Wednesday, 2018-08-08

openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert endpoints api to flask native dispatching  https://review.openstack.org/58964200:37
*** gyee has quit IRC00:38
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert regions API to flask native dispatching  https://review.openstack.org/58964000:38
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert services api to flask native dispatching  https://review.openstack.org/58964100:38
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert endpoints api to flask native dispatching  https://review.openstack.org/58964200:38
*** wxy-xiyuan has quit IRC01:06
*** wxy-xiyuan has joined #openstack-keystone01:06
*** Emine has quit IRC02:00
openstackgerritBoxiang Zhu proposed openstack/python-keystoneclient master: refactor the getid method in keystoneclient/base.py  https://review.openstack.org/58968902:36
*** dave-mccowan has quit IRC02:57
*** dklyle has quit IRC02:58
*** zhurong has joined #openstack-keystone03:01
*** jaosorior has joined #openstack-keystone03:59
*** zhurong has quit IRC04:20
*** jenglisch has quit IRC04:27
*** shyambiradar has joined #openstack-keystone05:01
*** shyambiradar has quit IRC05:04
*** shyambiradar has joined #openstack-keystone05:04
*** shyambiradar has quit IRC05:14
*** shyambiradar has joined #openstack-keystone05:24
*** jaosorior has quit IRC05:27
*** hoonetorg has quit IRC05:31
*** hoonetorg has joined #openstack-keystone05:52
*** shyam89 has joined #openstack-keystone05:56
*** zhurong has joined #openstack-keystone05:57
*** shyambiradar has quit IRC05:58
*** shyambiradar has joined #openstack-keystone05:59
*** nicolasbock has joined #openstack-keystone06:03
*** hoonetorg has quit IRC06:06
*** jdennis has quit IRC06:09
*** jdennis has joined #openstack-keystone06:26
*** pcaruana has joined #openstack-keystone06:27
*** shyam89 has quit IRC06:35
*** shyambiradar has quit IRC06:36
*** jaosorior has joined #openstack-keystone06:44
*** shyambiradar has joined #openstack-keystone06:58
*** s10 has joined #openstack-keystone06:58
*** s10 has quit IRC07:08
*** shyambiradar has quit IRC07:30
*** rcernin has quit IRC07:35
*** jaosorior has quit IRC07:38
*** jaosorior has joined #openstack-keystone07:38
*** jaosorior has quit IRC07:41
*** jaosorior has joined #openstack-keystone07:41
*** jaosorior has quit IRC07:42
*** jaosorior has joined #openstack-keystone07:43
*** chason has quit IRC07:49
*** shyambiradar has joined #openstack-keystone08:20
*** Emine has joined #openstack-keystone08:23
*** zhurong has quit IRC08:26
*** shyam89 has joined #openstack-keystone08:42
*** shyambiradar has quit IRC08:45
*** shyam89 has quit IRC08:45
*** shyambiradar has joined #openstack-keystone08:45
*** shyambiradar has quit IRC08:54
*** shyambiradar has joined #openstack-keystone08:54
openstackgerritOpenStack Release Bot proposed openstack/python-keystoneclient master: Update reno for stable/rocky  https://review.openstack.org/58979109:35
*** edmondsw has joined #openstack-keystone09:45
*** edmondsw has quit IRC09:49
*** shyam89 has joined #openstack-keystone09:55
*** shyambiradar has quit IRC09:57
openstackgerritVishakha Agarwal proposed openstack/keystone master: Implement Trust Flush via keystone-manage.  https://review.openstack.org/58937810:07
openstackgerritVishakha Agarwal proposed openstack/keystone master: Implement Trust Flush via keystone-manage.  https://review.openstack.org/58937810:25
*** shyam89 has quit IRC10:53
*** shyam89 has joined #openstack-keystone10:53
*** jaosorior has quit IRC10:58
*** jaosorior has joined #openstack-keystone10:59
*** dave-mccowan has joined #openstack-keystone11:00
*** shyam89 has quit IRC11:35
*** shyambiradar has joined #openstack-keystone11:35
*** shyambiradar has quit IRC11:37
*** shyambiradar has joined #openstack-keystone11:38
*** shyambiradar has quit IRC11:50
*** shyambiradar has joined #openstack-keystone11:51
*** chason has joined #openstack-keystone11:52
*** raildo has joined #openstack-keystone12:02
*** shyam89 has joined #openstack-keystone12:05
*** shyambiradar has quit IRC12:09
*** shyambiradar has joined #openstack-keystone12:44
*** shyam89 has quit IRC12:48
*** edmondsw has joined #openstack-keystone13:05
*** shyambiradar has quit IRC13:08
lbragstadknikolla: have you been following http://lists.openstack.org/pipermail/edge-computing/2018-August/000379.html at all?13:40
lbragstadjust curious13:40
cmurphythat call is happening now fyi13:41
cmurphyor no it's the other edge group i guess13:42
lbragstadthere hasn't been a time set for the keystone-specific one has there?13:44
cmurphyi don't know13:45
lbragstadi'll assume not since no one has replied to the thread yet13:46
cmurphyildikov: ^13:48
ildikovlbragstad: cmurphy: today's call is an OPNFV one13:48
lbragstadack13:48
cmurphyyeah i got them confused13:48
ildikovlbragstad: cmurphy: I've just wanted to ping you and knikolla to ask whether anyone would be available tomorrow :)13:48
ildikovwe would like to start evaluating options that we collected regarding how to use Keystone in edge scenarios13:49
*** _ix has joined #openstack-keystone13:49
ildikovand in addition we can plan for the PTG and follow up testing and demo activities13:49
cmurphyi think i have another meeting13:49
lbragstadi can sit in tomorrow, but i'm going to be traveling all day friday13:49
ildikovand as no one besides the keystone team is an expert of Keystone at this moment we need someone from this team ideally13:49
ildikovlbragstad: the most votes are for 1300 UTC tomorrow13:50
ildikovlbragstad: would be a Zoom call as that's what people seem to prefer these days, but we usually try to take notes on the edge IRC channel as well13:50
cmurphyoh i should be able to do 130013:50
ildikovcmurphy: basically the same time as the OPNFV call today13:50
ildikovit's probably a first of a series13:51
lbragstadi can make that work for tomorrow i think13:51
lbragstadildikov: i've added a slot for edge related discussions to the federation section of our PTG etherpad https://etherpad.openstack.org/p/keystone-stein-ptg13:51
lbragstad(line 52 - 53)13:52
ildikovlbragstad: awesome, I wanted to ask you about that too :)13:53
lbragstadaccording to the PTG schedule, we have monday set aside for x-project related things13:53
lbragstadthursday and friday are supposed to be project specific13:53
ildikovlbragstad: I will try to get the StarlingX people and the Edge Computing Group people in sync about this13:53
lbragstadbut if there is a time that works better for other, let me know or just jot it down in the etherpad13:53
lbragstad(i don't plan on formatting it into an actual schedule until the end of this month)13:54
ildikovlbragstad: those groups meet one on Tuesday the other one on Wednesday so if we cannot make Monday work we still have one room each following day to figure it out13:54
ildikovlbragstad: sounds great, I will let both groups know about this so that we can plan13:55
lbragstadwithout getting ahead of myself, i was going to try and keep tuesday open to deal with fallout of monday cross-project work13:55
lbragstadbut maybe i can tag along in the edge discussions with folks on wednesday13:55
lbragstadand if keystone comes up, it comes up13:55
ildikovwe can try to position this for Monday and then figure it out when to follow up if we need to13:56
ildikovwould that sound good?13:56
lbragstadsure13:59
ildikovcool, I will write up a mail about it to the ML's and will keep you posted about how things go14:01
ildikovdid you have any time estimation for the topic or we have some flexibility on that?14:01
lbragstadi expect we'll have some flexibility - i imagine the major x-project discussions to be unified limits and policy stuff14:05
*** elibrokeit has quit IRC14:05
kmallocildikov: If it wasn't a zoom call, I still can't get dialed into those at all, I'd be able to join14:06
kmallocBasically, zoom doesn't work at all for me. :(14:07
kmallocI've tried everything short of running a windows VM at this point.14:07
kmallocI guess I need to do that if I were to want to join.14:08
cmurphyit works surprisingly well for me14:08
kmallocIt plain doesn't run/work on my 18.04 laptop, can't install on my RHEL one, fedora it crashes on.14:09
lbragstadi think i just had to download a plugin when i clicked on the meeting link14:09
kmallocThe plug-in is terrible.14:09
kmallocAnd that is my problem.14:09
kmallocThey really need to ditch the plug-in and go with a browser-pluginless solution.14:10
cmurphyit made me download a full on desktop client14:12
cmurphywhich annoyed me but it works so ¯\_(ツ)_/¯14:12
lbragstadhuh - maybe that's what i did (version 2.0.115900.1201)14:13
kmallocApparently they have a browser only option as of August 201814:13
*** _ix has quit IRC14:13
cmurphyheh14:13
kmallocI'll try again tomorrow.14:13
kmallocWhat time was it?14:13
cmurphy1300 utc i think14:13
kmallocOh, nope, I won't make it14:14
kmalloc6am calls are not in the plan for me14:14
kmallocHazards of West coast living when apparently everyone else in the community is not in a compatible time zone.14:15
kmallocOh well, I can weigh in on ML and/or after the fact as needed :)14:17
kmallocildikov: sorry, I can't make 6am video calls, but trust lbragstad, cmurphy, and knikolla to be good representation for keystone :)14:17
*** elibrokeit has joined #openstack-keystone14:20
ildikovkmalloc: we have people from China, which kills using Hangouts and I only have Zoom account besides that14:21
*** HW-Peter has joined #openstack-keystone14:21
*** _ix has joined #openstack-keystone14:22
ildikovkmalloc: I'm open to any suggestion for any other time when the time slot is more convenient for you as Zoom works pretty well for those who can access it and I didn't heard other complaints about client issues, etc14:22
ildikovkmalloc: so I'm happy to adopt, but I haven't tested too many open tools to be able to come up with alternative that I trust to be stable enough14:22
ildikovs/adopt/adapt/14:22
lbragstadi used mumble for a while14:25
lbragstadbut that's audio only14:25
ildikovcool, I'll keep that in mind just in case14:39
orange_juliusSo I can't seem to replicate the keystone+ldap issue with a single keystone instance configured. I am starting to wonder if the issue is with the HA or with how the dashboard passing the authentication to keystone. I am going to try to install the dashboard and see if I can get it to replicate in the test environment14:45
orange_juliusThe ldappool connector is created using the designated bind user in the domain configuration is it not? Not the user information that would be passed via the Horizon dashboard14:53
lbragstadwhen i was reading the code, it looked like it was the user that was attempting to authenticate14:54
lbragstadbut i could be wrong14:54
kmallocildikov: zoom is less of an issue ATM, I'll run a VM if needed, but timing is a bigger issue, I really can't do before about 1530 utc15:02
ildikovkmalloc: fair enough, as we have people from APAC that wasn't really an option15:03
ildikovkmalloc: I will try to look into alternating slots and also making sure that the info makes its way out to the ML's15:03
ildikovkmalloc: we just don't have a big group of people so I'm trying my best to keep them on one call to quick things off at least15:04
*** chason has quit IRC15:06
*** chason has joined #openstack-keystone15:07
*** chason has quit IRC15:07
*** chason has joined #openstack-keystone15:08
kmallocildikov: yep, and you have knikolla lbragstad and cmurphy, so changing for.me.isnt important15:23
ildikovkmalloc: I don't think you're less important than others, would be better if you could make it too!15:25
ildikovkmalloc: I blame time zones :)15:25
*** pcaruana has quit IRC15:34
*** Emine has quit IRC15:40
*** jlvillal is now known as jlv-sick15:40
*** aojea has joined #openstack-keystone15:51
openstackgerritLance Bragstad proposed openstack/keystone master: Convert policy API to flask  https://review.openstack.org/58995015:54
lbragstadkmalloc: ^ that's going to fail 18 tests, but wanted to make sure i was doing things right15:54
lbragstadthat just moves the /policy api and doesn't touch the endpoint policy API, yet15:54
*** dklyle has joined #openstack-keystone15:55
*** david-lyle has joined #openstack-keystone15:59
*** dklyle has quit IRC16:01
*** david-lyle is now known as dklyle16:02
*** raildo has quit IRC16:07
*** elibrokeit has quit IRC16:21
*** elibrokeit has joined #openstack-keystone16:22
*** raildo has joined #openstack-keystone16:28
*** dklyle has quit IRC16:43
*** gyee has joined #openstack-keystone16:52
orange_juliusIs there anything I should be aware of with Keystone + RabbitMQ that might cause wierdness? How does keystone use rabbitmq?17:21
*** dklyle has joined #openstack-keystone17:21
lbragstadorange_julius: keystone only uses rabbit for outgoing notifications17:49
orange_juliusHmm ok thanks17:50
lbragstadfor example, when certain events happen in keystone, it can place a notification on the message bus for other things to consume17:50
lbragstad(e.g. you want to know when project resources are updated)17:50
lbragstadotherwise - keystone doesn't consume anything off the message bus..17:51
lbragstadin fact, message queues are entirely optional for keystone from a deployment perspective17:52
*** raildo has quit IRC17:54
*** raildo has joined #openstack-keystone17:54
orange_juliusOk just making sure. Thanks17:55
lbragstadyep - are you able to recreate the bug using your test env?17:56
orange_juliusNot yet. I'm trying to find out what is different. A simple test of vanilla keystone with LDAP doesn't appear to show the same symptoms.. Although actually... I havn't tried it from the cmdline on the prod env yet..17:57
*** dklyle has quit IRC17:57
lbragstadso - you've backed your test keystone to the same AD but you're not locked out when you try and login to horizon using a bad password?17:58
orange_juliusI don't have horizon set up yet. I've been testing with the openstack cmdline tools. 'source rc_file; openstack project list'17:59
orange_juliusbut yes. it is not locking me out17:59
lbragstadinteresting17:59
orange_juliusAlso interesting tidbit. On the test environment I am receiving a "bad password" while doing the cmdline tool test. In prod I receive a "The request you have made requires authentication" message.18:00
orange_juliusThat may be what it is returning when keystone finds a locked user in AD though18:01
* lbragstad spins up a new instances to test with openldap18:06
*** elibrokeit has quit IRC18:07
orange_juliusAfter looking more a tldappool and ldap/common.py it really seems like this should be the issue....18:08
*** Emine has joined #openstack-keystone18:09
*** elibrokeit has joined #openstack-keystone18:09
*** dklyle has joined #openstack-keystone18:09
*** itlinux has joined #openstack-keystone18:12
lbragstadi'm curious if i can recreate this using openldap18:12
lbragstadhttp://www.openldap.org/doc/admin24/overlays.html#Password%20Policies18:13
orange_juliusShould work in theory18:14
*** dklyle has quit IRC18:31
*** dklyle has joined #openstack-keystone18:34
orange_juliusCannot replicate with x3 keystones + haproxy either18:37
orange_juliusHave not tried Galera replication yet. Would that effect it in some way? I wouldn't think so..18:38
*** fiddletwix has quit IRC18:41
*** sapd has quit IRC18:49
kmalloclbragstad: commented, minor nits mostly18:51
kmalloclbragstad: one thing that warrants a -1, and it's about needing to refactor the deprecated decorator18:51
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert endpoints api to flask native dispatching  https://review.openstack.org/58964218:58
*** dklyle has quit IRC18:59
lbragstadorange_julius: no - i wouldn't either19:01
lbragstadkmalloc: ack - thanks for the review19:03
kmalloclbragstad: i found a minor data leak bug in our role API19:14
kmalloclbragstad: i think.19:14
* kmalloc reads this one more time19:14
kmallocit is possible to determine if a role exists [by id] unauthenticated or even if you're authenticated but not allowed to get roles.19:15
kmalloclbragstad: in support of the "domain roles" we call "get_role_wrapper" which does the provider lookup and then passes down to .get_role or .get_domain_role (on the RoleV3 controller)19:16
kmallocget_role and get_domain_role are @protected19:16
kmallocget_role_wrapper is not19:17
kmallocso you can get a RoleNotFound even if you have no token.19:17
kmallocthis is a pretty minor data leak19:17
kmallocbut it is a data leak none-the-less19:17
kmallocand i just relalized this wasn't in a direct messagee... and is in a logged channgel.19:18
kmallocugh19:18
* kmalloc goes and opens a security bug.19:18
orange_juliusSo here is something potentially interesting.. running a TCPDUMP in production shows the authentication request (/v3/auth/tokens) coming through multiple times while a tcpdump in test shows just one request come through19:19
orange_juliusI swear to god if this is a network issue...19:19
kmallocorange_julius: i would be shocked if a network issue caused it since it should require TCP handshake for the post.19:20
orange_juliusAt this point I'm ready to entertain all possibilities. Not being able to replicate this is super frustrating =P19:21
kmallocorange_julius: i could totally buy openstack-django-auth re-sending the post becuase it doesn't get a response it knows is "your username/password is wrong" and instead thinks it is a "token is invalid, reauth"19:21
kmallocbut i would be shocked if a network issue over TCP could cause multiple posts at the network layer itself [application stupidity aside]19:22
orange_juliusIs that the theory that we have been talking about before? openstack-django-auth would only be the horizon dashboard, no?19:22
kmallocyeah it would be.19:23
kmallocif you're using CLI and seeing the issue it coudl point to an issue in keystoneauth mis-raising an exception that could affect more than just horizon, it could impact horizon, cli, etc19:24
orange_juliusYup so the issue happens in the CLI and horizon19:24
kmallocif you use raw CURL to do a post and get the same issue [no python code]19:24
kmallocand the user still gets locked out, then i could see network/keystone/haproxy19:24
kmallocthis might also be the retry logic in ksa.19:24
kmallocksa = keystoneauth library19:25
kmallocor heck just plain requests, but in short don't use keystoneauth, make a direct post to the keystone endpoint to get a token and see if you lock out the user.19:25
orange_juliusAlrighty I'll try that.19:26
kmallocorange_julius: :) i hope it shows that we have a bug in keystoneauth only because it means you did nothing wrong and we can work to get a fix for you/everyone quickly19:28
orange_juliusdirect curl to a keystone endpoint locks out the user19:29
orange_juliusI shouldn't be happy about that, but I am. I think that eliminates a bunch of things that were tumbling around my brain19:30
orange_juliusThe question becomes.... why can't I replicate this19:31
kmalloclbragstad: ah nvm, no security issue, but ick, this code is ... awful19:32
kmallocorange_julius: the curl locked out the user and the TCPdump showed multiple posts?19:32
kmallocorange_julius: just to be sure the user wasn't about to be locked out on a single failed attempt19:33
orange_juliusChecking again now. One sec.19:33
kmallocsure thing :)19:33
lbragstadare you sure you're using the same ldap config as what's in production?19:36
orange_juliusWell I didn't get the tcpdump, but I did just have the account unlocked so I know it didn't have a latent password attempts19:38
orange_juliusand yes I am pretty sure but I will double check. I copied everything over from production19:38
*** Emine has quit IRC19:53
lbragstadkmalloc: TBH i'm liking the self.request_body_json/self.auth_context properties20:00
lbragstadthat's going to be really nice i think20:00
*** Emine has joined #openstack-keystone20:00
*** dklyle has joined #openstack-keystone20:05
kmalloclbragstad:  :)20:08
kmalloclbragstad: advantages to having everything in a clear location20:09
kmalloclbragstad: and having direct access to the request context20:09
kmalloclbragstad: i've almost finished [running tests] for /v3/roles, then will work on OS-INHERIT and /role_inference20:10
kmalloci hope i'll have the bulk of assignment (not the cross-api bits) done shortly20:10
*** itlinux has quit IRC20:12
lbragstadcool - i'm still wading through policy20:16
lbragstadworking on OS-ENDPOINT-POLICY  now though20:16
kmallocOS-ENDPOINT-POLICY shouldn't be too bad.20:17
kmallocyour change will conflict with my endpoints change, but that is not a big deal20:17
kmallocwe can race to rebase :)20:17
kmallocwhomever's lands last will need to update to remove routers.20:17
lbragstadso - the OS-ENDPOINT-POLICY api deals with a bunch of different resources20:19
lbragstadlike policies, endpoints, and services20:19
lbragstadif those resource classes are defined in other modules within keystone/api, can i just import them and re-use them '20:20
lbragstad?20:20
*** raildo has quit IRC20:20
kmallocif you look at https://review.openstack.org/#/c/589288/ you'll see how to wrap members from other apis20:21
kmalloci've already fixed that :)20:21
kmallocand you'll want to move the notification callbacks to the manager20:24
kmalloclbragstad: fwiw, most of what you're seeing is just weirdness in the url20:26
kmallocand line wrapping20:26
kmalloc  /policies/{policy_id}' + self.PATH_PREFIX +20:26
kmalloc                  '/services/{service_id}'),20:26
kmallocthat is really /policies/{policy_id}/OS-ENDPOINT_POLICY/services/{service_id}'),20:26
lbragstadright20:26
kmallocwhich in flask becomes: /policies/<string:policy_id>/OS-ENDPOINT_POLICY/services/<string:service_id>'20:27
kmallocand the controller doesn't actually emit anything20:27
kmallocit's almost all NO_CONTENT20:27
kmalloclist_endpoints_for_policy is the only thing you have to return a value for20:28
lbragstadoh - i suppose20:28
kmallocyep20:28
lbragstadthe write operations are put20:28
lbragstadand delete20:28
kmallocexactly20:28
lbragstadand check policy associations don't return bodies despite being a GET?20:28
kmallocnot according to the code.20:29
kmallocthey don't have return20:29
kmallocso it's an explicit None20:29
lbragstadhmm20:29
kmallocs/explicit/implicit20:29
lbragstadinteresting20:29
kmallocthe biggest change is moving the callbacks to the manager20:29
lbragstadget_policy_for_endpoint seems to20:29
kmallocget policy for endpoint is /endpoints20:30
kmallochttps://git.openstack.org/cgit/openstack/keystone/tree/keystone/api/endpoints.py?h=refs/changes/42/589642/4#n12420:30
lbragstadisn't it /policy ?20:30
kmallocaddressed in my migration of /endpoints20:31
kmallocnope, policy for endpoints goes in /endpoints, list_endpoints_for_policy is in /policy20:31
kmallochttps://github.com/openstack/keystone/blob/master/keystone/endpoint_policy/routers.py#L3820:31
kmallocthis is why moving to keystone.api where all code for a given path prefix lives in one place is so much better20:32
lbragstadah - so i just need to include list_endpoints_for_policy since that's the one under /policies20:32
kmalloci didn't even know endpoint-policy hooked into /endpoints until i failed some tests20:32
kmallocyep.20:32
lbragstadok20:33
kmallocthis whole cross-api extension from random places in the codebase has made the move to flask much harder20:35
lbragstadi'm going to need new resource clases for endpoint policies and service policies20:36
*** dklyle has quit IRC20:58
*** dklyle has joined #openstack-keystone21:02
*** dklyle has quit IRC21:07
*** pcaruana has joined #openstack-keystone21:07
openstackgerritMerged openstack/keystone master: Allow for more robust config checking with keystone-manage  https://review.openstack.org/58930821:37
lbragstadkmalloc: have you seen exceptions like this? http://paste.openstack.org/show/727678/21:49
*** aojea has quit IRC21:55
openstackgerritMerged openstack/keystone master: Convert limits and registered limits to flask dispatching  https://review.openstack.org/58808021:56
*** pcaruana has quit IRC22:02
lbragstadi think it's because i'm defining multiple resource mappings...22:04
*** nicolasbock has quit IRC22:06
*** aojea has joined #openstack-keystone22:08
*** aojea has quit IRC22:09
*** edmondsw has quit IRC22:10
*** aojea has joined #openstack-keystone22:11
*** rcernin has joined #openstack-keystone22:19
*** Emine has quit IRC22:23
*** aojea has quit IRC22:30
openstackgerritLance Bragstad proposed openstack/keystone master: Convert policy API to flask  https://review.openstack.org/58995022:50
*** zioproto_ has joined #openstack-keystone22:55
*** gmann_ has joined #openstack-keystone22:55
*** gagehugo_ has joined #openstack-keystone22:59
*** r-daneel has joined #openstack-keystone22:59
*** lbragstad has quit IRC23:01
*** evrardjp has quit IRC23:02
*** SamYaple has quit IRC23:02
*** Tahvok has quit IRC23:02
*** NikitaKonovalov has quit IRC23:02
*** weezhard has quit IRC23:02
*** mtreinish has quit IRC23:02
*** timss has quit IRC23:02
*** gagehugo has quit IRC23:02
*** gmann has quit IRC23:02
*** zioproto has quit IRC23:02
*** gmann_ is now known as gmann23:02
*** zioproto_ is now known as zioproto23:02
*** Tahvok has joined #openstack-keystone23:03
*** mtreinish has joined #openstack-keystone23:04
*** timss has joined #openstack-keystone23:10

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!