Friday, 2017-08-04

openstackgerritMerged openstack/keystone master: Make federation documentation consistent  https://review.openstack.org/47287500:03
openstackgerritMerged openstack/keystone master: Add missing comma to json sample  https://review.openstack.org/48678000:04
*** thorst_afk has joined #openstack-keystone00:11
*** catintheroof has quit IRC00:14
*** ducttape_ has joined #openstack-keystone00:25
*** dstepanenko has joined #openstack-keystone00:26
openstackgerritMorgan Fainberg proposed openstack/keystone master: Make revocation token list alwayws return 410  https://review.openstack.org/49068500:27
morganlbragstad: ^00:27
*** dstepanenko has quit IRC00:31
*** lwanderley has joined #openstack-keystone00:33
*** ducttape_ has quit IRC00:38
openstackgerritMorgan Fainberg proposed openstack/keystone master: Make revocation token list alwayws return 410  https://review.openstack.org/49068500:39
*** Shunli has joined #openstack-keystone00:45
*** zhurong has joined #openstack-keystone00:52
*** thorst_afk has quit IRC00:52
*** ducttape_ has joined #openstack-keystone01:18
*** ducttap__ has joined #openstack-keystone01:19
*** ducttape_ has quit IRC01:23
*** dave-mccowan has joined #openstack-keystone01:27
*** spzala has joined #openstack-keystone01:29
*** lwanderley has quit IRC01:31
*** mjax has quit IRC01:32
*** mjax has joined #openstack-keystone01:33
*** ducttap__ has quit IRC01:34
*** lwanderley has joined #openstack-keystone01:34
*** mjax has quit IRC01:36
*** edmondsw has joined #openstack-keystone01:42
*** otleimat has quit IRC01:42
*** thorst_afk has joined #openstack-keystone01:42
*** edmondsw has quit IRC01:46
*** aselius has quit IRC01:49
*** vint_bra has joined #openstack-keystone02:06
*** http_GK1wmSU has joined #openstack-keystone02:12
*** http_GK1wmSU has left #openstack-keystone02:14
*** dstepanenko has joined #openstack-keystone02:14
*** gagehugo has quit IRC02:16
*** spzala has quit IRC02:17
*** thorst_a_ has joined #openstack-keystone02:18
*** thorst_a_ has quit IRC02:18
*** dstepanenko has quit IRC02:19
*** gagehugo has joined #openstack-keystone02:20
*** thorst_afk has quit IRC02:20
*** mjax has joined #openstack-keystone02:23
*** mjax has quit IRC02:24
*** mjax has joined #openstack-keystone02:25
lbragstadmjax: well - that's part of the reason why you'd do that bit through keystonemiddleware02:26
lbragstadsince it sits in front of each service02:26
*** mjax has quit IRC02:26
*** vint_bra has quit IRC02:27
*** Shunli has quit IRC02:28
*** Shunli has joined #openstack-keystone02:28
*** dave-mccowan has quit IRC02:29
*** bigjools_ has quit IRC02:30
*** ducttape_ has joined #openstack-keystone02:34
*** spzala has joined #openstack-keystone02:38
*** ducttape_ has quit IRC02:38
*** spzala has quit IRC02:43
*** jmlowe has quit IRC02:48
openstackgerritLance Bragstad proposed openstack/keystone master: Attempt to expose bug in multi region endpoints  https://review.openstack.org/49072002:53
lbragstadmorgan: thanks02:55
*** spzala has joined #openstack-keystone03:15
*** spzala has quit IRC03:20
*** edmondsw has joined #openstack-keystone03:30
*** edmondsw has quit IRC03:34
*** ducttape_ has joined #openstack-keystone03:35
*** ducttape_ has quit IRC03:40
*** spzala has joined #openstack-keystone03:49
*** lwanderley has quit IRC03:50
*** prashkre_ has joined #openstack-keystone03:51
*** spzala has quit IRC03:54
*** aselius has joined #openstack-keystone03:54
*** dstepanenko has joined #openstack-keystone04:03
*** links has joined #openstack-keystone04:03
*** dstepanenko has quit IRC04:07
*** henrynash has quit IRC04:12
*** prashkre_ has quit IRC04:15
*** thorst_afk has joined #openstack-keystone04:19
*** spzala has joined #openstack-keystone04:30
*** edmondsw has joined #openstack-keystone04:31
*** thorst_afk has quit IRC04:33
*** spzala has quit IRC04:35
*** edmondsw has quit IRC04:36
*** dstepanenko has joined #openstack-keystone04:57
*** mjax has joined #openstack-keystone04:58
*** mjax has quit IRC04:59
*** dstepanenko has quit IRC05:02
*** spzala has joined #openstack-keystone05:12
*** spzala has quit IRC05:16
*** ducttape_ has joined #openstack-keystone05:37
*** spzala has joined #openstack-keystone05:38
*** ducttape_ has quit IRC05:42
*** spzala has quit IRC05:43
*** thorst_afk has joined #openstack-keystone06:01
*** tobberydberg has joined #openstack-keystone06:05
*** thorst_afk has quit IRC06:05
*** tobberydberg has quit IRC06:05
*** tobberydberg has joined #openstack-keystone06:06
*** markvoelker has quit IRC06:08
*** oomichi has quit IRC06:09
*** oomichi has joined #openstack-keystone06:10
*** spzala has joined #openstack-keystone06:14
*** spzala has quit IRC06:19
*** edmondsw has joined #openstack-keystone06:19
*** edmondsw has quit IRC06:24
*** rcernin has joined #openstack-keystone06:30
*** dstepanenko has joined #openstack-keystone06:45
*** spzala has joined #openstack-keystone06:47
*** dstepanenko has quit IRC06:49
*** spzala has quit IRC06:51
openstackgerritzhengliuyang proposed openstack/keystone master: Add role_domain_id_request_body in parameters  https://review.openstack.org/49076507:03
*** aselius has quit IRC07:04
*** tesseract has joined #openstack-keystone07:16
*** pcaruana has joined #openstack-keystone07:38
*** ducttape_ has joined #openstack-keystone07:38
*** faizy has joined #openstack-keystone07:39
*** http_GK1wmSU has joined #openstack-keystone07:42
*** http_GK1wmSU has left #openstack-keystone07:43
*** ducttape_ has quit IRC07:43
*** thorst_afk has joined #openstack-keystone08:02
*** thorst_afk has quit IRC08:06
*** markvoelker has joined #openstack-keystone08:09
*** belmoreira has joined #openstack-keystone08:11
*** oomichi has quit IRC08:15
*** mdavidson has quit IRC08:15
*** oomichi has joined #openstack-keystone08:15
*** aojea has joined #openstack-keystone08:19
*** aojea_ has joined #openstack-keystone08:24
*** nicolasbock has joined #openstack-keystone08:25
*** aojea has quit IRC08:27
*** aojea has joined #openstack-keystone08:30
*** aojea_ has quit IRC08:32
*** dstepanenko has joined #openstack-keystone08:33
*** aojea_ has joined #openstack-keystone08:34
*** zhurong has quit IRC08:36
*** aojea has quit IRC08:37
*** dstepanenko has quit IRC08:38
openstackgerritPavlo Shchelokovskyy proposed openstack/keystoneauth master: Fix exception message in adapter loading  https://review.openstack.org/48921008:38
*** aojea has joined #openstack-keystone08:39
*** aojea_ has quit IRC08:41
*** markvoelker has quit IRC08:43
*** zhurong has joined #openstack-keystone08:44
*** aojea_ has joined #openstack-keystone08:44
*** aojea has quit IRC08:47
*** aojea has joined #openstack-keystone08:49
*** aojea_ has quit IRC08:52
*** aojea_ has joined #openstack-keystone08:55
*** aojea has quit IRC08:57
*** aojea has joined #openstack-keystone08:59
*** mvpnitesh has joined #openstack-keystone09:01
*** aojea_ has quit IRC09:02
*** thorst_afk has joined #openstack-keystone09:03
*** spzala has joined #openstack-keystone09:03
*** spzala has quit IRC09:03
*** spzala has joined #openstack-keystone09:04
*** spzala has quit IRC09:04
*** aojea_ has joined #openstack-keystone09:05
*** thorst_afk has quit IRC09:07
*** aojea has quit IRC09:08
*** aojea has joined #openstack-keystone09:11
*** mdavidson has joined #openstack-keystone09:12
*** aojea_ has quit IRC09:13
*** aojea_ has joined #openstack-keystone09:16
*** aojea has quit IRC09:20
*** aojea has joined #openstack-keystone09:22
*** spzala has joined #openstack-keystone09:24
*** aojea_ has quit IRC09:25
*** aojea_ has joined #openstack-keystone09:27
*** dstepanenko has joined #openstack-keystone09:28
*** aojea has quit IRC09:29
*** spzala has quit IRC09:29
*** Shunli has quit IRC09:32
*** dstepanenko has quit IRC09:32
*** aojea has joined #openstack-keystone09:32
*** aojea_ has quit IRC09:35
*** aojea_ has joined #openstack-keystone09:37
*** aojea has quit IRC09:40
*** ducttape_ has joined #openstack-keystone09:40
*** markvoelker has joined #openstack-keystone09:41
*** aojea has joined #openstack-keystone09:41
*** aojea_ has quit IRC09:44
*** ducttape_ has quit IRC09:44
*** aojea_ has joined #openstack-keystone09:47
*** aojea has quit IRC09:50
*** aojea has joined #openstack-keystone09:52
*** aojea_ has quit IRC09:55
*** edmondsw has joined #openstack-keystone09:55
*** prashkre_ has joined #openstack-keystone09:56
*** mvpnitesh has quit IRC09:56
*** aojea_ has joined #openstack-keystone09:57
*** aojea has quit IRC10:00
*** edmondsw has quit IRC10:00
*** aojea_ has quit IRC10:00
*** dstepanenko has joined #openstack-keystone10:04
*** spzala has joined #openstack-keystone10:10
*** spzala has quit IRC10:14
*** markvoelker has quit IRC10:14
*** aojea has joined #openstack-keystone10:16
*** zhurong has quit IRC10:17
*** openstackgerrit has quit IRC10:18
*** edmondsw has joined #openstack-keystone10:36
*** edmondsw has quit IRC10:40
*** ducttape_ has joined #openstack-keystone10:41
*** ducttape_ has quit IRC10:46
*** faizy has quit IRC10:51
*** thorst_afk has joined #openstack-keystone11:04
*** thorst_afk has quit IRC11:08
*** markvoelker has joined #openstack-keystone11:11
*** spzala has joined #openstack-keystone11:11
*** spzala has quit IRC11:16
*** http_GK1wmSU has joined #openstack-keystone11:37
*** http_GK1wmSU has left #openstack-keystone11:38
*** markvoelker has quit IRC11:45
*** edmondsw has joined #openstack-keystone11:47
*** thorst_afk has joined #openstack-keystone11:51
*** thorst_afk has quit IRC11:52
*** edmondsw has quit IRC11:52
*** aojea has quit IRC11:53
*** dave-mccowan has joined #openstack-keystone11:55
*** rmascena has joined #openstack-keystone12:02
*** erlon has joined #openstack-keystone12:03
*** thorst has joined #openstack-keystone12:06
*** openstackgerrit has joined #openstack-keystone12:13
openstackgerritM V P Nitesh proposed openstack/keystone master: Added support for a ``description`` attribute for V3 Identity Roles  https://review.openstack.org/48434812:13
samueldmqmorning keystone12:22
cmurphymorning samueldmq12:23
*** edmondsw has joined #openstack-keystone12:23
*** spzala has joined #openstack-keystone12:25
*** spzala has quit IRC12:30
*** markvoelker has joined #openstack-keystone12:31
*** dstepanenko has quit IRC12:44
*** dstepanenko has joined #openstack-keystone12:49
*** spzala has joined #openstack-keystone12:49
*** lwanderley has joined #openstack-keystone12:50
*** spzala has quit IRC12:54
*** jmlowe has joined #openstack-keystone13:04
*** spzala has joined #openstack-keystone13:11
*** catintheroof has joined #openstack-keystone13:17
*** aojea has joined #openstack-keystone13:19
lbragstado/13:25
*** aojea_ has joined #openstack-keystone13:26
*** aojea has quit IRC13:27
*** aojea has joined #openstack-keystone13:30
*** mjax has joined #openstack-keystone13:31
cmurphy\o13:32
*** mjax has quit IRC13:33
*** aojea_ has quit IRC13:33
*** dstepanenko has quit IRC13:33
*** lucasxu has joined #openstack-keystone13:34
*** aojea_ has joined #openstack-keystone13:35
*** vint_bra has joined #openstack-keystone13:35
samueldmq\o/13:36
*** aojea has quit IRC13:37
*** aojea has joined #openstack-keystone13:40
*** aojea_ has quit IRC13:42
*** aojea_ has joined #openstack-keystone13:45
*** vint_bra has quit IRC13:46
*** jistr is now known as jistr|mtg13:46
*** jmlowe has quit IRC13:47
*** dansmith is now known as superdan13:47
*** Dinesh_Bhor has quit IRC13:47
*** aojea has quit IRC13:48
*** efried_zzz is now known as fried_rice13:49
*** aojea has joined #openstack-keystone13:50
*** aojea_ has quit IRC13:53
*** bhagyashris has quit IRC13:54
*** aojea_ has joined #openstack-keystone13:55
prashkre_lbragstad: Hi. Gud morning!13:55
prashkre_lbragstad: could you please take a look at latest comment on https://review.openstack.org/#/c/490138/.13:56
openstackgerritLance Bragstad proposed openstack/keystone master: Remove policy for self-service password changes  https://review.openstack.org/48581813:57
*** ducttape_ has joined #openstack-keystone13:57
*** aojea has quit IRC13:58
*** sjain has joined #openstack-keystone13:59
*** aojea has joined #openstack-keystone14:00
*** dstepanenko has joined #openstack-keystone14:01
*** aojea_ has quit IRC14:04
*** aojea_ has joined #openstack-keystone14:05
*** dstepanenko has quit IRC14:05
*** aojea has quit IRC14:08
openstackgerritLance Bragstad proposed openstack/keystone master: Remove duplicate sample files  https://review.openstack.org/48860914:08
*** ducttape_ has quit IRC14:08
*** jmlowe has joined #openstack-keystone14:09
*** aojea has joined #openstack-keystone14:11
*** links has quit IRC14:12
*** aojea_ has quit IRC14:13
*** aojea_ has joined #openstack-keystone14:16
lbragstadwe'll need to kick https://review.openstack.org/#/c/485818/ back through the door once it passes14:19
*** aojea has quit IRC14:19
*** aojea has joined #openstack-keystone14:22
lbragstadalso - quick update14:23
lbragstadwe're down to 14 bugs that are targeted to rc114:23
lbragstadhttps://goo.gl/Uiqz8Z14:23
cmurphy\o/14:23
lbragstadwe started the week with about 2214:23
*** lwanderley has quit IRC14:24
lbragstada couple are suspect to configuration or transients - i'm not convinced they will require patches to keystone to fix, but something we should look into regardless14:24
cmurphyi'm pretty sure https://bugs.launchpad.net/keystone/+bug/1689468 can be closed, then we're down to 1314:24
openstackLaunchpad bug 1689468 in OpenStack Identity (keystone) "odd keystone behavior when X-Auth-Token ends with carriage return" [Low,In progress] - Assigned to Gage Hugo (gagehugo)14:24
samueldmqlbragstad: I am not really getting what that change is doing14:24
samueldmqhttps://review.openstack.org/#/c/48581814:24
samueldmqlbragstad: why doesn't it make sense anymore to have a separate policy to protect the self-service api?14:25
*** aojea_ has quit IRC14:25
lbragstadthe policy for checking the self-service password api was pulled into code (e.g. the api is no longer wrapped with @controller.protected14:25
lbragstad)14:25
lbragstadcmurphy: oh - good call - that whole fix lives within middleware now, right?14:26
lbragstadi think i left a comment on that yesterday?14:26
samueldmqlbragstad: so it checks the owner thing inside the upadte_user method?14:26
cmurphylbragstad: ya i think so14:26
*** lwanderley has joined #openstack-keystone14:26
lbragstadsamueldmq: it check that the password matches14:26
*** lwanderley has quit IRC14:26
lbragstadsamueldmq: gagehugo explains it a bit here - https://review.openstack.org/#/c/404022/14:26
*** aojea_ has joined #openstack-keystone14:27
lbragstadcmurphy: cool - thanks for pointing that one out14:27
*** aojea_ has quit IRC14:28
samueldmqlbragstad: I am getting it ... but wouldn't that user (trying to update their own passowrd)14:28
samueldmqneed to match the rule for update_user too? (in which case might be admin)14:28
samueldmqs/admin/admin protected/14:28
lbragstadsamueldmq: it's a separate entry point - we expose a self-service password api in the controller14:29
*** aojea has quit IRC14:29
lbragstadwhich eventually calls into self.identity_api.update_user in the maanger14:29
samueldmqlbragstad: ah so policy file is not checked at all14:29
lbragstadwhich isn't protected (since controller.update_user) is protected in the manager14:29
lbragstadright14:29
*** josecastroleon has quit IRC14:30
samueldmqlbragstad: re-approved that one. assuming jenkins will be happy14:30
*** ducttape_ has joined #openstack-keystone14:31
lbragstadi hope so14:31
lbragstadi need to look into some transients today14:31
lbragstador monday14:31
lbragstadthese three are problematic14:32
lbragstadhttps://bugs.launchpad.net/keystone/+bug/169452514:32
openstackLaunchpad bug 1694525 in OpenStack Identity (keystone) "keystone reports 404 User Not Found during grenade tests" [Medium,Triaged]14:32
lbragstadhttps://bugs.launchpad.net/keystone/+bug/170221114:32
openstackLaunchpad bug 1702211 in OpenStack Identity (keystone) "test_password_history_not_enforced_in_admin_reset failed in tempest test" [Medium,Confirmed]14:32
lbragstadhttps://bugs.launchpad.net/keystone/+bug/170391714:32
openstackLaunchpad bug 1703917 in OpenStack Identity (keystone) "Sometimes test_update_user_password fails with Unauthorized" [Medium,Triaged]14:32
*** dstepanenko has joined #openstack-keystone14:33
lbragstadthose ^ all seem like transients of some kind14:34
*** ducttape_ has quit IRC14:36
*** nicolasbock has quit IRC14:39
fried_ricemordred https://bugs.launchpad.net/keystoneauth/+bug/1708673 FYI.14:41
openstackLaunchpad bug 1708673 in keystoneauth "Register deprecated opts with Adapter.get_conf_options" [Undecided,New]14:41
fried_ricemordred (This is to your suggestion of deprecating [ironic]api_endpoint, which I'm gonna hack on the nova side in the meantime.)14:42
*** sjain has quit IRC14:43
openstackgerritEric Fried proposed openstack/keystoneauth master: WIP: Adapter.get_conf_options(deprecated_opts)  https://review.openstack.org/49089514:55
fried_ricemordred ^^ for same14:56
*** dstepanenko has quit IRC14:57
*** jistr|mtg is now known as jistr15:01
*** aselius has joined #openstack-keystone15:06
openstackgerritRohan Arora proposed openstack/keystone master: Added versions to keystone headers  https://review.openstack.org/46818915:10
openstackgerritEric Fried proposed openstack/keystoneauth master: WIP: Adapter.get_conf_options(deprecated_opts)  https://review.openstack.org/49089515:11
lbragstadprashkre_: did you have anything for this locally? https://bugs.launchpad.net/keystone/+bug/170508115:13
openstackLaunchpad bug 1705081 in OpenStack Identity (keystone) "DELETE project API is failing in forbidden(403) error message" [High,Triaged] - Assigned to prashkre (prashkre)15:13
*** rcernin has quit IRC15:14
openstackgerritColleen Murphy proposed openstack/keystone master: Clarify SELinux note in LDAP documentation  https://review.openstack.org/49090215:14
*** lucasxu has quit IRC15:15
*** ducttape_ has joined #openstack-keystone15:16
*** dstepanenko has joined #openstack-keystone15:17
prashkre_lbragstad: I don't have. It is dependent on https://bugs.launchpad.net/keystone/+bug/1705072.15:17
openstackLaunchpad bug 1705072 in OpenStack Identity (keystone) "clearing default project_id from users using wrong driver implementation" [Medium,Triaged]15:17
*** ayoung has quit IRC15:17
lbragstadprashkre_: there isn't a patch up that addresses ^ is there?15:18
lbragstadI'm just going through what we've targeted for rc115:19
knikollao/15:22
*** jaosorior has quit IRC15:23
lbragstadknikolla: o/15:24
prashkre_lbragstad: I don't think we have a patch for it as well.15:26
lbragstadprashkre_: ok - just checking15:26
prashkre_lbragstad: patch for https://bugs.launchpad.net/keystone/+bug/1705081 is simple but as it is dependent on other but I was waiting for it.15:28
openstackLaunchpad bug 1705081 in OpenStack Identity (keystone) "DELETE project API is failing in forbidden(403) error message" [High,Triaged] - Assigned to prashkre (prashkre)15:28
*** spzala has quit IRC15:28
lbragstadprashkre_: got it15:28
*** ducttape_ has quit IRC15:29
*** spzala has joined #openstack-keystone15:33
openstackgerritMerged openstack/keystoneauth master: Fix exception message in adapter loading  https://review.openstack.org/48921015:37
*** spzala has quit IRC15:38
*** belmoreira has quit IRC15:44
*** otleimat has joined #openstack-keystone15:46
*** dstepanenko has quit IRC15:53
*** sjain has joined #openstack-keystone15:53
*** dstepanenko has joined #openstack-keystone15:59
knikollalbragstad: unfortunately tuesdays haven't worked too well for me for office hours in the past weeks15:59
*** lucasxu has joined #openstack-keystone16:00
*** sjain has quit IRC16:06
*** pcaruana has quit IRC16:10
*** jmlowe has quit IRC16:19
*** dstepanenko has quit IRC16:22
*** prashkre_ has quit IRC16:23
*** ayoung has joined #openstack-keystone16:30
*** spzala has joined #openstack-keystone16:35
cmurphyI'm confused about https://bugs.launchpad.net/keystone/+bug/1705081, how does an ldap user get a default project in the first place?16:37
openstackLaunchpad bug 1705081 in OpenStack Identity (keystone) "DELETE project API is failing in forbidden(403) error message" [High,Triaged] - Assigned to prashkre (prashkre)16:37
cmurphyin my env they don't have a default and trying to assign them one 403's16:38
*** spzala has quit IRC16:41
openstackgerritMerged openstack/keystone master: Add role_domain_id_request_body in parameters  https://review.openstack.org/49076516:41
openstackgerritMerged openstack/keystone-tempest-plugin master: Removes unnecessary utf-8 encoding  https://review.openstack.org/48519916:42
samueldmqcmurphy: I think I am getting your point16:45
*** spzala has joined #openstack-keystone16:45
samueldmqas LDAP users don't have default project ID, that _unset_default_project thing should not even be triggered to LDAP users16:45
samueldmqoh no. actually, the driver should just bypass and not throw 40316:46
samueldmqif I am getting the bug correctly, you should not be able to delete *any* project when ldap identity backend is used16:47
morgansamueldmq: ++16:47
samueldmqmorgan: o/16:48
*** spilla has joined #openstack-keystone16:49
openstackgerritMerged openstack/keystone master: Remove policy for self-service password changes  https://review.openstack.org/48581816:54
*** dstepanenko has joined #openstack-keystone16:55
*** dstepanenko has quit IRC17:00
*** dstepanenko has joined #openstack-keystone17:02
*** eandersson has quit IRC17:03
stevemarholy wall-o-text mordred17:03
*** sjain has joined #openstack-keystone17:07
*** mjax has joined #openstack-keystone17:15
cmurphysamueldmq: well now i'm more confused17:21
samueldmqcmurphy: :-)17:21
*** edmondsw_ has joined #openstack-keystone17:23
*** prashkre_ has joined #openstack-keystone17:24
lbragstadcmurphy: yeah - the issue is that if a project is deleted, the callback will try and call into the ldap backend if configured to do so17:25
openstackgerritSamriddhi proposed openstack/keystone master: Fill in content in User Documentation  https://review.openstack.org/49066717:26
*** edmondsw has quit IRC17:26
*** openstackstatus has quit IRC17:27
*** openstack has joined #openstack-keystone17:28
*** openstackstatus has joined #openstack-keystone17:29
*** ChanServ sets mode: +v openstackstatus17:29
samueldmqcmurphy: and you would get a 403 on project delete, even if the project was successfully deleted?17:32
samueldmqnot sure what state the project ends in, maybe it was actually deleted17:33
*** spzala has quit IRC17:35
*** Guest46292 is now known as amrith17:35
lbragstadi think in this case the resource backend is configured to use LDAP17:37
cmurphyo.017:38
lbragstadprashkre_: right? ^17:38
lbragstadalso - can't you set a default_project_id attribute on a user in LDAP and have it pass through keystone?17:39
openstackgerritMorgan Fainberg proposed openstack/keystone master: Make revocation token list alwayws return 410  https://review.openstack.org/49068517:40
prashkre_cmurphy:samueldmq: first thing is because of bug https://bugs.launchpad.net/keystone/+bug/1705072, call back never goes to ldap. so one the bug 1705072 is fixed, all the delete project requests will end up in 403, even though project is deleted successfully17:40
openstackLaunchpad bug 1705072 in OpenStack Identity (keystone) "clearing default project_id from users using wrong driver implementation" [Medium,Triaged]17:40
lbragstadknikolla: do you think that will be the pattern moving forward?17:40
morganlbragstad: ok there we go that should pass tests now17:40
prashkre_so once*17:41
cmurphylbragstad: there is a user_default_project_id_attribute but i don't think it does anything, looking at the code17:41
morgancmurphy: it did something in the past, mostly when we were dealing with r/w ldap backends17:41
morganbut since we don't do read/write anymore...17:41
cmurphymorgan: yeah, if you look at it now it's pretty much just registered with osloconfig and then never used again17:42
morganit shouldn't even call to the ldap server (it should simply skip any read-only backend) when iterating17:42
morgancmurphy: sounds about right17:42
* lbragstad shudders17:42
prashkre_cmurphy: since ldap is readonly, we can't have  user_default_project_id attribute set, but for sql backends I hope it can have..17:42
lbragstadprashkre_: when you ran into that issue - you configured the identity and resource backends to use LDAP, right?17:42
morganprashkre_: any/all read-write backends should get called17:43
prashkre_lbragstad: I have configured identity backend as ldap. sorry, what do you meant by resource backend?17:46
lbragstadprashkre_: https://github.com/openstack/keystone/blob/4e986235713758f2df5ae12e66ca3e5e93edd551/keystone/conf/resource.py#L18-L2517:46
lbragstadthe default is sql which supports read/write17:46
lbragstadprashkre_: the bug you filed describes a 403 when cleaning up the project17:47
lbragstadprashkre_: so - it would appear something except LDAP is configured for the resource backend?17:47
prashkre_lbragstad: resource backend is default, i.e. sql.17:48
lbragstadso [resource] driver = sql and [identity] driver = ldap in order to recreate that bug17:50
*** dstepanenko has quit IRC17:51
lbragstadand when you DELETE /v3/project/{project_id} it's failing because it's attempting to cleanup that project ID from the default project ID of the users stored in the identity backend17:51
lbragstadaha - that makes sense17:51
prashkre_lbragstad: until we fix the issue in https://bugs.launchpad.net/keystone/+bug/1705072, you can't reproduce 403 error with delete project.17:52
openstackLaunchpad bug 1705072 in OpenStack Identity (keystone) "clearing default project_id from users using wrong driver implementation" [Medium,Triaged]17:52
lbragstadwell - that's with multiple domain support with LDAP configured - specifically17:53
lbragstadyou should be able to recreate https://bugs.launchpad.net/keystone/+bug/1705081 with a single domain and a single ldap identity backend, right?17:54
openstackLaunchpad bug 1705081 in OpenStack Identity (keystone) "DELETE project API is failing in forbidden(403) error message" [High,Triaged] - Assigned to prashkre (prashkre)17:54
prashkre_yes, you are right.17:55
lbragstadso it sounds like https://bugs.launchpad.net/keystone/+bug/1705072 doesn't have to be fixed before https://bugs.launchpad.net/keystone/+bug/170508117:56
openstackLaunchpad bug 1705072 in OpenStack Identity (keystone) "clearing default project_id from users using wrong driver implementation" [Medium,Triaged]17:56
openstackLaunchpad bug 1705081 in OpenStack Identity (keystone) "DELETE project API is failing in forbidden(403) error message" [High,Triaged] - Assigned to prashkre (prashkre)17:56
lbragstadwe should be able to work fixes in parallel?17:57
prashkre_lbargstad: I assume bypassing this https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/core.py#L92 by setting it to pass will fix the issue.17:58
prashkre_since ldap is readonly we don't need to worry about unsetting the attribute17:59
lbragstadprashkre_: it would - but we need to make sure that method is *only* invoked by the callback17:59
*** prashkre_ has quit IRC17:59
lbragstadotherwise will have a regression on our hands because we were raising an exception but now we won't be17:59
*** prashkre_ has joined #openstack-keystone17:59
lbragstadprashkre_: we do need make sure that we raise an exception if someone is trying to unset that attribute manually via the api (which should result in a 403(18:00
lbragstad403)18:00
prashkre_lbragstad: what are the other api18:02
prashkre_?18:02
prashkre_which user can manually trigger to unset that attribute.18:02
lbragstadhttp://paste.openstack.org/show/617561/18:02
*** tobberydberg has quit IRC18:02
lbragstadlooks like its limited to only being called from keystone/identity/core.py18:02
lbragstadwhich is good18:03
*** spzala has joined #openstack-keystone18:03
lbragstadbut this is also changing a 403 -> 204 http://specs.openstack.org/openstack/api-wg/guidelines/api_interoperability.html18:04
lbragstadcc cmurphy morgan samueldmq ^18:05
samueldmqlbragstad: and that requires a version change, correct?18:06
morganwhich is a behavior break and requires a change18:06
* lbragstad sigh18:06
morgannow... if it was a 5xx -> 204 it would be different18:06
morganthis is a case where you *might* get TC buy-in though18:06
morganyou'll want to raise this up to the TC level18:06
morgannooooowwww18:06
morganyou could also do something wonky18:06
morganyou could make it raise a 403 even if it works.18:07
lbragstadsince it makes using the default resource backend with ldap identity unusable in a way18:07
morganso behavior is the same but the underlying actions are done18:07
morganso basically, hold the 403, and keep iterating (when it occurs) and then re-raise it18:07
prashkre_lbragstad: it is being called only with event from delete project API.18:07
lbragstadright18:07
morganalso this is inconsistent, some backends are 403ing some are 204ing, some configs are doing other things18:07
morganthis case *might* be ok to just fix18:08
lbragstadif you have the resource backend configured to use mysql and the identity backend to use ldap - you're going to see this error everytime do try to delete a project18:08
morganbecause it is different based upon how openstack is configured18:08
morganso... ask the TC18:08
morganif they say "no don't fix"18:08
lbragstadack18:08
lbragstadi'll head over to -tc and poke around18:08
morganthen hold the 403 when it happens, and then re-raise when things are finished being cleaned up18:08
morganthen behavior is the same18:08
morganso try: except 403: 403_caught=True. and in the for loop, for/finally: if 403, raise 40318:09
* cmurphy -> off to do friday things, bbl18:15
lbragstadcmurphy: o/18:16
*** sjain has quit IRC18:19
knikollafriday things are nice18:19
* morgan is hiding in a/c filled office18:20
morganit's a bit toasty here in the PNW18:20
clarkbthe smoke is worse than the heat though. My eyes and throat hate me rightn ow18:20
*** dstepanenko has joined #openstack-keystone18:22
morganclarkb: and i'm in Seattle, the smoke is so bad18:23
*** dstepanenko has quit IRC18:26
*** openstackstatus has quit IRC18:26
*** openstack has joined #openstack-keystone18:27
*** openstackstatus has joined #openstack-keystone18:28
*** ChanServ sets mode: +v openstackstatus18:28
*** prashkre_ has quit IRC18:47
*** lwanderley has joined #openstack-keystone18:55
*** lwanderley has quit IRC18:57
*** lwanderley has joined #openstack-keystone18:58
mjaxlbragstad: is there a unit test for provider issuing tokens? I didn't see one looking through the folder, but maybe I missed it19:00
lbragstadmjax: yeah - that should be in keystone/tests/unit/test_v3_auth.py and keystone/tests/unit/test_auth.py19:01
lbragstad^ those are API tests19:01
lbragstadthe unit tests are in keystone/tests/unit/token/*19:01
*** thorst has quit IRC19:03
*** sjain has joined #openstack-keystone19:05
*** thorst has joined #openstack-keystone19:06
*** thorst has quit IRC19:10
*** thorst has joined #openstack-keystone19:18
openstackgerritGage Hugo proposed openstack/keystone-specs master: Update project-tags spec  https://review.openstack.org/48452919:20
*** thorst has quit IRC19:20
*** thorst has joined #openstack-keystone19:20
openstackgerritGage Hugo proposed openstack/keystone master: Add project tags api-ref documentation and reno  https://review.openstack.org/47239619:25
*** lwanderley has quit IRC19:30
mjaxlbragstad: Sorry to trouble you again, but could you tell me about how a request to keystone to issue a token works? I see the authenticate user methods in controllers.py https://github.com/openstack/keystone/blob/fffc84db79fabb2bb35367387dd4b19e9dafb6d1/keystone/auth/controllers.py#L107, but I'having trouble following it19:36
edmondsw_lbragstad replied on the ML... I think you missed a line in the API guidelines19:36
*** spilla has quit IRC19:46
edmondsw_mjax something in particular that's tripping you up there?19:47
*** ducttape_ has joined #openstack-keystone19:55
openstackgerritMerged openstack/keystone master: Remove duplicate sample files  https://review.openstack.org/48860919:58
*** ducttape_ has quit IRC20:00
openstackgerritGage Hugo proposed openstack/keystone master: Shift to check_policy for resource creation  https://review.openstack.org/46267020:05
*** dstepanenko has joined #openstack-keystone20:10
*** dstepanenko has quit IRC20:14
mjaxedmondsw_: yea, I'm not that used to the loosely typed style of python, so I'm having some trouble connecting what each of the variables are and what they do20:17
edmondsw_mjax you mean the input parameters, or in general?20:18
edmondsw_one in particular?20:19
lbragstadedmondsw_: mtrienish responded20:20
edmondsw_lbragstad yeah, I saw :(20:20
mjaxyup, a lot of them, for starters: auth, request, method_names,20:20
lbragstadunfortunately "broken handling" can't be classified for 4XX =/20:20
edmondsw_that could be clearer in the guidelines. Then again, the guidelines in general could be a lot clearer20:20
edmondsw_that whole topic is still a mess20:21
lbragstadsounds like a ptg discussion20:21
edmondsw_yeah... I'm frustrated that we're saying we have to follow API guidelines without having the ability (microversions) to follow API guidelines... so we can't fix things20:21
edmondsw_maddening20:22
edmondsw_mjax it can be difficult sometimes... I generally end up using a lot of greps to find where things are called and see what they're passing20:23
mjaxmmm was hoping for a bit of a high levelish explanation of what's going on to speed things up. Do you know of a resource that can let me know what each dict variable is expected to hold? Like I see an auth_context['project_id'] but idk what else is in there20:26
knikollalbragstad: when was the unset default_project_id function added? i see no unset_default_project_id in newton/ocata20:27
lbragstadknikolla: it's relatively new20:28
lbragstadknikolla: gagehugo wrote the fix20:28
knikollaif it's not in newton on ocata, means it's only in master. so it's not like we're changing something from a release20:29
knikollaor*20:29
lbragstadknikolla: actually - sorry, i think someone else wrote the fix20:29
lbragstadi'm getting my wires crossed20:29
* gagehugo is confused20:29
knikollahttps://github.com/openstack/keystone/commit/51d5597df729158d15b71e2ba80ab103df5d55f820:29
lbragstadhttps://github.com/openstack/keystone/commit/51d5597df729158d15b71e2ba80ab103df5d55f820:29
lbragstadyep20:29
lbragstadgagehugo: sorry - i'm saying you did stuff you didn't do20:30
lbragstadgagehugo: ignorem e20:30
gagehugoheh20:30
knikollamy point is. if we haven't released a release with this yet we should be able to change the api20:30
lbragstadknikolla: good point20:31
lbragstadknikolla: do you want to raise that as a point on the thread/20:31
lbragstadwe've only released the behavior in milestones20:32
lbragstad(i'm not sure how that affects things though)20:32
lbragstadcc morgan ^20:32
morganlbragstad: technically we should be fine20:35
lbragstadif we haven't released it yet20:36
-openstackstatus- NOTICE: Gerrit is being restarted to pick up CSS changes and should be back momentarily20:36
edmondsw_mjax I believe auth is the body of the auth request20:36
lbragstadand since the callback coupling only existed in pike - this call would have been successful on previous releases, too20:36
edmondsw_mjax and method_names would be the method info from the body, parsed out by AuthInfo20:37
edmondsw_mjax does that help?20:37
*** sjain has quit IRC20:38
mjaxI'm reading through AuthInfo now20:38
edmondsw_mjax one suggestion for you would be to add "import rpdb; rpdb.set_trace()" as a breakpoint somewhere, and then do something to trigger this code running (call the API to request a token) and then telnet to port 444420:39
edmondsw_that will get you into the debugger, and you can walk through and see what things are doing and what other vars are available with what contents20:40
*** rmascena has quit IRC20:40
mjaxedmondsw_: thanks i'll try that20:41
knikollalbragstad: answering the email now.20:41
*** ducttape_ has joined #openstack-keystone20:42
lbragstadknikolla: awesome - thank you20:44
knikollalbragstad: replied. :)20:45
*** ducttape_ has quit IRC20:47
*** lucasxu has quit IRC20:51
lbragstadknikolla: i was going to suggest that we log something in the fix20:51
lbragstadknikolla: but since we're in string freeze - that can wait20:51
knikollalbragstad: i'm unsure how ldap would ever come to have default projects in their users.20:54
knikollalbragstad: https://github.com/openstack/keystone/blob/fa63f893d487d54fe932e42ad9b53eea7a24932f/keystone/conf/ldap.py#L20620:54
knikollait's not the default behavior.20:55
knikollaalso the concept of a default project store into the user information seems wrong in general, since makes the identity backend have to know about the assignment backend20:57
morganlbragstad: it is wrong...20:57
morganbut we have a history20:57
morganand can't change it =/20:57
morganthat is long long long ago history\20:57
knikollamaybe deprecate it and introduce a "default role assignment"20:58
*** spzala has quit IRC20:58
lbragstadknikolla: it was a v2.0 ism that crept into v3 in a weird way21:00
lbragstadin v2.0, if you created a user that had a `default_project_id` attribute set, the user would automatically get a role on the project specified in the user reference21:01
lbragstadknikolla: historical context can be found here https://bugs.launchpad.net/keystone/+bug/166291121:03
openstackLaunchpad bug 1662911 in Designate "v3 API create_user does not use default_project_id" [Critical,Triaged] - Assigned to Graham Hayes (grahamhayes)21:03
knikollalbragstad: hard to fix it now without breaking expected behavior.21:03
lbragstadknikolla: right - we either pull the odd v2.0 behavior into v3 or remove the default_project_id attribute from v321:03
lbragstadthe later breaks api compatibility21:04
lbragstadso - i guess we we do v4 we make it better by completely isolating assignment from identity21:04
lbragstadand leave nothing to assumption when creating users21:04
knikollalbragstad: not necessarily. we can have it pull the "default project" from something else. like the assignment table and the concept of a default role assignment21:04
knikollaon the surface we can preserve api compat. but on the place it's stored is different21:05
lbragstadwell - part of the issue is that in v2.0 setting the default_project_id on a user meant something, in v3 it means less21:06
knikollalbragstad: i understand that.21:07
lbragstadohhh21:08
lbragstadi think i see what you're getting at21:08
knikollalbragstad: our contract is our api though,21:08
knikollanot our representation of objects.21:08
lbragstadsure21:08
lbragstadi agree21:08
lbragstadwell - kind of, because the default_project_id *is* represented in the API with users21:09
lbragstadso - we could remove it in the backend and introduce a hybrid property to the identity sql backend to pull the default project id from the assignment table or something like that - but the default_project_id is expected to be in the user reference21:09
knikollalbragstad: yes21:10
lbragstadit would make the identity backend implementation for sql not care as much about a table that has default_project_id in the schema - but we still have to emit the property through the API21:10
lbragstadmy suggestion is that when we do v4 - we don't allow project ids to be associated with users in that way21:11
lbragstadall user assignment relationships should be explicit through the assignment api21:11
knikollalbragstad: i agree.21:11
knikollalbragstad: it will still be ugly though, since we will need to support v3 at the same time.21:12
lbragstadthen we don't have to do weird stuff like this - https://github.com/openstack/keystone/blob/master/keystone/auth/controllers.py#L174-L21921:12
lbragstadtrue21:12
knikollalbragstad: ewww21:12
lbragstadknikolla: yeah...21:12
knikollalbragstad: let's just kill the concept of a "default project" in v4.21:14
lbragstadagreed21:14
lbragstadthe plan was to do that in v321:14
lbragstadbut the attribute bled over from the v2.0 implementation21:14
knikollaunderstood.21:15
lbragstadwhich is the confusing part - because default_project_id means something in v2.0 but not quite the same thing in v3 =/21:15
knikollai think i'm lucky i came on board in the v3 era.21:15
knikollarather than v2.0 era.21:15
knikollaor i'm unlucky that i came on board in the, both versions era.21:16
knikollastill unsure on that, haha.21:16
knikollalbragstad: so in v2.0 it auto scopes the auth if you don't specify a project, right?21:16
knikollalbragstad: what does it do in v3?21:17
lbragstadknikolla: the auto-scoping logic also applies to v3 :(21:17
lbragstadi spent a day pulling my hair out once trying to figure out why i couldn't get an unscoped token21:17
lbragstadfrom v3 when i didn't specify scope21:18
knikollalbragstad: ooooo… i never knew about this auto-scoping since i've never assigned a default project to anything.21:18
lbragstadyeah - if you're user has a default_project_id, you'll by default get a token scoped to that project even if you omit scope from your request21:19
lbragstadthe big difference between v2.0 and v3 is that with v2.0 if you created a user with `default_project_id` set, keystone would automatically create the assignment for you21:20
lbragstadif you do that in v3 - it doesn't really do anything besides just shove the project id in the user reference before persisting it to the backend21:21
lbragstadsomeone still has to come along and manually give that user an assignment on their "default project":21:21
lbragstad^ causes much confusion21:21
*** thorst has quit IRC21:21
knikollathat's ugly.21:21
*** thorst has joined #openstack-keystone21:22
lbragstadyeah - there be dragons21:22
*** spzala has joined #openstack-keystone21:22
knikollai'll make my voice heard during the v4 design when/if it happens.21:24
lbragstadknikolla: if we separate auth from v4 - v4 can happen sooner21:25
lbragstadv2.0 -> v3 auth was the biggest hurdle we faced moving to v321:25
*** thorst has quit IRC21:26
knikollalbragstad: agree.21:26
*** spzala has quit IRC21:26
knikollatime for me to do friday things too. have a good weekend o/21:28
lbragstadknikolla: have a good weekend!21:33
*** dave-mccowan has quit IRC21:38
openstackgerritGage Hugo proposed openstack/keystone master: Shift to check_policy for resource creation  https://review.openstack.org/46267021:40
*** agrebennikov has joined #openstack-keystone21:43
*** agrebennikov has quit IRC21:43
*** agrebennikov has joined #openstack-keystone21:43
*** agrebennikov has quit IRC21:43
*** agrebennikov has joined #openstack-keystone21:44
*** ducttape_ has joined #openstack-keystone21:44
openstackgerritMorgan Fainberg proposed openstack/keystone master: Make revocation token list alwayws return 410  https://review.openstack.org/49068521:46
*** edmondsw_ has quit IRC21:47
*** ducttape_ has quit IRC21:48
* lbragstad heads out to go sit in a kayak for two days21:51
*** dstepanenko has joined #openstack-keystone21:58
*** dstepanenko has quit IRC22:04
*** fried_rice is now known as efried_WEEKEND22:16
*** thorst has joined #openstack-keystone22:22
*** thorst has quit IRC22:28
*** spzala has joined #openstack-keystone22:34
*** spzala has quit IRC22:45
*** efried_WEEKEND has quit IRC22:48
*** spzala has joined #openstack-keystone22:51
*** spzala has quit IRC22:52
*** superdan is now known as dansmith22:52
*** spzala has joined #openstack-keystone22:54
*** catintheroof has quit IRC22:56
*** efried_WEEKEND has joined #openstack-keystone22:58
*** ducttape_ has joined #openstack-keystone23:03
*** ducttape_ has quit IRC23:07
*** lbragstad has quit IRC23:22
*** edmondsw has joined #openstack-keystone23:36
*** edmondsw has quit IRC23:40
*** dstepanenko has joined #openstack-keystone23:46
*** agrebennikov has quit IRC23:50
*** dstepanenko has quit IRC23:51

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!