Monday, 2019-03-25

*** ileixe has joined #openstack-keystone00:51
*** Dinesh_Bhor has quit IRC02:07
*** shyamb has joined #openstack-keystone02:43
*** whoami-rajat has joined #openstack-keystone02:43
*** shyamb has quit IRC02:57
*** shyamb has joined #openstack-keystone02:58
*** elbragstad has joined #openstack-keystone03:25
*** ChanServ sets mode: +o elbragstad03:25
*** shyamb has quit IRC03:28
*** ileixe has quit IRC04:25
*** ileixe has joined #openstack-keystone04:46
*** shyamb has joined #openstack-keystone05:04
*** shyamb has quit IRC05:11
*** shyamb has joined #openstack-keystone05:21
*** vishakha has joined #openstack-keystone05:55
*** jaosorior has joined #openstack-keystone06:02
*** shyamb has quit IRC06:34
*** shyamb has joined #openstack-keystone06:41
*** sapd1 has quit IRC06:44
*** elbragstad has quit IRC06:45
*** pcaruana has joined #openstack-keystone07:07
*** shyamb has quit IRC07:17
*** shyamb has joined #openstack-keystone07:34
*** ileixe has quit IRC07:49
*** shyamb has quit IRC08:00
*** awalende has joined #openstack-keystone08:07
*** Dinesh_Bhor has joined #openstack-keystone08:40
*** tkajinam has quit IRC08:42
*** erus has quit IRC08:42
*** erus has joined #openstack-keystone08:42
*** shyamb has joined #openstack-keystone08:44
openstackgerritColleen Murphy proposed openstack/keystone master: Add domain scope support for group policies  https://review.openstack.org/64393708:54
*** wxy-xiyuan has joined #openstack-keystone09:07
*** xek has joined #openstack-keystone09:17
*** admin0 has joined #openstack-keystone09:21
admin0hi all .. how does applicaton credentials work when the backend is LDAP/AD?09:21
*** xek has quit IRC09:24
cmurphyadmin0: yes09:25
admin0cmurphy, it should work like normal even if the backend is AD ?09:25
cmurphyadmin0: yes it will work like normal, the application credential gets stored in keystone's sql database09:26
*** erus has quit IRC09:26
*** jonher has quit IRC09:26
*** erus has joined #openstack-keystone09:27
admin0if I get Attempted to authenticate with an unsupported method    where should i be looking ?09:29
admin0is it an entry missing in keystone conf ?09:29
admin0or does it have to be enabled in every other service also09:29
cmurphyadmin0: you need to add application_credential to [auth]/methods in keystone.conf09:30
admin0cmurphy, just adding that will do ?09:31
cmurphyadmin0: and restarting keystone of course09:33
*** erus has quit IRC09:33
*** erus has joined #openstack-keystone09:33
*** xek has joined #openstack-keystone09:40
kmalloccmurphy: we didn't make that the default?10:05
kmallocWe probably should.10:06
cmurphykmalloc: we did10:07
kmallocAh ok. Phew10:07
kmallocreview.openstack.org/#/c/644774 is ready for eyes,10:07
cmurphybut if they're upgrading from an older version or using a config management tool that manages it explicitly then they might not have it10:07
cmurphykmalloc: does this mean we won't need a change in ksm/keystone?10:07
kmallocHm. Nothing in keystone, I'll make the bug invalid10:08
kmallocKsm, I am mulling over the non-oslo.cache model10:09
kmallocBut I don't think we need to, really10:09
kmallocThe use of the pool should be done in all cases..10:09
kmallocIt is way better than the non-poolee form, esp. with eventlet10:10
kmallocAlso, we can't fix non-pooled easily until I fix dogpile10:11
kmallocKeystone def. Won't need anyfixes in either case..10:12
cmurphymore worried about ksm since it's supposed to be frozen10:13
kmallocLet's just backport fixes10:13
cmurphy++10:13
kmallocUn-rc block it, and save the headache10:14
kmallocMarked as invalid for keystone, ksm will get a patch/backports soon10:18
cmurphythanks kmalloc10:18
*** shyamb has quit IRC10:19
*** jonher has joined #openstack-keystone10:37
*** trident has quit IRC10:43
*** shyamb has joined #openstack-keystone11:01
*** trident has joined #openstack-keystone11:08
*** shyamb has quit IRC11:30
*** rcernin has quit IRC11:31
*** shyamb has joined #openstack-keystone11:44
*** xek_ has joined #openstack-keystone11:47
*** xek has quit IRC11:49
*** xek has joined #openstack-keystone11:58
*** xek_ has quit IRC11:59
*** xek_ has joined #openstack-keystone12:01
*** xek has quit IRC12:03
*** xek_ has quit IRC12:03
*** xek has joined #openstack-keystone12:04
*** xek has quit IRC12:08
*** erus has quit IRC12:08
*** xek has joined #openstack-keystone12:08
*** erus has joined #openstack-keystone12:08
*** raildo has joined #openstack-keystone12:11
*** jroll has quit IRC12:14
*** erus has quit IRC12:14
*** erus has joined #openstack-keystone12:15
*** jroll has joined #openstack-keystone12:15
*** vishakha has quit IRC12:17
*** whoami-rajat has quit IRC12:24
*** markvoelker has quit IRC12:26
*** cfey has joined #openstack-keystone12:34
*** jamesmcarthur has joined #openstack-keystone12:50
*** jmlowe has quit IRC13:04
*** dklyle has joined #openstack-keystone13:04
*** shyamb has quit IRC13:13
*** zaneb has joined #openstack-keystone13:17
*** mvkr has quit IRC13:20
*** elbragstad has joined #openstack-keystone13:24
*** ChanServ sets mode: +o elbragstad13:24
*** elbragstad is now known as lbragstad13:25
*** trident has quit IRC13:27
*** irclogbot_3 has joined #openstack-keystone13:28
*** trident has joined #openstack-keystone13:29
*** zaneb has quit IRC13:29
*** zaneb has joined #openstack-keystone13:29
*** altlogbot_2 has quit IRC13:31
*** altlogbot_0 has joined #openstack-keystone13:32
*** jamesmcarthur has quit IRC13:36
*** mchlumsky has joined #openstack-keystone13:37
*** dklyle has quit IRC13:37
*** irclogbot_3 has quit IRC13:38
*** irclogbot_1 has joined #openstack-keystone13:39
openstackgerritLance Bragstad proposed openstack/keystone master: Add role assignment testing for project users  https://review.openstack.org/63971813:41
openstackgerritLance Bragstad proposed openstack/keystone master: Remove assignment policies from policy.v3cloudsample.json  https://review.openstack.org/64094313:41
*** mchlumsky has quit IRC13:45
*** mvkr has joined #openstack-keystone13:47
*** erus has quit IRC13:47
*** erus has joined #openstack-keystone13:47
*** mchlumsky has joined #openstack-keystone13:48
*** jmlowe has joined #openstack-keystone14:01
*** erus has quit IRC14:23
*** erus has joined #openstack-keystone14:24
* lbragstad wonders if https://review.openstack.org/#/c/645968/ support should wait for Train... 14:25
cmurphylbragstad: you mean just that patch or the whole series?14:28
lbragstadup to that patch14:28
lbragstadeverything is pretty straight-forward up to that patch14:29
lbragstadbut that patch is where domain support begins for the grant API...14:29
*** jamesmcarthur has joined #openstack-keystone14:29
lbragstadi spent a couple hours on friday laying out the protection tests, and it's going to be a significant amount of work14:30
gagehugoo/14:33
cmurphyif it's not feasible in time then i guess let's not worry about it, there are others we'll have to finish up next cycle too14:33
lbragstadpart of me feels better leaving full domain user support for grant management alone because we do have domain support for the role assignment API done14:34
openstackgerritMerged openstack/keystone master: Implement domain reader for role_assignments  https://review.openstack.org/63858714:34
openstackgerritMerged openstack/keystone master: Add role assignment test coverage for domain members  https://review.openstack.org/63859314:34
openstackgerritMerged openstack/keystone master: Add role assignment test coverage for domain admins  https://review.openstack.org/63859714:34
lbragstadso - at least domain users can query keystone for role assignment information14:34
lbragstadspeaking of ^14:34
cmurphyheh14:34
cmurphylbragstad: i'm wondering how to handle this https://review.openstack.org/643937 - where we've already deprecated the policy once and we're changing it again right away14:35
lbragstadoh - you mean going from base.SYSTEM_READER to SYSTEM_READER_OR_DOMAIN_READER?14:36
cmurphyyeah, but just before that it was RULE_ADMIN_REQUIRED14:36
lbragstadright14:37
lbragstadare you thinking we need to formally handle the move from SYSTEM_READER to SYSTEM_READER_OR_DOMAIN_READER?14:37
cmurphyi'm not sure14:38
*** erus has quit IRC14:38
cmurphyin case someone has already updated their policies it's going to be out of date already14:38
lbragstadi would say we should, iff we claim to support deploying keystone off of master14:39
cmurphyalso we already have release notes for the old-new policies that are now in stable/stein i think14:39
*** erus has joined #openstack-keystone14:39
cmurphythey are14:39
cmurphyso those release notes will now be wrong, though i think we can handle that14:40
cmurphys/handle that/fix that14:40
lbragstadwe'd have to backport adjustments to them i suppose14:40
lbragstadhmmm14:41
cmurphyyeah and then there's a trick we have to do on master so that the change only appears on stein and not the unrelease notes14:41
lbragstadi guess the only other way to prevent this from happening, is to have all code and tests to go from base.RULE_ADMIN_REQUIRED to SYSTEM_READER_OR_DOMAIN_READER all in one go14:41
cmurphywe've already changed a bunch to SYSTEM_READER already14:43
lbragstadright14:43
lbragstadso, everything we've merged in https://etherpad.openstack.org/p/keystone-stein-rc2-tracking will need release notes backported to stable/stein?14:44
cmurphypretty much14:44
lbragstadoof14:45
lbragstadjust release notes?14:45
* lbragstad struggles to remember the shenanigans we had to do for release notes before in this situation14:46
cmurphyi think for rc2 it's probably fine to just fixup the release notes, when we open train for development i'm not sure how we'll handle the deprecations since i think oslo.policy can only handle one deprecation?14:46
cmurphythere's a trick with adding an ignored note to a file somewhere14:46
lbragstadyeah - only one deprecation at a time, afaik14:47
cmurphymaybe we need to augment oslo.policy to handle multiple deprecations before we keep working on these :/14:49
lbragstadmaybe...14:50
lbragstadi guess the way i envisioned it was...14:50
lbragstadland patches the deprecate policies, and update the deprecations up to the point where we release so they are in their final "state"14:51
lbragstadbut I can see how that didn't necessarily pan out with some of these more complicated policy changes and APIs14:51
lbragstads/patches the deprecate/patches that deprecate/14:51
openstackgerritColleen Murphy proposed openstack/keystone master: Delete shadow users when domain is deleted  https://review.openstack.org/64749814:58
cmurphyjust if an operator has upgraded to stein, sees all these deprecation warnings, overrides their policies to use the new recommended/default policy, then we change it again in train, i think they won't see deprecation warnings and won't be prompted to change them again? all they have to go on is the release notes14:59
*** awalende has quit IRC15:00
beekneemechIn oslo.config you can have multiple deprecated names for whatever the current name is. Something similar might be good for policy.15:00
*** beekneemech is now known as bnemec15:00
*** awalende has joined #openstack-keystone15:00
cmurphyyeah15:00
* bnemec -> oslo meeting15:01
*** whoami-rajat has joined #openstack-keystone15:01
* lbragstad thinks through the oslo.policy deprecation logging15:02
*** awalende has quit IRC15:04
lbragstadlooks like this is the case we handle in oslo.policy http://git.openstack.org/cgit/openstack/oslo.policy/tree/oslo_policy/policy.py?id=5d2b7a8634c0a1b7c75a71953e37b671e996a9ca#n67815:05
lbragstadif we deprecate identity:create_foo to use SYSTEM_READER instead of RULE_ADMIN_REQUIRED15:06
lbragstada warning will be logged15:06
lbragstadif the operator *doesn't* override identity:create_foo and we change the deprecation from SYSTEM_READER to SYSTEM_READER_OR_DOMAIN_READER - then another warning will be logged15:07
lbragstadhowever, if they do decide to override identity:create_foo with something else, or the new default, they won't see a log warning encouraging them to use SYSTEM_READER_OR_DOMAIN_READER15:08
cmurphyright15:09
knikollao/15:10
cmurphy\o15:10
lbragstadso - we might need something like https://pasted.tech/pastes/7bf6d68ded0481914abb50dd6a80599c20a8fde3.raw15:17
lbragstadin oslo.policy15:17
lbragstadwhich logs a warning if the operator is overriding the policy15:19
eruso/15:19
*** dklyle has joined #openstack-keystone15:20
lbragstadthat might be missing an edge case or two...15:20
cmurphybtw i send out the meeting time doodle poll on the mailing list but never linked it here, here it is https://doodle.com/poll/zxv6d2mxngmhb3vc15:28
*** erus has quit IRC15:28
*** erus has joined #openstack-keystone15:28
*** shyamb has joined #openstack-keystone15:36
*** itlinux has quit IRC15:37
bnemeclbragstad: Are we simply missing functionality to check for deprecated targets in the policy rules?16:02
*** xek has quit IRC16:02
bnemecI'm not sure we should be warning every time someone overrides a rule whose default changed at some point.16:02
* bnemec may be misunderstanding what is going on here too16:03
lbragstadwell - we do have functionality for deprecation warnings16:06
lbragstadin all currently handled cases, we issue a warning16:06
lbragstadhttp://git.openstack.org/cgit/openstack/oslo.policy/tree/oslo_policy/policy.py?id=5d2b7a8634c0a1b7c75a71953e37b671e996a9ca#n63316:06
*** xek has joined #openstack-keystone16:08
bnemecRight, but that only handles rule renames and default changes.16:09
bnemecIt doesn't handle the case where the thing you're referring to in the rule changes.16:09
bnemecEven setting aside the double-deprecation problem, if I had overridden a rule that previously used RULE_ADMIN_REQUIRED I wouldn't get a warning, would I?16:10
cmurphyright16:11
*** erus has quit IRC16:11
*** erus has joined #openstack-keystone16:12
bnemecThat seems less than ideal.16:13
bnemecWith the disclaimer that I don't currently know how/if we can fix it.16:13
cmurphyyeah, it means the only means we have to let those people know that things are changing is through release notes16:13
cmurphybut in the case that they had already overridden a policy then likely it's because they really wanted something different and wouldn't want to switch to the new defaults anyways16:14
cmurphybut in the case they were just overriding the policy to get rid of deprecation warnings then they won't see deprecation warnings telling them to override again16:15
bnemecYeah, but they still need to know to s/RULE_ADMIN_REQUIRED/SYSTEM_READER/ in their custom policy.16:15
bnemecOh, I hadn't considered that second case.16:16
bnemecThat they're basically saying "Yeah, I know it's changing. I'm ready for it."16:17
bnemecI guess that's the double-deprecation problem you were originally talking about.16:19
* bnemec seems to have a talent for derailing keystone conversations16:19
cmurphyit's a good point though, i guess you'd have the same problem in oslo.config if you tried to do a 'this default is changing' advance warning deprecation notice and then double-changed it within two cycles16:22
bnemecYeah, I'm not actually sure oslo.config handles default value changes at all. You can't just append the values in that case like we can in oslo.policy.16:24
bnemecI think the way it's been handled in the past is to set the default to a sentinel value and if the application sees the sentinel then it logs the warning itself. Then it overrides with whatever the default should actually be.16:25
cmurphyhmm yeah16:29
*** shyamb has quit IRC16:35
openstackgerritLance Bragstad proposed openstack/keystone master: Consolidate user protection tests  https://review.openstack.org/62332316:49
lbragstadcmurphy thoughts on https://etherpad.openstack.org/p/keystone-stein-rc2-tracking ?16:50
lbragstadi marked stopping points16:50
*** gyee has joined #openstack-keystone16:50
vkmchey, I'd need some guidance for https://review.openstack.org/#/c/647538/, I'm trying to remove keystoneclient and use keystoneauth instead for manilaclient, I'm wondering if these changes are good enough (from a functional perspective)16:59
vkmcany pointer is appreciated16:59
*** dustinc has joined #openstack-keystone17:15
*** jamesmcarthur has quit IRC17:26
lbragstadcmurphy started proposing some of what's landed in master to stable stein https://review.openstack.org/#/q/status:open+project:openstack/keystone+branch:stable/stein17:30
*** jamesmcarthur has joined #openstack-keystone17:31
*** KeithMnemonic has joined #openstack-keystone17:32
*** erus has quit IRC17:32
*** erus has joined #openstack-keystone17:32
*** mvkr has quit IRC17:37
cmurphyvkmc: left a comment17:43
vkmccmurphy, thanks!17:43
cmurphylbragstad: looks like we're in good shape wrt https://etherpad.openstack.org/p/keystone-stein-rc2-tracking ?17:52
lbragstadi think so - trying to clean things up now17:52
lbragstadcmurphy gagehugo do you have +2/+W on stable/stein?17:53
cmurphynope :'(17:53
lbragstadreally?!17:53
openstackgerritMerged openstack/keystone master: Update system grant policies for system member  https://review.openstack.org/64502117:53
gagehugonope.jpg17:53
cmurphymight be more efficient if i propose the backports so you and kmalloc can approve17:53
lbragstadhmmm17:53
lbragstadi remember having stable core on stable/pike before it was officially released even though i didn't have keystone-stable-core power yet17:54
lbragstadi wonder if something changed there17:54
cmurphyhmm17:54
gagehugono idea17:57
lbragstadapparently that process changed...17:57
*** jamesmcarthur has quit IRC17:59
cmurphylbragstad: one more thing on https://review.openstack.org/63971818:00
*** jamesmcarthur has joined #openstack-keystone18:01
openstackgerritLance Bragstad proposed openstack/keystone master: Add role assignment testing for project users  https://review.openstack.org/63971818:02
openstackgerritLance Bragstad proposed openstack/keystone master: Remove assignment policies from policy.v3cloudsample.json  https://review.openstack.org/64094318:02
lbragstadcmurphy thanks18:02
* lbragstad takes lunch quick 18:08
*** jamesmcarthur has quit IRC18:09
*** xek_ has joined #openstack-keystone18:11
*** xek has quit IRC18:14
*** itlinux has joined #openstack-keystone18:26
*** xek_ has quit IRC18:27
*** xek has joined #openstack-keystone18:27
*** xek has quit IRC18:32
*** dustinc is now known as dustinc|away18:44
cmurphylbragstad: so i think what we need to do is add all the notes that we're backporting to stein to http://git.openstack.org/cgit/openstack/keystone/tree/releasenotes/source/unreleased.rst19:03
cmurphyi think we should do that as one lump to master when we're done with all of them19:03
*** jmlowe has quit IRC19:03
lbragstad++19:04
lbragstadyeah - i think that's a good idea19:04
*** mailingsam_ has joined #openstack-keystone19:05
mailingsam_when does id_mapping table get populated? during deployment of keystone first time or on each ldap user login?19:05
cmurphymailingsam_: when the user logs in, or you an pregenerate it with `keystone-manage mapping_populate`19:07
mailingsam_@cmurphy do you know how heat keystone user constraint works?     resource_getter_name = 'get_user_id'     entity = 'KeystoneUser' . For ldap user I get user not found19:12
cmurphymailingsam_: i know almost nothing about how heat works :( but at a guess i would suggest making sure the domain for the ldap users is specified and correct19:13
cmurphylbragstad: if we don't want to go for https://review.openstack.org/645968 we'll still need a release note for the rest of that series19:14
mailingsam_Heat keystone constrain seems to just do crud operation on user table but I'm confused how it does crud operation when we have user, local_user, nonlocal_user tables does it do union or searches only user table19:14
lbragstadcmurphy agreed - want me to tack it onto https://review.openstack.org/#/c/645890/2 or another patch?19:14
cmurphymailingsam_: the user table has foreign keys to local_user and nonlocal_user so it should be enough to just query the user table19:15
cmurphylbragstad: either way19:15
mailingsam_when I check one of my env, the user table has few users compared to id_mapping, i.e not all users in ldap are reflected in user table so trying to see how to update user/nonlocal_user table to reflect all users in ldap19:20
*** jamesmcarthur has joined #openstack-keystone19:21
openstackgerritColleen Murphy proposed openstack/keystone master: Add domain scope support for group policies  https://review.openstack.org/64393719:22
openstackgerritGage Hugo proposed openstack/keystone master: WIP - Add flask hook for authentication timings  https://review.openstack.org/63482619:24
cmurphymailingsam_: keystone waits until the user logs in before creating it in the user table, but the id_mapping can be created with the mapping_populate command or when you list/show the user or when they log in19:27
openstackgerritLance Bragstad proposed openstack/keystone master: Make system admin policies consistent for grants  https://review.openstack.org/64589019:30
mailingsam_Thanks @cmurphy let me check if user table populates on user login19:31
*** jamesmcarthur has quit IRC19:34
openstackgerritLance Bragstad proposed openstack/keystone master: Consolidate user protection tests  https://review.openstack.org/62332319:38
openstackgerritColleen Murphy proposed openstack/keystone master: Remove redundant policies from v3cloudsample  https://review.openstack.org/64758619:41
openstackgerritColleen Murphy proposed openstack/keystone master: Remove redundant policies from v3cloudsample  https://review.openstack.org/64758619:45
*** jamesmcarthur has joined #openstack-keystone19:49
gagehugolbragstad cmurphy looks like ksm is failing on lower-constraints, I'm getting the same error as zuul locally19:54
lbragstadgagehugo link?19:54
gagehugohttps://review.openstack.org/#/c/643997/ and https://review.openstack.org/#/c/643998/19:54
gagehugohttp://logs.openstack.org/98/643998/1/check/openstack-tox-lower-constraints/48b165a/testr_results.html.gz19:55
openstackgerritColleen Murphy proposed openstack/keystone master: Delete shadow users when domain is deleted  https://review.openstack.org/64749819:57
lbragstadopenssl related it looks like19:57
gagehugoyeah19:57
cmurphyfun19:58
cmurphyhttps://review.openstack.org/647498 would be good to get into rc2, not sure if we've fully resolved the foreign key issue that makes testing that hard19:59
*** jmlowe has joined #openstack-keystone20:00
lbragstaddidn't we just do something with keystoneclient on stable?20:09
lbragstader - for stein?20:09
lbragstadksm is failing in ksc cms module20:10
cmurphyi don't think we've changed keystoneclient since before the client freeze20:10
*** whoami-rajat has quit IRC20:11
*** cfey has quit IRC20:13
lbragstadlast merged change to ksm was on the 6th20:16
lbragstadi assume lower-constraints worked then20:16
gagehugoI would assume so too20:19
*** itlinux has quit IRC20:20
*** pcaruana has quit IRC20:23
*** itlinux has joined #openstack-keystone20:27
*** itlinux has quit IRC20:27
*** xek has joined #openstack-keystone20:33
lbragstadgagehugo i added some more logging, looks like it's failing to find files https://pasted.tech/pastes/210d3d081942347ba2c21aef5cb5671508ee9ff0.raw20:48
gagehugointeresting20:50
lbragstadlower constraints is installing python-keystonclient 3.8.020:58
lbragstadbut py37 is using 3.18.020:58
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Bump lower constraint for python-keystoneclient to 3.18.0  https://review.openstack.org/64760420:59
lbragstad^ works for me locally20:59
lbragstadno sure why 3.18.0 works and 3.8.0 doesn't21:00
gagehugonice21:00
lbragstadnot sure*21:00
gagehugoyeah it works for me locally too21:00
lbragstadcommit message is unhelpful, but if that passes and doesn't have other issues, i can update it21:01
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Bump lower constraint for python-keystoneclient to 3.18.0  https://review.openstack.org/64760421:02
gagehugolgtm21:04
openstackgerritEdgar Magana proposed openstack/keystone master: Replace URL name to the correct one in Keystone Docs  https://review.openstack.org/64760621:04
*** jamesmcarthur_ has joined #openstack-keystone21:22
*** jamesmcarthur_ has quit IRC21:23
*** jamesmcarthur_ has joined #openstack-keystone21:23
*** jamesmcarthur_ has quit IRC21:23
*** jamesmcarthur has quit IRC21:24
*** jamesmcarthur has joined #openstack-keystone21:24
*** jamesmcarthur_ has joined #openstack-keystone21:25
*** jamesmcarthur has quit IRC21:29
*** xek_ has joined #openstack-keystone21:46
*** xek__ has joined #openstack-keystone21:47
*** xek has quit IRC21:49
*** xek_ has quit IRC21:50
*** itlinux has joined #openstack-keystone21:54
*** mchlumsky has quit IRC22:02
*** jamesmcarthur_ has quit IRC22:06
*** rcernin has joined #openstack-keystone22:14
*** jamesmcarthur has joined #openstack-keystone22:32
*** jamesmcarthur has quit IRC22:56
*** jamesmcarthur has joined #openstack-keystone22:56
*** jamesmcarthur has quit IRC22:59
*** tkajinam has joined #openstack-keystone23:01
*** tkajinam has quit IRC23:01
*** jamesmcarthur has joined #openstack-keystone23:01
*** tkajinam has joined #openstack-keystone23:02
*** jamesmcarthur has quit IRC23:40
*** erus has quit IRC23:40
*** erus has joined #openstack-keystone23:40
*** xek__ has quit IRC23:54

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!