Thursday, 2019-01-03

*** erus has joined #openstack-keystone01:02
*** dave-mccowan has quit IRC01:23
*** markvoelker has quit IRC01:26
*** markvoelker has joined #openstack-keystone01:26
*** markvoelker has quit IRC01:31
*** mhen has quit IRC02:06
*** mhen has joined #openstack-keystone02:12
*** markvoelker has joined #openstack-keystone02:27
*** dave-mccowan has joined #openstack-keystone02:50
*** markvoelker has quit IRC02:50
*** markvoelker has joined #openstack-keystone02:50
*** jrist has quit IRC03:07
*** cfriesen has quit IRC03:30
*** dave-mccowan has quit IRC04:56
*** whoami-rajat has joined #openstack-keystone05:05
*** erus has quit IRC05:06
*** erus has joined #openstack-keystone05:07
*** markvoelker has quit IRC05:17
*** markvoelker has joined #openstack-keystone05:49
*** shyamb has joined #openstack-keystone05:51
*** shyamb has quit IRC05:58
*** shyamb has joined #openstack-keystone06:16
*** markvoelker has quit IRC06:22
*** markvoelker has joined #openstack-keystone06:23
*** markvoelker has quit IRC06:27
*** shyamb has quit IRC07:06
*** rcernin has quit IRC07:09
*** shyamb has joined #openstack-keystone07:22
*** shyamb has quit IRC08:12
*** markvoelker has joined #openstack-keystone08:23
*** shyamb has joined #openstack-keystone08:51
*** xek has joined #openstack-keystone08:51
*** whoami-rajat has quit IRC09:13
*** whoami-rajat has joined #openstack-keystone09:25
openstackgerritColleen Murphy proposed openstack/keystone master: Remove duplicate RBAC logging from enforcer  https://review.openstack.org/62479909:40
*** shyamb has quit IRC09:41
*** shyamb has joined #openstack-keystone09:41
openstackgerritwangxiyuan proposed openstack/keystone master: Invalidate shadow_federated_user cache when deleting protocol  https://review.openstack.org/62813209:42
openstackgerritwangxiyuan proposed openstack/keystone-tempest-plugin master: Clean up the auto generated domain  https://review.openstack.org/57906309:43
*** shyamb has quit IRC09:50
*** sayalilunkad has joined #openstack-keystone10:04
*** shyamb has joined #openstack-keystone10:49
*** erus has quit IRC11:07
*** erus has joined #openstack-keystone11:09
openstackgerritweizj proposed openstack/python-keystoneclient master: Update hacking version  https://review.openstack.org/62771311:12
*** shyamb has quit IRC11:16
*** erus has quit IRC11:16
*** erus has joined #openstack-keystone11:21
*** erus has quit IRC11:28
*** erus has joined #openstack-keystone11:36
*** shyamb has joined #openstack-keystone11:40
*** erus has quit IRC11:43
*** whoami-rajat has quit IRC11:43
*** erus has joined #openstack-keystone11:50
*** erus has quit IRC11:56
*** erus has joined #openstack-keystone12:07
*** raildo has joined #openstack-keystone12:13
openstackgerritMoisés Guimarães proposed openstack/oslo.policy master: Fixes file access using with statements.  https://review.openstack.org/62816512:29
openstackgerritMoisés Guimarães proposed openstack/oslo.policy master: Fixes file access using with statements.  https://review.openstack.org/62816512:30
openstackgerritColleen Murphy proposed openstack/keystone master: [WIP] Add API changes for app cred capabilities  https://review.openstack.org/62816812:39
openstackgerritMoisés Guimarães proposed openstack/oslo.policy master: Add ability for policy-checker to read configuration  https://review.openstack.org/61665912:42
*** szaher has joined #openstack-keystone12:50
*** shyamb has quit IRC13:04
*** dave-mccowan has joined #openstack-keystone13:18
*** markvoelker has quit IRC13:18
*** markvoelker has joined #openstack-keystone13:20
*** whoami-rajat has joined #openstack-keystone13:30
*** lbragstad has joined #openstack-keystone13:58
*** ChanServ sets mode: +o lbragstad13:58
lbragstado/13:58
cmurphy\o13:58
*** GregWaines has joined #openstack-keystone13:58
cmurphyfor anyone back from vacation, i have a doc fix series that i'd like to get in since i think it will help erus a lot https://review.openstack.org/#/q/topic:bug/179337414:01
cmurphyerus: if you want to review that ^ too to see if it makes any sense that would be great too :)14:01
lbragstadsounds good - i'll take a look today14:02
cmurphylbragstad: i also left a couple of questions on your default roles changes for service provider, if you answer those i'll go through the rest of the stack14:03
lbragstadsweet14:03
*** jistr is now known as jistr|mtg14:04
lbragstadi'll put that on my list, too14:04
erusHi everyone, happy new year14:38
eruscmurphy: I've already been checking it since you started to propose it :D thanks it has helped me o/14:40
cmurphyerus: great :D14:40
cmurphyerus: feel free to leave comments and votes if you like14:40
openstackgerritColleen Murphy proposed openstack/keystone master: [WIP] Add API changes for app cred capabilities  https://review.openstack.org/62816814:42
openstackgerritColleen Murphy proposed openstack/keystone master: [WIP] Add manager support for app cred capabilities  https://review.openstack.org/62819314:42
erusOk ok :) btw I couldn't achieve the external authentication yet, not sure what I am missing, I'm going to review what I did step by step again14:42
cmurphyerus: okay, let me know if you can't figure it out and we can walk through it14:47
erusYay thanks, I think it's with entity ID, not sure why, the error says entity ID missing, the error before that was a missing path to the metadata file14:48
cmurphyerus: "missing entity ID" usually means it didn't hit the right path in your apache config, check that all the <Location ...> thingies are right14:50
*** lbragstad has quit IRC14:50
erusOk I'll check that14:53
*** lbragstad has joined #openstack-keystone14:53
*** ChanServ sets mode: +o lbragstad14:53
*** jistr|mtg is now known as jistr14:55
gagehugoo/14:55
*** cfriesen has joined #openstack-keystone15:14
*** GregWaines has quit IRC15:30
lbragstadhey gagehugo15:33
openstackgerritMoisés Guimarães proposed openstack/oslo.policy master: Fixes is_admin type from StrOpt to BoolOpt.  https://review.openstack.org/62820715:39
*** whoami-rajat has quit IRC15:39
gagehugolbragstad: o/15:41
openstackgerritLance Bragstad proposed openstack/keystone master: Update service provider  policies for system admin  https://review.openstack.org/62015815:46
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with sps  https://review.openstack.org/62015915:46
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for project users interacting with sps  https://review.openstack.org/62016015:46
openstackgerritLance Bragstad proposed openstack/keystone master: Remove service provider policies from v3cloudsample.json  https://review.openstack.org/62016115:46
*** xek_ has joined #openstack-keystone15:46
*** xek has quit IRC15:48
*** itlinux has joined #openstack-keystone16:40
openstackgerritweizj proposed openstack/python-keystoneclient master: Update hacking version  https://review.openstack.org/62771316:46
*** erus has quit IRC16:50
*** erus has joined #openstack-keystone16:51
*** gyee has joined #openstack-keystone17:25
*** imacdonn has quit IRC17:59
*** imacdonn has joined #openstack-keystone17:59
*** bnemec has quit IRC18:13
*** whoami-rajat has joined #openstack-keystone18:25
*** bnemec has joined #openstack-keystone18:26
*** bnemec has quit IRC18:30
*** bnemec has joined #openstack-keystone18:34
*** bnemec has quit IRC18:39
*** bnemec has joined #openstack-keystone18:52
*** bnemec has quit IRC18:58
gyeelbragstad, we no longer permanently invalid the project-scoped token when the project domain is disable, and then subsequently re-enable?19:10
gyeeI thought we always issue a new token when that happens, when did the design change?19:10
lbragstadcorrect19:11
lbragstadi want to say that happened around the fernet time frame19:11
gyeeoh19:11
lbragstadiirc - uuid tokens needed a revocation event19:11
lbragstadbut with fernet, we validate all the information about the authentication context online19:11
lbragstadat validation time19:11
gyeein real time19:12
lbragstadyep - exactly19:12
gyeeok, good, thanks for the confirmation19:12
lbragstadi also recall having discussions about whether or not that was a good thing to do19:12
lbragstadbut at the time, i don't think we could come up with a valid use case for keeping a token revoked after a domain was re-enabled (thus making the token valid again)19:13
gyeeI don't remember that far :-)19:13
lbragstadbut we saw the benefit of not needing yet another revocation event and non-persistence19:13
lbragstadit kinda scares me that i do...19:14
gyeebut so as long as we specify that in the API contract, we should be good19:14
gyeeas the behavior is inconsistent19:14
*** bnemec has joined #openstack-keystone19:14
gyeeAPI behavior should not be dictated by the backend configuration19:14
lbragstadright19:21
lbragstadbut - no that we don't support a persistent token provider, it isn't ;)19:21
lbragstads/no/now/19:22
*** irclogbot_1 has quit IRC19:24
*** irclogbot_1 has joined #openstack-keystone19:27
gyeethere's only one token provider now so we're good :-)19:42
aning_lbragstad: At Berlin summit, kmalloc (I don't see him logged in) talked about predictable user ID and project ID generation in "Pushing Keystone over the Edge"20:04
aning_lbragstad: is it planned already? Is there a blueprint for it?20:04
aning_lbragstad: I found this one "https://blueprints.launchpad.net/keystone/+spec/admin-to-create-project-with-id"20:05
aning_lbragstad: but it doesn't seem to be the same as what kmalloc talked/20:05
lbragstadaning_ no - i think that is a stale specification from previous discussions20:06
lbragstadpart of the work knikolla, kmalloc, and ayoung talked about is written up here - http://specs.openstack.org/openstack/keystone-specs/specs/keystone/stein/explicit-domains-ids.html20:07
aning_It seems to be only for domain ID, but not user IDs and project IDs.20:11
ayounganing_, you need it only for domain IDs so long as the external portion of the user id is consistaNT20:12
ayoungwe want the ids to be predictable, not to be human chosen editable20:13
*** raildo has quit IRC20:14
aning_ayoung: Does preditable mean I can tell the ID of a user or project before make a call to the region?20:14
ayounganing_, yes20:15
ayounganing_, userid = sha256 (domainid, federated_user_name)20:15
ayoungroughly that20:15
aning_ayoung: ha, that's what I thought. Maybe its uuid5(domainid, federated_user_name)?20:16
ayounganing_, well, yes, ldap is that today, I think20:17
ayoungwe are talking about expanding it for projects, and to be able to update the hash algo20:17
aning_ayoung: would like to see both user and project are covered.20:18
ayoungme too20:18
aning_ayoung: Will project ID in stein?20:30
*** whoami-rajat has quit IRC20:35
ayounganing_, no idea.  I am not coding full time anymore, so I can't make it happen20:39
*** xek_ has quit IRC21:07
aning_ayoung: fair enough. Thanks.21:11
gyeelbragstad, the response code for invalid token seem to have changed as well, used to be 401, but now its 404. Was that change around fernet token timeframe?21:13
lbragstadpossibly21:14
lbragstadhow are you invalidating the token?21:14
gyeejust removing the role assignment21:16
gyeeused to be 40121:16
aning_404 is a user or project not found.21:17
aning_401 is unauthorized.21:17
gyeeright, used to be 401 for invalid token21:18
aning_as far as I know, if you use a token but the user is gone, you got a 404.21:18
aning_if you send a expired token, you probably still get a 40121:18
openstackgerritMerged openstack/python-keystoneclient master: Update hacking version  https://review.openstack.org/62771321:24
gyeeI remembered the design philosophy behind returning 401 for all invalid tokens was to not leak internal information.21:24
lbragstadgyee https://review.openstack.org/#/c/277436/21:43
lbragstadlooks like the opposite, but for the same reason21:48
gyeeah damn21:49
gyeelbragstad, 404 then21:49
gyeethanks for digging up that one21:49
lbragstadgit blame pinned me again21:50
lbragstadbut, you were on that review, too :)21:51
gyee /facepalm21:52
aning_gyee: Sorry I missed the way you invalidate the token.22:14
aning_I do see 404 when a user or project is removed. But that's not related to your case.22:14
*** itlinux has quit IRC22:24
gyeeaning_: no worries22:33
*** rcernin has joined #openstack-keystone22:42
openstackgerritMerged openstack/keystone master: Update service provider policies for system reader  https://review.openstack.org/62015623:09
openstackgerritMerged openstack/keystone master: Add service provider tests for system member role  https://review.openstack.org/62015723:09
openstackgerritMerged openstack/keystone master: Restructure federation guide  https://review.openstack.org/62784223:09

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!