand now all new APIs are opt-in by default19:14
ayoungsomething new comes up that should be member or lower, needs a new, explicit route19:14
*** slberger has left #openstack-keystone19:15
ayounglbragstad, ^^ is the upgrade story.  I'm going to add that and more details to the spec19:15
openstackgerritKristi Nikolla proposed openstack/keystone master: Handle NotFound when listing role assignments for deleted users  https://review.openstack.org/45895419:16
knikollasamueldmq: would appreciate another review :) ^^19:16
*** harlowja has quit IRC19:17
samueldmqknikolla: reviewed19:18
samueldmqknikolla: let me know if that makes sense to you19:18
knikollasamueldmq: it does make sense. since i was debugging the test i know it's not empty, but i'll add a check anyway. thanks19:18
samueldmqknikolla: nice19:20
*** prashkre has quit IRC19:21
lbragstadayoung: that would probably work for most upgrade cases - but there is a disconnect with the defaults provided by the policy in code at the service19:23
ayounglbragstad, I'm aware.  But to date those are Admin only with few exceptions19:23
ayoungand, the exceptions I know of are actually non functional in the deploys I've seen, as they depend on roles that are not created19:24
ayoungadvsvc19:24
openstackgerritKristi Nikolla proposed openstack/keystone master: Handle NotFound when listing role assignments for deleted users  https://review.openstack.org/45895419:30
knikollasamueldmq: all done19:30
lbragstadayoung: do we have a plan in place for mitigating that in the future?19:31
openstackgerritKristi Nikolla proposed openstack/keystone master: Handle NotFound when listing role assignments for deleted users  https://review.openstack.org/45895419:31
ayounglbragstad, yeah.  Here is what I just put in the spec19:31
ayounghttp://paste.openstack.org/show/609714/19:32
ayounglbragstad, we should have a pretty good inventory of the APIs from the API docs today.  Just assuming it won't be 100% out the door19:33
ayounganother alternative would be to not do a catch all, or do a catch all with a role that you never assign, and then find out what APIs you just can't call....19:34
samueldmqknikolla: thanks well done19:34
knikollasamueldmq: thanks19:35
knikollaeasy fix19:35
knikollai'm getting a lot of failures when i run the test locally on master19:37
samueldmqknikolla: ++ one bug less yay19:37
knikollai predict a broken gate19:37
knikollaor wait, i hadn't pulled. will report back soon.19:41
knikollaall appears good. i didn't have the fixes for the oslo.config changes19:43
*** sjain has quit IRC19:50
openstackgerritFelipe Monteiro proposed openstack/keystone-specs master: Patrole (RBAC) Keystone Gating  https://review.openstack.org/46467819:59
*** slberger has joined #openstack-keystone20:03
ayoungknikolla, +2A.  Not sticky if it fails CI, of course.20:04
*** harlowja has joined #openstack-keystone20:04
*** slberger has left #openstack-keystone20:05
knikollaayoung: thanks.20:05
openstackgerritayoung proposed openstack/keystone-specs master: Commit to RBAC in middleware in Pike release  https://review.openstack.org/45219820:06
lbragstadbreton: edmondsw is https://bugs.launchpad.net/keystone/+bug/1684994 invalid now that https://bugs.launchpad.net/keystone/+bug/1687115 is opened?20:07
openstackLaunchpad bug 1684994 in OpenStack Identity (keystone) "POST v3/auth/tokens API is returning unexpected 500 error when ldap credentials are incorrect" [Undecided,New]20:07
openstackLaunchpad bug 1687115 in OpenStack Identity (keystone) "LDAPServerConnectionError gives out too much info" [Low,In progress] - Assigned to xuhaigang (rocky0722)20:07
lbragstadI wouldn't mind closing the first one, but i'm also not sure why we didn't just reuse the original bug report20:08
edmondswlbragstad I think they're different, and the first one's fix would rely on the changes made under the second20:08
edmondswbut add to them20:08
jose-phillipshey someone20:09
jose-phillipscan help me with something really quick20:09
jose-phillipsim trying to connect to keystone20:09
jose-phillipsexternally20:09
jose-phillipsbut when i tried i got this error20:09
jose-phillips Unable to establish connection to http://10.1.20.2:35357/v2.0/projects:20:09
jose-phillipsthis ip address is wrong20:10
jose-phillipsis the internal ip of the server20:10
*** dave-mccowan has quit IRC20:10
ayoungjose-phillips, config options20:10
knikollajose-phillips: is this devstack?20:10
jose-phillipsno im running on my computer to a productive fuel openstack20:10
jose-phillipsusing python-keystoneclient20:10
jose-phillipswith nova works great20:10
*** markvoelker has joined #openstack-keystone20:11
ayoungjose-phillips, look at the keystone.conf file for the values public_endpoint and admin_endpoint20:11
lbragstadedmondsw: what's the fix for https://bugs.launchpad.net/keystone/+bug/1684994 then if https://bugs.launchpad.net/keystone/+bug/1687115 fixes subclassing?20:11
openstackLaunchpad bug 1684994 in OpenStack Identity (keystone) "POST v3/auth/tokens API is returning unexpected 500 error when ldap credentials are incorrect" [Undecided,New]20:11
openstackLaunchpad bug 1687115 in OpenStack Identity (keystone) "LDAPServerConnectionError gives out too much info" [Low,In progress] - Assigned to xuhaigang (rocky0722)20:11
knikollajose-phillips: 10.*.*.* are private ip addresses20:11
ayoungif you are using discovery, those values might be messing you up.  They should be explicitly unset (I think)20:11
jose-phillipsoh20:11
jose-phillipsi saw the values on ocnfig20:11
jose-phillipsadmin have the internal ip20:12
jose-phillipsi should set public_endpoint?20:12
ayoungNo20:12
ayoungdo not explicitly set them20:12
ayoungand if they are set, unset them20:12
edmondswlbragstad start raising LDAPServerConnectionError when LDAP credentials are invalid20:12
jose-phillipsjust admin endpoint is set20:12
ayoungconfig options there are used for the discovery page, and if set to the internal values, will mess up the clients20:12
jose-phillipsexist a way to force on the keystoneclient connection20:12
ayoungjose-phillips, what is it set to?  The internal value?20:12
jose-phillipsi mean on python-keystone client20:13
edmondswlbragstad, under 1687115, change LDAPServerConnectionError to use a more generic error message and HTTP 500 instead of 50420:13
ayounglook in keystone.conf20:13
*** raildo has quit IRC20:13
edmondswlbragstad then once it's more generic you're free to use it for other things like invalid credentials20:13
openstackgerritMerged openstack/keystoneauth master: Allow setting EndpointReference in ADFSPassword  https://review.openstack.org/46343220:14
jose-phillipso should set20:15
jose-phillipspublic_bind_host?20:16
lbragstadedmondsw: oh - like in valid LDAP credentials when a user authenticates?20:16
edmondswlbragstad I'm not super invested in that... if we like returning 504 for the current case that raises that exception, we could just cleanup the corresponding error message and invalidate 168499420:16
edmondswlbragstad invalid LDAP credentials as in the credentials that are in keystone's conf that allow it to authenticate itself to the LDAP server20:17
edmondswnot the user's credentials20:17
edmondswwe opened this because I got a bug saying that when those LDAP credentials expire, the error that is returned to the user doesn't give them any clue as to what's wrong20:17
edmondswI don't want it to says the LDAP credentials are invalid, which is giving away too much information to your end user20:18
edmondswbut I thought maybe it could give a more generic message20:18
lbragstadedmondsw: oh - sure20:18
ayoungjose-phillips, that is Deprecate. Set none of it20:18
lbragstadedmondsw: and when those expire anything that uses that connection will emit that error20:18
edmondswyeah20:18
lbragstadgot it20:19
ayoungjose-phillips, it might also be that the values are coming out of the service catalog, in which case, your installer put private values in there20:19
ayoung35357 is needed for admin ops, but the client gets the values from the service catalog.20:19
edmondswlbragstad today it says "An unexpected error prevented the server from fulfilling your request", and it seemed like we could give a message with a little more detail than that without saying your configured creds are bad20:20
edmondswlbragstad but at the end of the day, it's already an HTTP 500, which is the right code, and when a user sees that they should talk to the operator, and when they look at the logs the problem is pretty clear, so... improving the error message here is almost a nit20:22
lbragstadedmondsw: yeah - it seems the majority of that fix lies in https://bugs.launchpad.net/keystone/+bug/168711520:24
openstackLaunchpad bug 1687115 in OpenStack Identity (keystone) "LDAPServerConnectionError gives out too much info" [Low,In progress] - Assigned to xuhaigang (rocky0722)20:24
lbragstadwhich is fixing the actual security bits20:24
*** nkinder has quit IRC20:27
openstackgerritMerged openstack/keystone master: Role name is unique within the owning domain  https://review.openstack.org/46429020:29
openstackgerritMerged openstack/keystone master: Update sample configuration file for Pike  https://review.openstack.org/46512120:30
*** thorst has quit IRC20:31
bkudryavtsevUnrelated: when user_id_attribute is set to sn in keystone.conf, group users (members) are not listed upon `openstack user list --domain mydomain --group mygroup`. After digging through the code, it seems that group users are searched by dn only. Considering that my ldap directory is setup correctly (http://paste.openstack.org/show/609719/), could this be a bug? A plain `openstack user list` works OK and lists all the users.20:32
edmondswlbragstad yeah, https://bugs.launchpad.net/keystone/+bug/1684994 would probably just be a one-line fix to start raising the exception in a new case, once the fix goes in for the other bug20:33
openstackLaunchpad bug 1684994 in OpenStack Identity (keystone) "POST v3/auth/tokens API is returning unexpected 500 error when ldap credentials are incorrect" [Low,New]20:33
lbragstadedmondsw: ack20:37
*** nkinder has joined #openstack-keystone20:39
*** ducttap__ has quit IRC20:50
*** thorst has joined #openstack-keystone20:51
edmondswlbragstad did you mean to mark ocata fix released on https://bugs.launchpad.net/keystone/+bug/1662762 ?20:54
openstackLaunchpad bug 1662762 in OpenStack Identity (keystone) ocata "Authentication for LDAP user fails at MFA rule check" [High,Fix committed] - Assigned to Matthew Edmonds (edmondsw)20:54
edmondswyou added the comment, but didn't mark it20:54
*** thorst has quit IRC20:55
*** thorst has joined #openstack-keystone20:59
*** thorst has quit IRC21:02
*** DavidPurcellATT has joined #openstack-keystone21:05
lbragstadedmondsw: no - i just wanted to leave the comment so that folks subscribed to the bug knew it was released21:08
*** raildo has joined #openstack-keystone21:08
edmondswlbragstad so why not mark it released at the top?21:08
*** slberger has joined #openstack-keystone21:08
*** slberger has left #openstack-keystone21:09
lbragstadedmondsw: I suppose I could do that - i was looking at the milestones21:09
lbragstadedmondsw: dione21:09
lbragstaddone*21:09
edmondswlbragstad cool... I was wondering if there was something I was missing21:09
knikollathis is probably why keystone-specs gate is failing http://lists.openstack.org/pipermail/openstack-dev/2017-May/116821.html21:10
knikollathe first bug linked is exactly the error by which keystone-specs fails21:10
*** thorst has joined #openstack-keystone21:11
knikollalbragstad: i see you posted in that bug already. guess i'm too slow, haha.21:11
lbragstadknikolla: yep - we have some patches up for the fix - https://review.openstack.org/#/q/topic:bug/169122421:12
knikollalbragstad: :) capping is not exactly a fix, but nevertheless it should unblock things21:15
lbragstadknikolla: true - i mis-typed21:21
lbragstadit should get us around the issue while a real fix is committed upstream21:21
*** eandersson has joined #openstack-keystone21:23
*** ducttape_ has joined #openstack-keystone21:23
knikollaayoung: i saw a spec you had up 1 year and a half ago about token constraints. i received a similar proposal by one of our researchers who is doing a security study on openstack asking me for feedback. what was the reasoning behind dropping that spec?21:26
knikollaayoung: I'm curious about your "I think we are headed this way by other means" comment.21:26
*** mvk has joined #openstack-keystone21:29
*** lamt has quit IRC21:31
ayoungknikolla, the RBAC spec is the primary one21:31
*** rderose has quit IRC21:32
ayoungknikolla, there was a lot of pushback against using the service catalog as a way to say "this token is valid for this service"21:32
ayoungand so doing anything like that would require additional data, essentially duplicating the service catalog21:32
ayoungthe RBAC stuff, plus the ability to request a token with a single role in it is the only thing that I could see actually making it through the review process, but obviously people here are too hard headed to even make progress on that.21:33
ayoungI'm really sick of it21:33
*** raildo has quit IRC21:35
knikollaayoung: i see. with enough role granularity, having a token with a single role is like having a token constrained to an operation. makes sense.21:36
ayoungknikolla, right21:36
ayoungknikolla, I think that we will eventually need better ways to specify sets of roles, so that "list roles" doesn't return everything in the system21:37
ayounghence the 3 tiered approach from the talk21:37
knikollaayoung: agree.21:38
ayoungI could see the domain specific roles as the org roles.  Member and admin get broken into workflow roles.  Specirfic operations get role names that match the current policy rules.  So compute:create_server would become a role, but you only see it if you add the --operational flag21:38
knikollaayoung: it makes much more sense to me than what we currently have, and i hope we get there.21:40
ayoungknikolla, we will.  Tomorrow at the policy meeting I have on the agenda the set of tasks with names next to them21:42
ayoungmy challenge to people will be "lead, follow, or get out of the way"21:43
ayoungWe need to hit the 968696 stuff, and having people dedicated to that should make people a little more comfortable with taking following steps21:43
*** thorst has quit IRC21:51
*** aojea has quit IRC21:55
*** blake has joined #openstack-keystone21:56
*** henrynash has joined #openstack-keystone21:59
*** edmondsw has quit IRC21:59
*** edmondsw has joined #openstack-keystone22:00
blakejamielennox or samueldmq: Would either of you mind looking at this? https://bugs.launchpad.net/keystoneauth/+bug/168731422:03
openstackLaunchpad bug 1687314 in keystoneauth "ADFSPassword plugin not registered in entrypoints" [Undecided,In progress] - Assigned to Blake Covarrubias (blakegc)22:03
blakeFinal change to wrap up my ADFSPassword related changes22:04
*** edmondsw has quit IRC22:04
*** DavidPurcellATT has quit IRC22:15
blakesamueldmq: Thank you!22:15
*** henrynash has quit IRC22:35
*** dave-mccowan has joined #openstack-keystone22:36
rm_workhey, does keystone support setting a "default region"?22:38
rm_workI've read some stuff that indicates to me that the concept of a default region exists, but I can't find proof of this, or how to get/set it22:38
bretonrm_work: what's "default region"?22:40
rm_workI don't even know22:40
rm_workI mean like22:40
rm_workI guess if you asked the catalog for an endpoint, and didn't specify a region, would it just 400? or would it select one from a "default" region (maybe hardcoded in config?)22:41
rm_worklike I found this: https://github.com/rackerlabs/mimic/issues/657 which is for some rackspace thing22:42
rm_workso is it only a Rackspace Identity concept?22:42
rm_worklbragstad: ^^22:43
openstackgerritMerged openstack/keystone master: Handle NotFound when listing role assignments for deleted users  https://review.openstack.org/45895422:46
rm_workalso, is there a reason there isn't a way to "list roles for a user for ALL projects"?22:47
rm_worknot seeing anything in docs22:47
*** adriant has joined #openstack-keystone22:56
*** piliman974 has quit IRC23:10
*** blake has quit IRC23:15
*** portdirect has joined #openstack-keystone23:19
*** ducttape_ has quit IRC23:29
*** jmccrory is now known as jmccrory_awaythi23:30
*** jmccrory_awaythi is now known as jmccrory_away23:30
openstackgerritMerged openstack/keystoneauth master: Add ADFSPassword to keystoneauth1 entry points  https://review.openstack.org/46323423:33
*** Aurelgadjo has quit IRC23:36
*** piliman974 has joined #openstack-keystone23:39
*** Aurelgadjo has joined #openstack-keystone23:43
*** thorst has joined #openstack-keystone23:51
*** thorst has quit IRC23:56

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!