Monday, 2018-08-13

*** Nel1x has quit IRC01:33
*** shyamb has joined #openstack-keystone01:37
*** elibrokeit has left #openstack-keystone01:43
*** lbragstad has joined #openstack-keystone01:58
*** ChanServ sets mode: +o lbragstad01:58
*** shyamb has quit IRC02:21
lbragstadknikolla: ping03:01
knikollalbragstad: o/03:02
*** lbragstad has quit IRC03:06
*** lbragstad has joined #openstack-keystone03:06
*** ChanServ sets mode: +o lbragstad03:06
lbragstadknikolla: sorry - i'm having connectivity issues i think :)03:07
lbragstaddid my question come through?03:09
knikollalbragstad: nope, i don't see it03:09
lbragstadi was curious if you had a baseline for how long it takes to do federated authetication in your public cloud deployment?03:10
knikollalike a benchmark?03:11
lbragstadyeah03:11
lbragstadusing WebSSO and/or CLI03:11
knikollanever measured it, though i can do some profiling tomorrow03:12
lbragstadno worries - i was just curious if you had a general idea03:13
knikollait's not particularly slower than plain sql03:13
lbragstadwould it be weird if it was taking longer than 8 seconds using sso?03:13
lbragstadok - so yeah, 8 seconds would seem slow?03:13
knikollai think so03:15
lbragstadok03:15
lbragstadthat's about as good of an answer i need i think03:15
lbragstadapparently we have an internal team doing some prototypes of federation and they reported some slow authentication times03:16
* lbragstad doesn't have any details about how things are configured03:16
knikollahmmm03:17
lbragstadi plan to ask for specific when wxy-xiyuan and i meet with them, though03:18
lbragstadspecifics*03:18
knikollasure03:18
knikollawebsso is a lot of redirects. running a profiler would point which part is slow.03:19
lbragstadright03:19
lbragstadi don't really have any idea of how much of that time is spent in shib/mellon versus on the wire03:19
lbragstadi assume once things hit keystone-proper, it's pretty similar to a local user authentication flow03:20
knikollaprobably faster since it doesn't have to hash the password03:20
lbragstad++ true03:21
lbragstadbut that's really the only difference, keystone either deals with the password hash or pull attributes exposed from shib and runs it through a mapping03:22
knikollalbragstad: i did get about 5 seconds03:28
knikollawith websso through horizon03:28
knikollawith horizon taking half of that time.03:28
lbragstadinteresting03:28
lbragstadi assume part of that is spent in shib03:29
lbragstadsince it has to verify the assertion and expose the mapped attributes as ENVs03:30
lbragstadthis is totally dependent on the deployment/network, but it would be interesting to setup a test environment with osprofiler enabed and just see how much of that time is actually in keystone03:31
knikollathis was with openid connect and mod_auth_openidc03:31
lbragstadaha03:31
lbragstadwould you expect results using mod_shib to be a lot different?03:31
knikollalbragstad: don't know.03:32
* lbragstad nods03:32
knikollawould make for an interesting comparison thouhg.03:33
lbragstadthis is good to know, if we do get general performance "patterns" then it would be good to add this kinda stuff to docs03:33
lbragstadyeah - absolutely03:33
lbragstadi would stay away from putting numbers in the results, but just abstract them to percentages if we get useful patterns03:34
knikolladefinitely.03:34
knikollalogging off now, talk to you tomorrow! goodnight.03:37
lbragstadthanks for the info knikolla - talk to you tomorrow!03:37
*** redrobot has quit IRC03:55
*** dklyle has joined #openstack-keystone04:23
*** jaosorior has joined #openstack-keystone04:28
*** dave-mccowan has quit IRC04:28
*** dklyle has quit IRC04:38
*** viks_ has joined #openstack-keystone04:47
*** rcernin has quit IRC04:54
*** rcernin has joined #openstack-keystone04:54
*** shyamb has joined #openstack-keystone05:01
*** shyamb has quit IRC05:12
*** shyamb has joined #openstack-keystone05:12
*** openstackgerrit has quit IRC05:18
*** lbragstad has quit IRC05:40
*** lbragstad has joined #openstack-keystone05:42
*** ChanServ sets mode: +o lbragstad05:42
*** jaosorior has quit IRC05:59
*** pcaruana has joined #openstack-keystone05:59
*** shyamb has quit IRC06:03
*** pcaruana has quit IRC06:05
*** pcaruana has joined #openstack-keystone06:19
*** shyamb has joined #openstack-keystone06:40
*** openstackgerrit has joined #openstack-keystone06:41
openstackgerritMerged openstack/oslo.policy master: add python 3.6 unit test job  https://review.openstack.org/58960306:41
*** shyamb has quit IRC06:47
*** shyamb has joined #openstack-keystone06:47
openstackgerritMerged openstack/oslo.policy master: Move _capture_stdout to a common place  https://review.openstack.org/53444006:48
*** ispp has joined #openstack-keystone06:52
*** rcernin has quit IRC07:03
*** evrardjp has joined #openstack-keystone07:08
*** shyamb has quit IRC07:24
*** shyamb has joined #openstack-keystone07:37
*** pcaruana has quit IRC07:43
*** jaosorior has joined #openstack-keystone07:46
lbragstadkmalloc: the migration to flask has got me thinking if we can remove APIs in favor of making RBAC more granular07:52
lbragstade.g. do we really need the domain-roles API/07:52
lbragstad?07:52
*** shyamb has quit IRC07:52
* cmurphy waves at lbragstad07:54
*** lbragstad_ has joined #openstack-keystone07:55
*** ChanServ sets mode: +o lbragstad_07:55
* lbragstad_ is having connectivity issues07:56
lbragstad_cmurphy: did you happen to see my reply to your newsletter last week?07:56
cmurphylbragstad_: i did, i don't totally understand though07:56
*** pcaruana has joined #openstack-keystone07:57
*** lbragstad has quit IRC07:57
cmurphydon't we rev the major version anyway just for the cycle?07:57
lbragstad_oh - i should have clarified the API version07:57
lbragstad_(e.g. 3.10)07:57
cmurphyoh gotcha07:57
cmurphybut that's not really part of the REST API?07:58
lbragstad_right07:58
lbragstad_but something we guarantee now?07:58
lbragstad_bah - i guess someone can delete them after install07:58
cmurphyyeah - also if they're upgrading they're not guaranteed to run bootstrap again07:59
lbragstad_which would be misleading - if we say "yep, 3.11 has these roles by default"07:59
lbragstad_then someone deletes them because $reason07:59
lbragstad_and someone queries the API and sees 3.11 in the response07:59
lbragstad_yeah - then my email doesn't really make sense08:00
mbuilcmurphy: I am a bit stuck with Shibboleth, when you have some time, it would be great if you could give me a hand :)08:00
cmurphymbuil: sure what's up08:01
mbuilcmurphy: I think I had configured everything as stated in the documentation. However, when starting the shibd service or the apache2 service, I get: "Could not load a transcoding service". Logs from apache show nothing else and logs from shibd show nothing08:03
mbuilcmurphy: do you have an example of how conf.d/shib.conf should look like?08:05
cmurphymbuil: hmm that error is totally unfamiliar to me but it might be from the language settings http://shibboleth.net/pipermail/users/2014-December/018662.html08:05
cmurphymbuil: i don't, i don't think i've ever had to change it from the default08:05
*** ispp has quit IRC08:11
mbuilcmurphy: it is apparently something related to systemd. When starting them processes manually, they start correctly. weird... anyway, for a prototype should be enough ;)08:31
cmurphy:)08:32
mbuils/them/the08:32
mbuilcmurphy: regarding the Service Provider’s metadata file. Documentation says that: "If keystone is your Identity Provider you do not need to upload this file.". However, how would the SP and IdP trust each other then?08:34
*** jaosorior_ has joined #openstack-keystone08:36
cmurphymbuil: in the K2K case, the IdP doesn't need to trust the SP since it's never accepting requests from the SP08:39
*** jaosorior has quit IRC08:40
mbuilcmurphy: the SP will query the IdP to verify a user, right? Shouldn't the IdP do a security check on the SP to verify that it is not a rogue one? Maybe it is stupid :P08:42
*** shyamb has joined #openstack-keystone08:44
cmurphymbuil: no, the SP never talks to the IdP in K2K (it's part of why K2K is so weird). The SP gets a signed SAML assertion from the IdP, and so the SP needs to trust the IdP, but all the data about the user needs to be contained in that SAML assertion so the SP should never have to ask the IdP for anything else08:45
mbuilcmurphy: when does the SP get the signed SAML assertion from the IdP?08:46
cmurphymbuil: it goes through the user's client, they have to authenticate with the IdP and pass the response to the SP08:48
mbuilcmurphy: ok, thanks. Hopefully all will be clearer when I see it working :)08:49
openstackgerritMerged openstack/keystone master: Migrate OS-EP-FILTER to flask native dispatching  https://review.openstack.org/58927408:50
cmurphymbuil: yeah i found just tcpdumping everywhere after i had it all set up made it start making sense08:50
openstackgerritMerged openstack/keystone master: Convert OS-SIMPLE-CERT to flask dispatching  https://review.openstack.org/58928208:51
openstackgerritMerged openstack/keystone master: Pass path into full_url and base_url  https://review.openstack.org/58954608:51
*** shyamb has quit IRC09:00
*** shyamb has joined #openstack-keystone09:12
*** shyamb has quit IRC09:14
*** shyamb has joined #openstack-keystone09:14
*** jaosorior_ is now known as jaosorior09:39
mbuilcmurphy: I am at the mapping step: https://docs.openstack.org/keystone/latest/advanced-topics/federation/configure_federation.html#mapping. In the remote part, I should write a couple of keystone users from the IdP keystone, right? (in the example, instead of 'demo' and 'alt_demo'). Should I leave the type as 'openstack_user'?09:39
cmurphymbuil: you could make it even simpler by omitting the any_one_of part and just having [{"type": "openstack_user"}]09:42
cmurphyfor a demo it won't really matter but the mapping rules are supposed to give you pretty fine-grained control over who can log in and what they can do https://docs.openstack.org/keystone/latest/advanced-topics/federation/mapping_combinations.html09:43
mbuilcmurphy: if I omit the 'any_one_of', all users that appear when typing "openstack user list" in keystone-IdP will be mapped to the "federated_users" group?09:48
cmurphymbuil: right09:48
*** shyamb has quit IRC10:07
*** shyamb has joined #openstack-keystone10:09
*** jaosorior has quit IRC10:09
*** jaosorior has joined #openstack-keystone10:11
*** lbragstad_ has quit IRC10:14
*** shyamb has quit IRC10:36
*** dmellado has quit IRC10:46
*** shyamb has joined #openstack-keystone11:00
*** shyamb has quit IRC11:12
*** shyamb has joined #openstack-keystone11:12
*** lbragstad has joined #openstack-keystone11:15
*** ChanServ sets mode: +o lbragstad11:15
*** sapd1 has joined #openstack-keystone11:16
*** dave-mccowan has joined #openstack-keystone11:51
*** raildo has joined #openstack-keystone11:59
*** shyamb has quit IRC12:03
*** shyamb has joined #openstack-keystone12:11
*** shyamb has quit IRC12:15
*** jaosorior has quit IRC12:18
*** jaosorior has joined #openstack-keystone12:19
*** mchlumsky has joined #openstack-keystone12:22
*** jistr is now known as jistr|call12:32
*** nicolasbock has joined #openstack-keystone12:48
*** dmellado has joined #openstack-keystone12:50
*** redrobot has joined #openstack-keystone12:51
*** jroll has quit IRC12:59
*** jroll has joined #openstack-keystone13:00
*** jistr|call is now known as jistr13:04
kmalloclbragstad: we prob could drop domain roles.13:04
*** shyamb has joined #openstack-keystone13:18
*** lbragstad has quit IRC13:22
*** SteelyDan is now known as dansmith13:25
*** mvkr has quit IRC13:29
*** josecastroleon has quit IRC13:29
*** mvkr has joined #openstack-keystone13:59
*** shyamb has quit IRC14:03
*** _ix has quit IRC14:11
*** josecastroleon has joined #openstack-keystone14:35
*** josecastroleon has quit IRC14:36
*** josecastroleon has joined #openstack-keystone14:36
*** _ix has joined #openstack-keystone14:48
orange_juliuscmurphy: re ldappool bug comment. Do you mean catching ldap.invalid_credential above ldap.ldaperror and just breaking the while loop there? I agree that would be cleaner.14:51
cmurphyorange_julius: yes that's what i meant, if that works i'd prefer to do that14:52
orange_juliusOk perfect. I don't see why it wouldn't work. I'll test that change when I get home tonight just to be sure then submit it up14:54
cmurphycool14:55
gagehugoo/15:09
*** shyamb has joined #openstack-keystone15:34
*** pcaruana has quit IRC15:37
knikollao/15:48
kmalloccmurphy: ++15:49
openstackgerritChason Chan proposed openstack/keystone master: Fix the incorrect file path of keystone apache2 configuration  https://review.openstack.org/58693016:07
*** dklyle has joined #openstack-keystone16:10
*** gyee has joined #openstack-keystone16:23
*** pcaruana has joined #openstack-keystone16:40
openstackgerritMerged openstack/keystone master: Remove unused util function  https://review.openstack.org/58723216:45
gagehugokmalloc flask question, do we enforce "identity:get_region" at all here? https://review.openstack.org/#/c/589640/3/keystone/api/regions.py16:47
*** mvkr has quit IRC16:48
gagehugooh, nvm I think I see the issue16:49
*** openstackgerrit has quit IRC17:19
*** NobodyCam has quit IRC17:19
*** NobodyCam has joined #openstack-keystone17:19
*** shyamb has quit IRC17:23
*** aning has joined #openstack-keystone17:29
*** eandersson has quit IRC17:32
*** mvkr has joined #openstack-keystone17:39
kmallocgagehugo: yeah good catch, thnx17:43
*** pcaruana has quit IRC17:59
*** imacdonn has quit IRC18:26
*** imacdonn has joined #openstack-keystone18:51
*** raildo_ has joined #openstack-keystone18:59
*** raildo has quit IRC19:00
*** rmascena__ has joined #openstack-keystone19:06
*** rmascena__ is now known as raildo19:06
*** raildo_ has quit IRC19:08
*** wlmbasson_ has joined #openstack-keystone19:17
*** mgagne_ has joined #openstack-keystone19:24
*** knikolla has quit IRC19:25
*** idlemind has quit IRC19:25
*** adriant has quit IRC19:25
*** robcresswell has quit IRC19:25
*** wlmbasson has quit IRC19:25
*** tommylikehu has quit IRC19:25
*** jgrassler has quit IRC19:25
*** mgagne has quit IRC19:25
*** charz has quit IRC19:25
*** wlmbasson_ is now known as wlmbasson19:25
*** adriant has joined #openstack-keystone19:26
*** knikolla has joined #openstack-keystone19:26
knikollakmalloc: the os-federation flask patch is failing on the tempest federation tests19:29
*** raildo has quit IRC19:30
*** raildo has joined #openstack-keystone19:31
kmallocknikolla: i figured it probably would.19:42
kmallocknikolla: what part is failing?19:43
knikollakmalloc: http://logs.openstack.org/82/591082/6/check/keystone-dsvm-functional-v3-only/0ab5d9b/logs/screen-keystone.txt.gz#_Aug_11_23_37_18_42058819:43
kmallocknikolla: and you're testing the latest patchset?19:43
knikollathe /auth part19:43
kmallochmm19:44
kmalloci didn't change the /auth paths19:44
knikolla identity_providers/testshib/protocols/mapped/auth19:44
kmallocor is this the os-federation/auth ?19:44
kmallocah19:45
kmallocthat part19:45
kmallochm.19:45
kmallocknikolla: we need to make that a voting job btw19:45
kmalloci ignore non-voting 100% of the time19:46
kmallocif it isn't voting, i assume it's superfluous19:46
kmallocprobably incorrect on my part, but still.19:46
kmallocoh, i think this is the json-body check19:46
kmallocoh, huh.19:47
kmallocthis is weird19:47
rodrigodsi think it is not voting because it uses testshib19:49
rodrigodsand we don't want to block our patches if an external service is down19:49
kmallocrodrigods: right. we need to fix that asap imo19:49
rodrigods+119:49
kmallocbecause we don't gate on non-voting tests19:49
kmallocaka, it really doesn't mean much, could break between check->gate and we wouldn't know19:49
rodrigodsyep, rn is basically task of the reviewer to check if the failure is important or not19:50
rodrigodsi can try to make this a project for the next outreachy round19:50
kmalloc++19:50
kmallocthat would be fantastic19:50
kmallocit shouldn't be too bad to do19:50
rodrigodsyep19:50
rodrigodslots of ramp up for the intern, but the result is very useful19:51
cmurphydo you have an idp implementation in mind?19:51
cmurphyshibboleth and keycloak are not trivial to set up afaik19:51
knikollak2k tests have been up for review for a while. once we merge those i can shut down the testshib part.19:52
kmallocknikolla: ++ that was my plan19:52
rodrigodsbut k2k is a different path, right19:52
knikollano, we're using saml ecp for testshib too19:52
rodrigodscmurphy, i don't... but maybe it fits within the 3 month project19:52
kmallochm. so lets see...19:52
kmallocit isn't finding mapped in identity19:53
rodrigodsbut k2k ecp is not "100% ecp"19:53
rodrigodsit has some differences19:53
kmallocweird.19:53
knikollarodrigods: you mean in the assertion or in the flow?19:53
kmallocfound the bug19:53
rodrigodsboth?19:53
knikollasince shibboleth can parse it, it must conform to the standard.19:54
knikollathe flow, yes, is different. but is mostly client driven.19:54
*** openstackgerrit has joined #openstack-keystone19:55
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert OS-FEDERATION to flask native dispatching  https://review.openstack.org/59108219:55
rodrigodsyes, but i think we can broke one or another in different ways that not necessarily are captured by a test19:55
kmallocknikolla: ^ that should fix that error19:55
rodrigodsso IMO we need both tests19:55
kmallocrodrigods: we need at least to cover federation voting -- long term both, but ANY amount voting (functional) would be good now19:56
rodrigodsyes, that's where i was going with my reasoning19:56
knikollakmalloc: ah, good catch.19:57
kmallocugh i need to wait until tomorrow to install a new graphics card in this workstation so i can do looking-glass based VMs for development. i don't want to install all the dependencies to run tox/etc on the base OS [even as a desktop]19:57
kmallocwonder if i can get the tox-in-docker thing to work19:58
kmallocwould be awesome.19:58
knikollapci-passthrough for desktop vms, interesting.20:00
kmallocknikolla: yes, it's awesome, i just ordered a SR-IOV compatible gpu20:02
knikollakmalloc: i went an easier route. aliased tox to a script that rsyncs to a vm and runs tox through ssh.20:03
kmallocknikolla: it's more about my IDE and not wanting to have to install all my dependencies20:04
knikollatrue20:05
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert regions API to flask native dispatching  https://review.openstack.org/58964020:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert services api to flask native dispatching  https://review.openstack.org/58964120:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert endpoints api to flask native dispatching  https://review.openstack.org/58964220:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert Roles API to flask native dispatching  https://review.openstack.org/59049420:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert role_inferences API to flask native dispatching  https://review.openstack.org/59050220:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Add safety to the inferred target extraction during enforcement  https://review.openstack.org/59120320:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert role_assignments API to flask native dispatching  https://review.openstack.org/59051820:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert system (role) api to flask native dispatching  https://review.openstack.org/59058820:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Move json_home "extension" rel functions  https://review.openstack.org/59102520:06
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert OS-FEDERATION to flask native dispatching  https://review.openstack.org/59108220:07
openstackgerritMorgan Fainberg proposed openstack/keystone master: Refactor ProviderAPIs object to better design pattern  https://review.openstack.org/57195520:07
openstackgerritMorgan Fainberg proposed openstack/keystone master: Fix RBACEnforcer get_member_from_driver mechanism  https://review.openstack.org/59114620:07
openstackgerritMorgan Fainberg proposed openstack/keystone master: Convert groups API to flask native dispatching  https://review.openstack.org/59114720:07
kmallocknikolla: ^ rebased a chunk of the change until i fix OS-INHERIT to be safer20:08
*** itlinux has joined #openstack-keystone20:15
*** raildo has quit IRC20:28
kmallocknikolla: there is a keystone sec bug, i would like your eyes on20:45
knikollakmalloc: sure20:46
*** itlinux has quit IRC21:26
*** rcernin has joined #openstack-keystone22:01
openstackgerritMerged openstack/oslo.limit master: Fix CI  https://review.openstack.org/58676822:03
*** _ix has quit IRC22:11
*** imacdonn has quit IRC22:12
openstackgerritDoug Hellmann proposed openstack/oslo.limit master: fix gate  https://review.openstack.org/59116222:25
openstackgerritDoug Hellmann proposed openstack/oslo.limit master: import zuul job settings from project-config  https://review.openstack.org/58869722:25
openstackgerritDoug Hellmann proposed openstack/oslo.limit master: add python 3.6 unit test job  https://review.openstack.org/58959922:25
openstackgerritDoug Hellmann proposed openstack/oslo.limit master: add lib-forward-testing-python3 test job  https://review.openstack.org/59118522:25
*** imacdonn has joined #openstack-keystone22:38

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!