Tuesday, 2018-03-06

*** r-daneel has quit IRC00:12
openstackgerrityangweiwei proposed openstack/keystone master: Fix user email in federated shadow users  https://review.openstack.org/54972301:10
*** germs has joined #openstack-keystone01:11
*** germs has quit IRC01:40
*** gongysh has joined #openstack-keystone02:10
*** gongysh has quit IRC02:35
openstackgerrityangweiwei proposed openstack/keystone master: Fix user email in federated shadow users  https://review.openstack.org/54972302:58
*** zhurong has joined #openstack-keystone03:05
*** harlowja has quit IRC03:18
*** masuberu has quit IRC03:34
*** nicolasbock has quit IRC03:34
*** germs has joined #openstack-keystone03:40
*** germs has quit IRC03:40
*** germs has joined #openstack-keystone03:40
*** germs has quit IRC03:45
*** oikiki has quit IRC03:48
*** links has joined #openstack-keystone03:51
*** gyee has quit IRC04:03
*** idlemind has quit IRC04:11
*** itlinux has joined #openstack-keystone04:19
*** masber has joined #openstack-keystone04:23
*** bhagyashris has joined #openstack-keystone04:28
*** zhurong has quit IRC04:48
*** harlowja has joined #openstack-keystone05:12
*** markvoelker has quit IRC05:27
*** threestrands has quit IRC06:14
*** namnh has joined #openstack-keystone06:21
*** markvoelker has joined #openstack-keystone06:27
*** harlowja has quit IRC06:29
*** itlinux has quit IRC06:37
*** AlexeyAbashkin has joined #openstack-keystone06:52
openstackgerritKairat Kushaev proposed openstack/keystoneauth master: use defusedxml for XML parsing  https://review.openstack.org/53676106:54
*** martinus__ has joined #openstack-keystone07:08
*** rcernin has quit IRC07:14
*** Krenair has quit IRC07:26
*** Krenair has joined #openstack-keystone07:27
*** felipemonteiro has joined #openstack-keystone07:29
*** Krenair has quit IRC07:37
*** Krenair has joined #openstack-keystone07:40
*** Krenair has joined #openstack-keystone07:40
*** namnh has quit IRC07:48
*** AlexeyAbashkin has quit IRC07:50
*** Krenair has quit IRC07:59
*** Krenair has joined #openstack-keystone08:09
*** Krenair has quit IRC08:25
*** tesseract has joined #openstack-keystone08:32
*** felipemonteiro has quit IRC08:39
*** Krenair has joined #openstack-keystone08:41
*** pcaruana has joined #openstack-keystone08:44
*** zhurong has joined #openstack-keystone08:45
*** thomasduval has joined #openstack-keystone08:47
*** thomasduval has left #openstack-keystone08:48
*** thomasduval has joined #openstack-keystone08:48
*** thomasduval has quit IRC08:48
*** pcaruana has quit IRC08:54
*** masber has quit IRC09:09
*** kmARC has quit IRC09:15
*** AlexeyAbashkin has joined #openstack-keystone09:17
*** rcernin has joined #openstack-keystone09:44
*** dims has quit IRC09:45
*** dims has joined #openstack-keystone09:49
*** d0ugal has quit IRC09:50
*** sticker has joined #openstack-keystone09:55
*** d0ugal has joined #openstack-keystone10:07
*** masber has joined #openstack-keystone10:28
*** AlexeyAbashkin has quit IRC11:05
*** AlexeyAbashkin has joined #openstack-keystone11:16
*** MeltedLux has quit IRC11:56
*** MeltedLux has joined #openstack-keystone11:56
*** nicolasbock has joined #openstack-keystone12:25
*** mvk has quit IRC12:33
*** zhurong_ has joined #openstack-keystone12:54
*** aojea_ has joined #openstack-keystone13:01
*** zhurong has quit IRC13:02
*** panbalag has joined #openstack-keystone13:12
*** panbalag has left #openstack-keystone13:15
*** markvoelker has quit IRC13:24
*** markvoelker has joined #openstack-keystone13:24
*** edmondsw has joined #openstack-keystone13:27
*** gongysh has joined #openstack-keystone13:40
*** zhurong_ has quit IRC13:42
*** szaher has quit IRC13:42
*** mvk has joined #openstack-keystone13:46
*** jaosorior has quit IRC13:49
*** szaher has joined #openstack-keystone13:49
*** jaosorior has joined #openstack-keystone13:49
*** jaosorior has quit IRC13:49
*** jaosorior has joined #openstack-keystone13:51
*** itlinux has joined #openstack-keystone13:55
*** szaher has quit IRC14:00
*** szaher has joined #openstack-keystone14:07
*** germs has joined #openstack-keystone14:11
*** germs has quit IRC14:11
*** germs has joined #openstack-keystone14:11
hamzylbragstad, I took a stab http://paste.openstack.org/show/693357/ but seem to be missing something. How do you get it to actually try and load a driver and throw an exception if not found?14:13
*** r-daneel has joined #openstack-keystone14:16
hamzyand for anyone else really :)14:17
*** germs has quit IRC14:22
*** sapd__ has joined #openstack-keystone14:27
*** jaosorior has quit IRC14:29
*** sapd_ has quit IRC14:31
*** r-daneel has quit IRC14:33
*** aojea_ has quit IRC14:39
*** idlemind has joined #openstack-keystone14:43
knikollao/14:46
*** gongysh has quit IRC14:49
*** r-daneel has joined #openstack-keystone14:56
*** sticker has quit IRC15:03
*** jaosorior has joined #openstack-keystone15:04
*** spilla has joined #openstack-keystone15:04
*** itlinux has quit IRC15:09
openstackgerritSam Yaple proposed openstack/keystone master: [WIP] Extend bindep usage  https://review.openstack.org/54922315:18
*** links has quit IRC15:24
*** masber has quit IRC15:28
openstackgerritJohannes Grassler proposed openstack/keystone-specs master: Added trust-scope-extensions  https://review.openstack.org/39633115:35
*** rcernin has quit IRC15:43
ayoung>>> from keystone.server import wsgi15:45
ayoung>>> app = wsgi.initialize_admin_application()15:45
ayoung>>> print (app['/v3'].application.application.application.application.application.application)15:45
ayoung<keystone.middleware.auth.AuthContextMiddleware object at 0x7ff170993b70>15:45
ayoung>>> print (app['/v3'].application.application.application.application.application.application.application)15:46
ayoung...15:46
ayoung2018-03-06 10:45:51.913 17800 ERROR keystone AttributeError: 'AuthContextMiddleware' object has no attribute 'application'15:46
ayoungso down that whole chain it is application objects, until we get to AuthContextMiddleware15:46
ayoungthen what15:46
ayoungthat chain is set up from the paste:15:47
ayoung[pipeline:api_v3]15:47
ayoungpipeline = healthcheck cors sizelimit http_proxy_to_wsgi osprofiler url_normalize request_id build_auth_context token_auth json_body ec2_extension_v3 s3_extension service_v315:47
ayoungI want to walk it down to  service_v315:47
ayoungand eventually print out the map of URL to functions...15:48
ayoungto get the policy enforcement points15:48
ayoung@kmalloc, any idea?15:49
ayoungOK./..too early for him...lets go to the WSGI app and see if we can figure it out from there15:52
*** aojea_ has joined #openstack-keystone15:57
*** jaosorior has quit IRC15:58
ayoungok,  so keystone.common.wsig.MiddleWare, base class for this:16:08
ayoungresponse = request.get_response(self.application)16:08
ayoungbut this class is not a Middleware, so...16:09
ayoungAuthContextMiddleware(provider_api.ProviderAPIMixin,16:09
*** itlinux has joined #openstack-keystone16:09
ayoungdoesn't do much, just provides a getattr impl16:09
ayoung auth_token.BaseAuthProtocol16:10
ayoungfrom keystonemiddleware import auth_token16:10
ayoungthat is in __init__.py16:11
ayoung __call__(self, req):  does this16:11
ayoung response = req.get_response(self._app)16:11
ayoungok...so moving on...16:12
*** sapd__ has quit IRC16:17
*** sapd__ has joined #openstack-keystone16:17
*** sapd__ has quit IRC16:19
*** sapd__ has joined #openstack-keystone16:20
*** aojea_ has quit IRC16:23
ayoungOK  this worked....16:27
ayoung for route in composing._router.mapper.matchlist:16:27
ayoung    print(route.routepath)16:27
ayoung composing was defined as16:27
ayoungcomposing = app['/v3'].application.application.application.application.application.application._app.application.application.application.application16:28
ayoungBlog post incipient16:28
*** germs has joined #openstack-keystone16:39
*** germs has quit IRC16:39
*** germs has joined #openstack-keystone16:39
*** kevinbenton has quit IRC16:41
knikollaayoung: your blog posts are always a nice resource16:43
*** germs has quit IRC16:43
*** kevinbenton has joined #openstack-keystone16:43
*** mvk has quit IRC16:54
*** AlexeyAbashkin has quit IRC16:57
*** panbalag has joined #openstack-keystone17:01
openstackgerritJohannes Grassler proposed openstack/keystone-specs master: Added trust-scope-extensions  https://review.openstack.org/39633117:17
cmurphylbragstad: I won't make the meeting tonight, and I will probably be late for office hours, but I tried to go through the roadmap etherpad and firm up my commitment to things17:19
lbragstadcmurphy: ack - thanks for the heads up17:19
lbragstadi don't expect us to go through a whole lot today - i would imagine people are fighting jet lag17:20
lbragstadand just getting caught up17:20
*** gyee has joined #openstack-keystone17:33
*** aojea_ has joined #openstack-keystone17:51
*** oikiki has joined #openstack-keystone18:07
*** AlexeyAbashkin has joined #openstack-keystone18:26
*** tesseract has quit IRC18:27
*** AlexeyAbashkin has quit IRC18:30
*** rarora has quit IRC18:37
*** jmlowe has joined #openstack-keystone18:39
*** harlowja has joined #openstack-keystone18:39
*** germs has joined #openstack-keystone18:39
*** germs has quit IRC18:39
*** germs has joined #openstack-keystone18:39
*** germs has quit IRC18:44
*** aojea_ has quit IRC19:00
*** oikiki has quit IRC19:03
lbragstad#startmeeting keystone-office-hours19:05
openstackMeeting started Tue Mar  6 19:05:36 2018 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.19:05
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.19:05
*** openstack changes topic to " (Meeting topic: keystone-office-hours)"19:05
*** ChanServ changes topic to "Queens release schedule: https://releases.openstack.org/queens/schedule.html | Meeting agenda: https://etherpad.openstack.org/p/keystone-weekly-meeting | Bugs that need triaging: http://bit.ly/2iJuN1h | Trello: https://trello.com/b/wmyzbFq5/keystone-rocky-roadmap"19:05
openstackThe meeting name has been set to 'keystone_office_hours'19:05
kmallocsorry for being a bit late for office hours/missing meeting19:07
hamzyI took a stab http://paste.openstack.org/show/693357/ but seem to be missing something. How do you get it to actually try and load a driver and throw an exception if not found?19:07
*** oikiki has joined #openstack-keystone19:08
lbragstadkmalloc: no worries19:09
lbragstadhamzy: i can take a look today19:09
hamzysure, I know you are busy... I was also trying to get other input as well19:10
hamzyI know pretend running things in mock is challenging19:12
*** germs has joined #openstack-keystone19:13
*** germs has quit IRC19:13
*** germs has joined #openstack-keystone19:13
kmalloclbragstad: i was cleaning up tempered glass :( it's been hours of finding yet again more glass on the floor19:16
lbragstadthat doesn't sound fun19:16
kmallocnope, it has not been fun19:18
*** portdirect has quit IRC19:41
*** portdirect has joined #openstack-keystone19:42
*** germs has quit IRC19:45
*** mvk has joined #openstack-keystone19:58
*** david-lyle has joined #openstack-keystone20:08
cmurphyo/20:09
cmurphywe're not going over roadmap stuff in this office hours?20:10
*** david-lyle has quit IRC20:15
ayoungcmurphy, https://review.openstack.org/#/c/396331/7/specs/keystone/rocky/trust-scope-extensions.rst  is almost exactly my RBAC in middleware spec20:27
knikollaayoung: yep, more or less.20:28
knikollabut only for application credentials.20:28
cmurphyayoung: it has a lot of the same elements20:28
ayoungI was trying to avoid "get a whitelist during token validation" but beyond that...it just adds the ability to lock it down to a specific instance of a templatized URL, which I totally dig20:28
cmurphyawesome20:29
ayoungcmurphy, so I think we can automate some of the "map from URL to policy" that was a sticking point20:29
*** jmlowe has quit IRC20:29
ayounghttps://adam.younglogic.com/2018/03/inspecting-keystone-routes/20:29
ayoungthat means we can get a list of the URL routes:20:29
ayounga little more probing and I think I can generate a list like this:20:30
ayoungGET /users/{user_id}  keystone.identity.controllers.Controller#get_user20:30
ayoungto be able to figure out what function is called.  Then...maybe I can use some of the same techniques as the callgraph package to figure out what policy gets called20:31
knikollaayoung: would that work for services outside of keystone?20:31
ayoungI tried pycallgraph but it got too much in it20:31
ayoungknikolla, I think so?20:31
ayoungknikolla, it would have to be adapted to each, of course, but once we get the mechanism down, I don't think it would be too bad20:32
cmurphyayoung: why is that mapping a requirement?20:32
cmurphythis spec proposes a layer before even hitting policy20:33
ayoungcmurphy, so was mine, and there was the argument that it was not sufficient20:33
ayoungsometimes the policy is deep in the code.20:33
ayoungfor example,  we might want to have different policy for someone creating a project under a domain/top level than nested under another project20:33
knikollaayoung: the rbac-in-middleware proposed restricting an entire users access. this is just about whitelisting **just** an app cred to a specific operation. scope is broadly different.20:34
ayoungso, yeah, I wanted to enforce RBAC in middleware, just like he is proposing20:34
ayoungknikolla, heh...his is the degenerate case.20:34
ayoungknikolla, and I don't want to do it just for app creds20:35
ayoungget it down to 1 role per operation20:35
ayoungmake a Fernet token format that can have exactly one role specified in it20:35
ayoungand make it possible to request tokens with a subset of a users roles20:35
ayoungso, yeah, we can build a whole new mechanism, or we can build on top of what we have20:36
lbragstadcmurphy:  i think hrybacki was planning on doing that next week during office hours20:36
ayoungknikolla, you aslo need to know "what role do I need to perform this operation" in the first place20:36
ayoungotherwise, the app-cred thing is going to break if the roles are ever updated20:37
cmurphyayoung: we don't want to deal with roles at all here20:37
ayoungwe would have built a parallel strucutre and locked us in to the current role scheme20:37
cmurphywe don't want to solve the "what role do i need" question yet20:37
cmurphyit's just a simple front end layer in front of the current rbac implementation20:37
ayoungcmurphy, Heh20:37
ayoungjust?20:37
cmurphyheh20:38
ayoungSo, yeah, we are going to screw with RBAC no matter what, either implicitly or explicitly20:38
ayoungI'd rather have a single access control mechanism than two20:39
cmurphyI disagree in the short term20:39
*** david-lyle has joined #openstack-keystone20:39
ayoungcmurphy, there is no short term in keystone20:39
ayoungI worked on this longer than my wife was in Grad school20:39
ayoungcmurphy, OK,  here's an example where things will break20:41
ayoungsay I want to delegate to another user the ability to create a server, but, unknown to me, nova makes a Cinder call to mount the volume.  If I only delegate Nova /server/create  it will fail, and I won't know when it fails.20:42
ayounghow do we determine: this is what you need to have in order to perform this operation20:43
ayoungpeople will not be able to build fine grained delegations like these without a catalog of that20:43
ayoungso, the thing that I am doing to pull out the policy?  It should also be able to pull out calls to other services20:43
ayounglets generate that graph, and work from that information20:44
*** jmlowe has joined #openstack-keystone20:44
ayoungPlease don't disregard all of the effort, time, and discussion that went in to the previous design because this one looks simpler at the surface.  There are rocks under the waves.20:45
ayoungWe are also leaving security holes open if we do not address the RBAC approach properly.20:45
cmurphyayoung: what if we could build on the service token support to delegate those implicit calls like mount volume?20:46
ayoungcmurphy, that is still based on the original user having that permission20:46
cmurphyayoung: they do have that permission because they have a role that allows it20:46
ayoungthe ervice token just adds to it the constraint that it can only be done in conjunction with the service token20:47
ayoungso either it is "all users can do this"  or "none"20:47
ayoungsomestimes you have to create the volume explicitly first, and do that by downloading an image from Glance.  Lots of use cases.  We don't want to hard code the access for them20:48
cmurphyif the specific use case is an application that must create volumes and download glance images explicitly then the user would build that into their whitelist20:48
knikollai think using service tokens takes us to dangerous territory. what if we don't want that app cred to create volumes, but they can do so by creating a server and then shutting it down?20:49
cmurphyif it's relying on nova implicitly doing things for them then i think we could finagle the service token to proxy the request for them when they already have a traditional role that allows them to do that20:49
ayoungSo...if we are willing to entertain the extensions he's proposing, we should be wiling to entertain the RBAC in middleware.  It is the more general solution, and can be extended to cover his use cases by providing "fill in the template with these values"20:49
ayoungand it allows a user with Admin to not provide full admin when making an interactive call to a third party service20:50
ayoungand supports trusts and oauth20:50
*** spilla has quit IRC20:51
ayoungand allows an admin to set up the delegations, not just the end user20:51
ayoungwin -win all around20:51
*** david-lyle has quit IRC20:52
cmurphywhat i like about this approach is 1) it's not an overhaul of how things already work, we can work on converging them incrementally 2) the policy mapping isn't stored in keystone, it's all contained in the application credential (or trust)20:54
ayoungthe application credential is stored in keystone20:55
ayoungyou still need that knowledge somehow20:55
cmurphywhen you get a token with the application_credential method it could contain the whitelist20:56
*** aojea_ has joined #openstack-keystone21:01
cmurphyayoung: we also don't have a way right now for users to create their own roles, so we would need every possible role created out of the box in order for this to be self-service, and we don't even have a read-only role out of the box21:02
ayoungcmurphy, which is a far more pressing request21:04
ayoungwe've had a request for a read only role for years21:04
cmurphyayoung: it's on the roadmap for this cycle too https://etherpad.openstack.org/p/rocky-PTG-keystone-policy-roadmap21:04
ayoungessentially, you are saying that the existing stuff is so broken that you don't want to fix it, and instead bolt something on over the top.  I don't fault you for that attitude, as it is a painful path to fix.21:05
cmurphyayoung: i'm not saying i don't want to fix it, i'm saying we can take incremental realistic steps toward fixing it21:05
cmurphywe can't overhaul it21:05
*** aojea_ has quit IRC21:05
ayoungcmurphy, and I am saying that if you pursue this approach without fixing the underlying RBAC you will paint yourself into a corner21:06
ayoungyes, you can do it, but then you won;t be able to change roles, because this mechanism will assume the current role structure21:06
ayounglets focus on fixing RBAC, and then do this on top of that,21:06
*** r-daneel_ has joined #openstack-keystone21:07
*** r-daneel has quit IRC21:08
*** r-daneel_ is now known as r-daneel21:08
cmurphy"this mechanism will assume the current role structure" all of openstack assumes the current role structure, the only way we can change it is by doing it incrementally21:11
ayoungcmurphy, and that is what I have spent years laying out21:13
ayoungyeaahs as they say here in Boston21:13
ayounglets fix policy.21:13
ayounglets fix RBAC21:13
ayoungno new mechanisms that work around the brokenness21:14
ayoungGAh...callgraph needs full code...21:14
-openstackstatus- NOTICE: The infrastructure team is aware of replication issues between review.openstack.org and github.com repositories. We're planning a maintenance to try and address the issue. We recommend using our official supported mirrors instead located at https://git.openstack.org.21:18
ayoungcmurphy, so I origianlly had RBAC in middleware fetching the URLs during token validation phase.21:18
ayoungeither the data was too big21:19
ayoungyou coulod easily do a hash value in to token that, if it does not exist, fetch the data you need from Keystone.  It would be the equivalent to what he's doing there.21:20
ayoungand store the rbac rules by the hash21:20
ayoungin Memcache21:20
ayoungso, reconcile the two and you'll have my full support.  Ignore me and work around me and I'll just be sad and grumpy21:21
cmurphyayoung: i think the data won't be too big because we're not fetching the whole mapping for all the policies, we're just fetching a short whitelist and we could even limit the list size21:23
ayoungcmurphy and then your are limiting it to your use cases21:23
*** david-lyle has joined #openstack-keystone21:24
cmurphyayoung: i can't argue that, but i believe we can build something that solves the end-user case and works now and work in parallel on fixing rbac, i'm not convinced they're in conflict21:28
*** germs has joined #openstack-keystone21:31
*** germs has quit IRC21:31
*** germs has joined #openstack-keystone21:31
*** germs has quit IRC21:35
*** afred312 has quit IRC21:41
*** david-lyle has quit IRC21:41
lbragstadhamzy: i think you're missing a callable in http://paste.openstack.org/show/693357/21:44
lbragstadhamzy: http://paste.openstack.org/show/693465/ works for me but it could be generalized instead of being a token test21:47
lbragstad(since it doesn't really have anything to do with tokens anymore)21:47
*** dave-mccowan has quit IRC21:49
*** david-lyle has joined #openstack-keystone21:51
*** threestrands has joined #openstack-keystone21:54
lbragstad#endmeeting22:00
*** openstack changes topic to "Queens release schedule: https://releases.openstack.org/queens/schedule.html | Meeting agenda: https://etherpad.openstack.org/p/keystone-weekly-meeting | Bugs that need triaging: http://bit.ly/2iJuN1h | Trello: https://trello.com/b/wmyzbFq5/keystone-rocky-roadmap"22:00
openstackMeeting ended Tue Mar  6 22:00:14 2018 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)22:00
openstackMinutes:        http://eavesdrop.openstack.org/meetings/keystone_office_hours/2018/keystone_office_hours.2018-03-06-19.05.html22:00
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/keystone_office_hours/2018/keystone_office_hours.2018-03-06-19.05.txt22:00
openstackLog:            http://eavesdrop.openstack.org/meetings/keystone_office_hours/2018/keystone_office_hours.2018-03-06-19.05.log.html22:00
*** aojea_ has joined #openstack-keystone22:02
*** r-daneel_ has joined #openstack-keystone22:03
*** r-daneel has quit IRC22:04
*** r-daneel_ is now known as r-daneel22:04
*** itlinux has quit IRC22:04
openstackgerritLance Bragstad proposed openstack/keystone-specs master: Repropose JWT specification for Rocky  https://review.openstack.org/54190322:06
*** aojea_ has quit IRC22:07
*** aojea_ has joined #openstack-keystone22:12
*** david-lyle has quit IRC22:13
*** aojea_ has quit IRC22:16
*** rcernin has joined #openstack-keystone22:20
*** david-lyle has joined #openstack-keystone22:30
hamzythanks lbragstad, I did verify the working and nonworking by changing the string. How about instead of test_import_error_for_uuid_provider I call it test_import_error_for_missing_provider since the uuid function just generates a random string?22:30
*** germs has joined #openstack-keystone22:36
*** germs has quit IRC22:36
*** germs has joined #openstack-keystone22:36
lbragstadhamzy: yeah - that's probably fine but we might be able to pull it into a more general location22:37
lbragstador - if you use the config_fixture like you were doing originally, it could live in the module you had it in22:38
lbragstadi think you'd just need to call load_backends?22:38
hamzyup one directory for choice 1?22:39
*** martinus__ has quit IRC22:39
lbragstadbut the crux of the issue you were hitting with the test was probably due to the a missing callable in the assertRaisesRegex()22:39
hamzyyes, I was not calling manager.load_driver22:39
*** david-lyle has quit IRC22:40
hamzyso do you want 1) move your test somewhere else or 2) write a test using config_fixture in the current location22:41
lbragstadi'm not seeing a module for testing common manager functionality22:41
lbragstadso maybe 2 will be easier for the sake of a fix22:42
*** felipemonteiro has joined #openstack-keystone22:42
lbragstadin that case, you should be able to hit this if you set the config_fixture (like you were doing) and then instantiating an instance keystone.token.provider.Manager22:43
lbragstadthat *should* raise an ImportError exception22:43
*** jrist has quit IRC22:47
*** jrist has joined #openstack-keystone22:48
*** AlexeyAbashkin has joined #openstack-keystone22:48
*** masber has joined #openstack-keystone22:50
hamzylbragstad, then https://paste.fedoraproject.org/paste/3hG90i8fPffez6SjfYpX-A ?22:51
lbragstadyeah - that invokes load_driver from the manager directly, which workds22:52
lbragstadworks*22:52
*** AlexeyAbashkin has quit IRC22:52
lbragstadbut if you want to test it specifically for token provider instances, you can do something like22:52
lbragstadhttp://paste.openstack.org/show/693493/22:53
lbragstadload_drivers will get called in the init of the common Manager class, which is inherited in keystone.token.provider.Manager22:55
*** masuberu has joined #openstack-keystone22:55
lbragstadthat should make the test specific enough to keep in that module for now22:56
*** masber has quit IRC22:59
hamzylbragstad, this is what it looks like now http://paste.openstack.org/show/693496/23:04
hamzyI guess that you are still saying that test_import_error_for_missing_provider doesn't fit where it is now?23:04
*** germs has quit IRC23:05
lbragstadhamzy: i think what you have in test_import_error_for_uuid_provider looks good23:08
*** oikiki has quit IRC23:08
lbragstadthe second test might be redundant23:08
*** oikiki has joined #openstack-keystone23:08
hamzyyeah... but it does test manager.load_driver and with random names... minor niggles23:09
lbragstadright - it implies it will be called by the Manager init23:09
hamzyso ditch it?23:09
lbragstadit wouldn't stop me from approving the patch if you ditched test_import_error_for_missing_provider23:10
lbragstadbecause the coverage would be the same and we'd still know if it broke somehow23:10
hamzyit sounds like you would feel more comfortable without the second test23:11
lbragstadyeah - i'd be fine if you didn't include it in the next patch set23:11
lbragstadjust because it's too general for that specific module imo23:12
openstackgerritMark Hamzy proposed openstack/keystone master: Fix formatting of ImportError  https://review.openstack.org/54987023:12
*** david-lyle has joined #openstack-keystone23:26
*** felipemonteiro has quit IRC23:27
*** r-daneel has quit IRC23:40
*** david-lyle has quit IRC23:42

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!