Friday, 2019-03-01

*** itlinux_ has quit IRC00:13
*** mvkr has joined #openstack-keystone00:14
*** itlinux has joined #openstack-keystone00:18
*** erus has joined #openstack-keystone00:31
*** itlinux has quit IRC00:44
*** erus has quit IRC00:55
*** whoami-rajat has joined #openstack-keystone01:04
*** itlinux has joined #openstack-keystone01:09
*** itlinux has quit IRC01:11
*** itlinux has joined #openstack-keystone01:12
*** itlinux has quit IRC01:18
*** itlinux has joined #openstack-keystone01:19
*** jamesmcarthur has joined #openstack-keystone01:32
*** jamesmcarthur has quit IRC01:35
*** jamesmcarthur has joined #openstack-keystone01:36
*** itlinux has quit IRC01:51
*** itlinux has joined #openstack-keystone01:52
*** itlinux has quit IRC01:58
openstackgerritMerged openstack/keystoneauth master: Add support for client-side rate limiting  https://review.openstack.org/60504301:58
*** jamesmcarthur has quit IRC02:01
*** tkajinam has quit IRC02:02
*** tkajinam has joined #openstack-keystone02:03
*** jamesmcarthur has joined #openstack-keystone02:04
*** tkajinam_ has joined #openstack-keystone02:05
*** tkajinam has quit IRC02:07
*** tkajinam_ has quit IRC02:10
*** tkajinam has joined #openstack-keystone02:10
*** jamesmcarthur has quit IRC02:11
*** jamesmcarthur has joined #openstack-keystone02:12
*** jamesmcarthur has quit IRC02:20
*** jamesmcarthur has joined #openstack-keystone02:20
*** Dinesh_Bhor has joined #openstack-keystone02:21
*** markvoelker has quit IRC02:26
*** jamesmcarthur has quit IRC02:39
*** gyee has quit IRC02:42
*** awalende has joined #openstack-keystone03:06
*** awalende has quit IRC03:10
*** dave-mccowan has joined #openstack-keystone03:17
*** markvoelker has joined #openstack-keystone03:27
*** sapd1 has joined #openstack-keystone03:47
sapd1Hi, I'm trying to setup keystone federate with goole (using openid). I have success deploy with SSO website (using horizon). But I would like to use command line. I don't see any guide for this.03:48
*** markvoelker has quit IRC04:00
*** dave-mccowan has quit IRC04:04
*** vishakha has joined #openstack-keystone04:20
openstackgerritVishakha Agarwal proposed openstack/python-keystoneclient master: Drop py35 jobs  https://review.openstack.org/63991004:23
openstackgerritVishakha Agarwal proposed openstack/keystonemiddleware master: Drop py35 jobs  https://review.openstack.org/63991304:26
openstackgerritVishakha Agarwal proposed openstack/keystoneauth master: Drop py35 jobs  https://review.openstack.org/63991504:29
*** Dinesh_Bhor has quit IRC04:29
openstackgerritVishakha Agarwal proposed openstack/oslo.limit master: Drop py35 jobs  https://review.openstack.org/63991704:32
*** fiddletwix has quit IRC04:46
*** Dinesh_Bhor has joined #openstack-keystone04:50
*** shyamb has joined #openstack-keystone04:53
*** markvoelker has joined #openstack-keystone04:57
*** prashkre_ has joined #openstack-keystone05:13
*** shyamb has quit IRC05:24
*** markvoelker has quit IRC05:31
*** shyamb has joined #openstack-keystone05:40
*** wxy-xiyuan has quit IRC05:41
*** Dinesh_Bhor has quit IRC05:59
*** Dinesh_Bhor has joined #openstack-keystone06:02
*** shyamb has quit IRC06:05
*** shyamb has joined #openstack-keystone06:12
*** shyamb has quit IRC06:24
*** shyamb has joined #openstack-keystone06:24
*** markvoelker has joined #openstack-keystone06:28
*** itlinux has joined #openstack-keystone06:33
*** itlinux_ has joined #openstack-keystone06:37
*** itlinux has quit IRC06:40
*** lbragstad has quit IRC06:49
*** markvoelker has quit IRC07:00
openstackgerritVishakha Agarwal proposed openstack/keystone master: Add role assignment testing for project users  https://review.openstack.org/63971807:04
*** shyamb has quit IRC07:06
*** shyamb has joined #openstack-keystone07:34
*** shyamb has quit IRC07:36
*** shyamb has joined #openstack-keystone07:36
*** itlinux_ has quit IRC07:37
*** itlinux has joined #openstack-keystone07:39
*** itlinux has quit IRC07:55
*** markvoelker has joined #openstack-keystone07:57
*** Dinesh_Bhor has quit IRC08:01
*** Dinesh_Bhor has joined #openstack-keystone08:08
*** awalende has joined #openstack-keystone08:11
*** tkajinam has quit IRC08:18
*** markvoelker has quit IRC08:31
*** yan0s has joined #openstack-keystone08:58
*** shyamb has quit IRC09:03
*** markvoelker has joined #openstack-keystone09:28
*** shyamb has joined #openstack-keystone09:36
*** markvoelker has quit IRC10:01
*** eandersson has quit IRC10:20
openstackgerritColleen Murphy proposed openstack/keystoneauth master: Drop py35 jobs  https://review.openstack.org/63991510:33
openstackgerritColleen Murphy proposed openstack/python-keystoneclient master: Drop py35 jobs  https://review.openstack.org/63991010:35
openstackgerritColleen Murphy proposed openstack/keystonemiddleware master: Drop py35 jobs  https://review.openstack.org/63991310:37
*** vishakha has quit IRC10:39
*** prashkre_ has quit IRC10:52
*** shyamb has quit IRC10:53
*** markvoelker has joined #openstack-keystone10:58
*** shyamb has joined #openstack-keystone11:02
*** Dinesh_Bhor has quit IRC11:24
*** markvoelker has quit IRC11:30
*** raildo has joined #openstack-keystone11:33
openstackgerritMerged openstack/ldappool master: Drop py35 jobs  https://review.openstack.org/63992411:38
cmurphysapd1: we have some guidance here https://docs.openstack.org/keystone/latest/admin/federation/configure_federation.html#get-a-scoped-token but it's unfortunately specific to saml2 not openid connect, unfortunately i think there's still an open bug about the oidc plugin for the cli https://bugs.launchpad.net/python-openstackclient/+bug/164858011:49
openstackLaunchpad bug 1648580 in python-openstackclient "v3oidcpassword federated login error (argument count)" [Undecided,New]11:49
cmurphysapd1: what you could do if your openstack is >=queens is use horizon to create an application credential, and then use the cli with that https://docs.openstack.org/keystone/latest/user/application_credentials.html11:49
sapd1cmurphy: In fact, I would like to integrate exist openstack environment with other idp.11:58
mordredcmurphy, kmalloc: \o/12:00
cmurphysapd1: I understood that, my suggestion is compatible with using an external idp12:01
cmurphyhi mordred12:01
*** rafaelweingartne has joined #openstack-keystone12:03
rafaelweingartneHello Keystone folks,  I am having some issues to work with App credentials12:04
rafaelweingartnelet's say I have a user that does not have any role per se12:04
rafaelweingartnebut this user is added to a group that has permissions (roles) to both a domain and a project12:04
rafaelweingartneshould I be able to create an app credentials for this user?12:04
cmurphyrafaelweingartne: ideally yes but actually no :( https://bugs.launchpad.net/keystone/+bug/177396712:06
openstackLaunchpad bug 1773967 in OpenStack Identity (keystone) "Application credentials can't be used with group-only role assignments" [High,Confirmed] - Assigned to Vishakha Agarwal (vishakha.agarwal)12:06
rafaelweingartne:(12:06
cmurphyrafaelweingartne: it's high priority to fix but it's a somewhat hard problem, we started a spec for it https://review.openstack.org/604201 but ran out of time this release cycle12:08
sapd1cmurphy: So that bug is too old. and It has not been fixed yet.12:09
rafaelweingartnethis is a huge problem for us.. as we are using Identity federations, ans users do nto have explicity assigments12:09
rafaelweingartnewhat is the problem? I mean, I checked the code to create the app credentials, and it does not care about the user group12:10
*** dave-mccowan has joined #openstack-keystone12:10
rafaelweingartneso, if we change that, to accept a specific user group and project via API parameter, would it work? Or, we need to change the "app credentials" authentication method as well?12:11
rafaelweingartneto load the permissions from specified group in the app credential12:11
cmurphyrafaelweingartne: the problem is that role assignments via group membership are ephemeral and only persist as long as the token is valid, so technically when the token expires the user doesn't have any role assignments. if we made the application credential copy in all effective role assignments from the group membership when it gets created then the application credential's authorization outlives12:14
cmurphythe user's actual authorization which is unsafe12:14
*** dave-mccowan has quit IRC12:15
rafaelweingartneah12:15
rafaelweingartnegot it12:15
rafaelweingartneI just read that in the spec as well...12:15
rafaelweingartnesorry for asking something that was already there12:15
cmurphyno worries, it was hard for me to grasp on first read12:16
cmurphyand very annoying that role assignments via group membership don't just work the same way as direct role assignments12:17
cmurphya workaround is to use the autoprovisioning type of federation mapping to create explicit assignments https://docs.openstack.org/keystone/latest/admin/federation/mapping_combinations.html#auto-provisioning but it may not be easy to translate your existing mappings12:18
rafaelweingartneyou mean, to auto provision a project?12:20
rafaelweingartnehmm12:20
cmurphyyeah it will create the projects if they don't exist and then create the role assignments12:21
rafaelweingartnethat might work, but this might affect our business workflow12:21
cmurphyyeah12:21
rafaelweingartneLet me check if we can hammer it somehow12:21
rafaelweingartnethanks for the prompt reply ;)12:21
cmurphyyou're welcome12:22
*** shyamb has quit IRC12:26
*** markvoelker has joined #openstack-keystone12:28
openstackgerritMerged openstack/keystone master: Add domain level limit support - API  https://review.openstack.org/62277312:28
sapd1cmurphy:  I get this error12:32
sapd1RESP BODY: {12:32
sapd1  "error": "unsupported_grant_type",12:32
sapd1  "error_description": "Invalid grant_type: password"12:32
sapd1}12:32
cmurphysapd1: what are you trying to do?12:33
sapd1I'm trying issue token using gmail.12:33
sapd1`openstack token issue --os-discovery-endpoint https://accounts.google.com/.well-known/openid-configuration --os-auth-type v3oidcpassword --os-client-secret xxxx --os-client-id xxxx`12:34
rafaelweingartneby any chance, does anybody here knows where the schema.py that defines the IdP attribute mapping is?12:37
rafaelweingartneI have checked it in the past, but now I am not able to find it anymore12:37
*** shyamb has joined #openstack-keystone12:39
cmurphysapd1: hmm I am not an expert on openid connect but it looks like we hard code grant type to "password" and it looks like google requires it to be "authorization_code" https://developers.google.com/identity/protocols/OpenIDConnect - so the CLI may just be completely incompatible with google right now :/12:40
rafaelweingartnenever mind, I found it: keystone/federation/utils.py12:42
cmurphyrafaelweingartne: was just pulling it up http://git.openstack.org/cgit/openstack/keystone/tree/keystone/federation/utils.py#n5512:42
rafaelweingartneah thanks12:44
rafaelweingartnethis token mechanism "openstack token issue --os-discovery-endpoint...", how would it work with 2FA?12:45
rafaelweingartneI mean, if the IdP implements 2FA, and if it is enabled for the user requesting the token to be issued12:45
cmurphyi don't think openstackclient/keystoneauth is smart enough to handle that at all12:46
rafaelweingartneI mean, with google, I don't see a problem as it requires authorization_code12:47
rafaelweingartnewhich is a sort of app credential12:47
rafaelweingartnebut, if we wanted to generate a token via password authentication, then this can be a problem12:48
rafaelweingartnethat is actually why we are trying to use app credentials with federated users12:48
rafaelweingartneSo, they login, and via the UI they can create the credentials after the authentication process in the IdP12:48
*** markvoelker has quit IRC13:01
*** prashkre has joined #openstack-keystone13:07
*** prashkre has quit IRC13:08
*** shyamb has quit IRC13:21
*** shyamb has joined #openstack-keystone13:21
*** shyamb has quit IRC13:28
*** jmlowe has quit IRC13:48
*** jamesmcarthur has joined #openstack-keystone13:51
knikollao/13:55
knikollacmurphy: actually the cli uses a different grant type13:56
knikollapassword is the correct grant, it's just that google doesn't support it.13:56
knikollasapd1: look into this https://developers.google.com/identity/protocols/OAuth2InstalledApp13:58
knikollayou will need to get an access token from there and use that directly13:58
*** markvoelker has joined #openstack-keystone13:58
sapd1knikolla: another word is I need get  authorization_code and put this code into body when send request to google.13:59
knikollasapd1: yes, and exchange that for a refresh and access token14:01
knikollathen use that to talk to keystone14:01
knikollayou will need to enable oauth 2.0 in your vhost configuration for keystone14:01
knikollathat = access token14:02
cmurphythanks knikolla14:02
sapd1knikolla: Could you give me example configuration for keystone ?14:03
knikollasapd1: https://github.com/CCI-MOC/MOCOSPpuppet/blob/317f8fa53ec89ef6e58449aec743d5ebbf275fc9/keystone/templates/wsgi-keystone.erb#L62-L8914:04
sapd1knikolla: I have setup openid and google successful, It's working when I use horizon.14:04
sapd1Do I need add oauth2 config?14:04
knikollasapd1: yes because that uses openid connect14:05
knikollayou can't use openid connect on the cli14:05
sapd1yeah. I have already configured these options in my vhost.14:05
knikollaone of the locations has "AuthType oauth20" for oauth 2.014:06
knikollabut beside that's it's the same14:06
sapd1+114:07
knikollait's just easier and more convenient to use application credentials14:07
sapd1knikolla: I'm trying to configured with our exist IDP, It's working same to Google. So I need make keystone work with Google.14:08
sapd1s/our/my14:09
knikollain the google case, the refresh token would work like an application credential. every time a user wants to use the cli, they would have to exchange that with an access token by making a call to google. then make a call to keystone with the access token to get a fernet token.14:09
*** raildo has quit IRC14:09
sapd1knikolla: I need read about openid connect protocol, So I will contact you if I get a problem.14:12
sapd1knikolla: Thanks14:12
knikollasapd1: no problem :)14:12
*** raildo has joined #openstack-keystone14:14
*** TheJulia is now known as needssleep14:14
*** cmurphy is now known as cmorpheus14:17
*** jmlowe has joined #openstack-keystone14:21
*** markvoelker has quit IRC14:31
*** lbragstad has joined #openstack-keystone14:35
*** ChanServ sets mode: +o lbragstad14:35
*** sc has joined #openstack-keystone14:37
*** bnemec is now known as beekneemech14:46
*** awalende has quit IRC15:00
*** awalende has joined #openstack-keystone15:00
*** itlinux has joined #openstack-keystone15:01
*** awalende has quit IRC15:04
*** rafaelweingartne has quit IRC15:05
*** lbragstad is now known as elbragstad15:08
gagehugoo/15:10
*** itlinux has quit IRC15:12
elbragstadhola15:15
*** markvoelker has joined #openstack-keystone15:28
*** itlinux has joined #openstack-keystone15:29
*** itlinux has quit IRC15:36
*** chason_ has quit IRC15:36
*** itlinux has joined #openstack-keystone15:38
*** jistr is now known as jistr|mtg15:38
*** chason has joined #openstack-keystone15:41
*** chason has quit IRC15:46
*** chason has joined #openstack-keystone15:52
*** yan0s has quit IRC15:59
*** markvoelker has quit IRC16:01
*** jistr|mtg is now known as jistr16:02
*** kmalloc is now known as needscoffee16:22
needscoffeeo/16:28
*** sapd1 has quit IRC16:32
*** itlinux has quit IRC16:49
openstackgerritLance Bragstad proposed openstack/keystone master: Add service developer documentation for scopes  https://review.openstack.org/63856316:53
openstackgerritLance Bragstad proposed openstack/keystone master: Add service developer documentation for scopes  https://review.openstack.org/63856316:56
*** markvoelker has joined #openstack-keystone16:58
*** gyee has joined #openstack-keystone17:04
*** markvoelker has quit IRC17:31
*** erus has joined #openstack-keystone17:50
elbragstadneedscoffee are you caffeinated?17:54
elbragstadat least partially?17:54
elbragstaddo you know why we use two different policy enforcers there? https://git.openstack.org/cgit/openstack/keystone/tree/keystone/tests/unit/test_policy.py#n23917:56
elbragstadone uses the rbac_enforcer code path, which loads the defaults registered in code17:56
elbragstadthe other (which tests the policy.v3cloudsample.json policy) builds the enforcer object using oslo.policy directly17:57
elbragstadfwiw - i'm respinning https://review.openstack.org/#/c/622589/117:57
elbragstadbut it looks like the second enforcer, from oslo.policy, isn't loading the defaults17:57
elbragstadthis is what that instance looks like https://pasted.tech/pastes/c80b1ba6c34480b02dd74854a2885d671a98044f.raw17:58
*** raildo has quit IRC18:00
*** mvkr has quit IRC18:02
*** jaosorior has quit IRC18:04
*** mvkr has joined #openstack-keystone18:06
*** raildo has joined #openstack-keystone18:07
*** irclogbot_1 has joined #openstack-keystone18:10
elbragstadaha18:17
elbragstadfigured it out18:17
*** jamesmcarthur has quit IRC18:20
*** jamesmcarthur has joined #openstack-keystone18:20
needscoffeehold on18:22
needscoffeeelbragstad: so what was going on?18:22
elbragstadhttps://git.openstack.org/cgit/openstack/keystone/tree/keystone/tests/unit/test_policy.py#n260 doesn't register the defaults18:23
elbragstadbut that test case uses two different instances of Enforcer()18:23
elbragstadone uses the defaults in code18:23
elbragstadthe other attempts to load everything for v3cloudsample.json18:23
elbragstadbut it doesn't register the defaults18:23
elbragstadso the test case is actually relying on the fact policy.v3cloudsample.json is copy/pastad18:24
elbragstadinstead of generating common defaults18:24
elbragstadand only loading the delta18:24
*** jamesmcarthur has quit IRC18:24
*** markvoelker has joined #openstack-keystone18:28
*** Chealion has joined #openstack-keystone18:43
openstackgerritMerged openstack/python-keystoneclient master: Drop py35 jobs  https://review.openstack.org/63991018:47
*** markvoelker has quit IRC19:01
*** awalende has joined #openstack-keystone19:03
*** awalende_ has joined #openstack-keystone19:05
openstackgerritLance Bragstad proposed openstack/keystone master: DRY: Remove redundant policies from policy.v3cloudsample.json  https://review.openstack.org/62258919:08
*** awalende has quit IRC19:08
openstackgerritLance Bragstad proposed openstack/keystone master: Add service developer documentation for scopes  https://review.openstack.org/63856319:18
needscoffeeoh19:22
needscoffeeyeah we should fix that19:22
*** dmellado has quit IRC19:44
*** dmellado has joined #openstack-keystone19:45
*** irclogbot_1 has quit IRC19:50
*** markvoelker has joined #openstack-keystone19:58
*** erus has quit IRC19:58
*** erus has joined #openstack-keystone19:59
*** irclogbot_1 has joined #openstack-keystone20:02
elbragstadneedscoffee done in https://review.openstack.org/62258920:11
*** erus has quit IRC20:11
*** erus has joined #openstack-keystone20:11
*** raildo has quit IRC20:16
elbragstadanyone else feel like giving https://review.openstack.org/#/c/638309/6 a good look?20:20
* elbragstad has a super crisp high-five for anyone who reviews it 20:20
*** raildo has joined #openstack-keystone20:23
* cmorpheus will cash in on high-five offer20:24
cmorpheuselbragstad: i made it to https://review.openstack.org/639718 and not sure what i think yet20:24
gagehugoelbragstad: same20:29
*** markvoelker has quit IRC20:31
elbragstadyeah - me either =/20:34
elbragstadi don't think i'd mind a project admin being able to view assignments on the project they have admin on20:35
elbragstadbut i haven't really come up with a good use case for why a member or reader would need to know that information20:35
elbragstadi mean - i typically think of project admins as being the people that can clean up instances or volumes, things like that20:35
elbragstadnot role assignments20:35
elbragstad(a lot of identity related management seems to stop at the domain layer)20:36
*** erus has quit IRC20:38
*** erus has joined #openstack-keystone20:39
*** jmlowe has quit IRC20:41
cmorpheusi think... given that a user is either a system-level or domain-level thing, a role assignment has to be too. project reader/member/admin shouldn't be able to see information about a user, including their role assignments20:46
elbragstadso - a project admin shouldn't be able to call the /v3/role_assignments?scope.project.id=$project API?20:48
cmorpheusi think not, because that would list user ids20:49
elbragstadcorrect, for users with role assignments on the project20:50
cmorpheusa project admin doesn't have any ability to create or show another user, so they shouldn't be able to get the user's id either imo20:51
*** erus has quit IRC20:51
* elbragstad this feels like the /v3/projects API20:51
elbragstader - the position we took with project users on that API20:51
*** erus has joined #openstack-keystone20:51
cmorpheusdid we take the same position?20:51
cmorpheusi hope i'm not flip flopping20:51
elbragstadi believe we did exactly what you're describing20:52
cmorpheusok20:52
cmorpheusthen let's be consistent20:52
elbragstadhttps://review.openstack.org/#/c/624221/4/keystone/tests/unit/protection/v3/test_projects.py20:54
elbragstadhttps://review.openstack.org/#/c/624221/4/keystone/tests/unit/protection/v3/test_projects.py@89720:55
elbragstaddiscovered a bug in the test name20:55
cmorpheusheh20:56
elbragstadweird...20:56
elbragstadhttps://review.openstack.org/#/c/624221/4/keystone/common/policies/project.py,unified@7620:57
cmorpheushmm well i think it's fine for a user to get their own project, that's not exposing another user's userid and role20:57
elbragstadi think that policy works for https://review.openstack.org/#/c/624221/4/keystone/common/policies/project.py@104 but not https://review.openstack.org/#/c/624221/4/keystone/common/policies/project.py@7620:59
*** erus has quit IRC20:59
elbragstadbut the test - which is inaccurately named, asserts that a user with a project-scoped token can't call /v3/projects/$project_id20:59
*** erus has joined #openstack-keystone20:59
elbragstadhmm - i think i need to smooth that out21:00
elbragstadi think i need another test case to see if a project user can actually fetch their own project using /v3/project/$project_id21:01
elbragstadhttps://review.openstack.org/#/c/624221/4/keystone/tests/unit/protection/v3/test_projects.py,unified@897 just tests that a user can't get a project within the same domain with a project-scoped token21:01
elbragstadi'm getting off on a tangent, but yeah, i do agree that querying role assignments is different than querying projects from the project API21:03
elbragstadthe point about exposing other user ids is good21:03
cmorpheuselbragstad: i think the test is right, except for the name - it's making sure that the user can't GET some random project they aren't a member of21:05
elbragstad++ right, but I don't see a test where the user attempts to call GET /v3/projects/$project_id where the token is scoped to $project_id?21:05
cmorpheusah gotcha21:06
*** jamesmcarthur has joined #openstack-keystone21:07
*** jamesmcarthur has quit IRC21:09
*** jamesmcarthur has joined #openstack-keystone21:10
*** jamesmcarthur has quit IRC21:14
*** awalende has joined #openstack-keystone21:21
*** awalende_ has quit IRC21:21
*** markvoelker has joined #openstack-keystone21:28
*** jamesmcarthur has joined #openstack-keystone21:29
openstackgerritMerged openstack/keystone master: Remove endpoint policies from policy.v3cloudsample.json  https://review.openstack.org/61933321:29
*** irclogbot_1 has quit IRC21:36
*** erus has quit IRC21:55
*** erus has joined #openstack-keystone21:56
*** markvoelker has quit IRC22:01
*** jamesmcarthur has quit IRC22:07
*** jamesmcarthur has joined #openstack-keystone22:08
openstackgerritMerged openstack/keystoneauth master: Drop py35 jobs  https://review.openstack.org/63991522:16
*** raildo has quit IRC22:23
openstackgerritMerged openstack/keystone master: Implement system reader for role_assignments  https://review.openstack.org/60921022:29
*** jmlowe has joined #openstack-keystone22:32
*** awalende has quit IRC22:36
*** awalende has joined #openstack-keystone22:36
openstackgerritLance Bragstad proposed openstack/keystone master: Add service developer documentation for scopes  https://review.openstack.org/63856322:40
*** awalende has quit IRC22:40
*** jamesmcarthur has quit IRC22:40
*** jamesmcarthur has joined #openstack-keystone22:44
*** odyssey4me_ has joined #openstack-keystone22:45
*** erus has quit IRC22:46
*** erus has joined #openstack-keystone22:46
*** jamesmcarthur has quit IRC22:48
*** odyssey4me has quit IRC22:52
*** eglute has quit IRC22:52
*** lamt has quit IRC22:52
*** melwitt has quit IRC22:52
*** NikitaKonovalov has quit IRC22:52
*** erus has quit IRC22:52
*** odyssey4me_ is now known as odyssey4me22:52
*** melwitt has joined #openstack-keystone22:53
*** erus has joined #openstack-keystone22:53
*** markvoelker has joined #openstack-keystone22:59
*** awalende has joined #openstack-keystone23:02
*** frickler has quit IRC23:06
*** frickler has joined #openstack-keystone23:06
openstackgerritMerged openstack/keystone master: Reorganize role assignment tests for system users  https://review.openstack.org/63830923:19
openstackgerritMerged openstack/keystone master: Add role assignment test coverage for system members  https://review.openstack.org/63831023:20
openstackgerritMerged openstack/keystone master: Add role assignment test coverage for system admin  https://review.openstack.org/63831123:20
*** markvoelker has quit IRC23:31
*** awalende_ has joined #openstack-keystone23:32
*** sapd1 has joined #openstack-keystone23:33
*** awalende has quit IRC23:35
*** awalende_ has quit IRC23:36
*** awalende has joined #openstack-keystone23:37
*** awalende has quit IRC23:41

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!