Tuesday, 2019-03-26

*** mailingsam_ has quit IRC00:05
*** gyee has quit IRC00:13
*** lbragstad has quit IRC00:18
*** jamesmcarthur has joined #openstack-keystone00:53
*** dustinc|away has quit IRC00:56
*** awalende has joined #openstack-keystone01:04
*** awalende has quit IRC01:08
openstackgerritMerged openstack/keystone master: Update system grant policies for system admin  https://review.openstack.org/64502201:28
openstackgerritMerged openstack/keystone master: Test domain users against system assignment API  https://review.openstack.org/64502301:28
openstackgerritMerged openstack/keystone master: Test project users against system assignment API  https://review.openstack.org/64502401:28
*** jamesmcarthur has quit IRC01:30
openstackgerritMerged openstack/keystone master: Update system group assignment policies for reader and member  https://review.openstack.org/64530901:31
openstackgerritMerged openstack/keystone master: Update group system grant policies for admins  https://review.openstack.org/64531001:31
openstackgerritMerged openstack/keystone master: Test domain and project users against group system assignment API  https://review.openstack.org/64531101:31
openstackgerritMerged openstack/keystone master: Remove system assignment policies from policy.v3cloudsample.json  https://review.openstack.org/64531201:31
*** jamesmcarthur has joined #openstack-keystone01:38
*** whoami-rajat has joined #openstack-keystone01:57
*** jamesmcarthur has quit IRC02:13
*** lbragstad has joined #openstack-keystone02:29
*** ChanServ sets mode: +o lbragstad02:29
*** erus has quit IRC02:29
*** erus has joined #openstack-keystone02:30
*** jamesmcarthur has joined #openstack-keystone02:48
*** jamesmcarthur has quit IRC02:51
*** jamesmcarthur has joined #openstack-keystone02:52
*** shyamb has joined #openstack-keystone03:00
*** shyamb has quit IRC03:06
*** jamesmcarthur has quit IRC03:14
*** jamesmcarthur has joined #openstack-keystone03:44
*** jamesmcarthur has quit IRC03:48
*** lbragstad has quit IRC04:34
*** tkajinam_ has joined #openstack-keystone05:06
*** tkajinam has quit IRC05:08
*** shyamb has joined #openstack-keystone05:09
*** markvoelker has joined #openstack-keystone05:17
openstackgerritAdrian Turjak proposed openstack/keystone master: Add support for previous TOTP windows  https://review.openstack.org/64765505:26
*** shyamb has quit IRC05:27
adriantcmurphy, kmalloc: ^ i'm working on some internal TOTP features and will as I do them push them upstream05:34
adriantmostly so they are there for Train, and because I like to keep my internal work in sync with or base on any upstream work05:35
adriantand I should probably make some RFE bugs for those?05:36
adriantFirst is adding previous window support to TOTP (for at least one previous window) since that keeps tripping people up when the totp code just ticks over. 1 previous window is safe and better UX.05:37
*** erus has quit IRC05:37
adriantThen TOTP backup codes.05:37
adriantNot sure if i want to do backup codes upstream as a separate auth plugin, or build the logic into the existing auth plugin.05:37
*** erus has joined #openstack-keystone05:37
adriantessentially the logic would be: "if user has creds type totp-backup, see if any match given passcode, if match, mark auth method as valid, and delete matching totp-backup credential"05:39
*** vishakha has joined #openstack-keystone05:40
adriantnot sure if the delete part should be after the whole auth process is done, and if we want it to only delete on successful auth.05:40
adriantI think on successful auth is unsafe because with a totp-backup code you can otherwise brute force passwords.05:40
*** shyamb has joined #openstack-keystone05:41
adriantIf a match is found, successful auth or not, that backup-code is gone.05:41
*** ileixe has joined #openstack-keystone06:06
*** shyamb has quit IRC06:41
openstackgerritMerged openstack/keystone master: Add role assignment testing for project users  https://review.openstack.org/63971806:42
openstackgerritMerged openstack/keystone master: Remove assignment policies from policy.v3cloudsample.json  https://review.openstack.org/64094306:42
openstackgerritMerged openstack/keystone master: Replace URL name to the correct one in Keystone Docs  https://review.openstack.org/64760606:42
*** shyamb has joined #openstack-keystone06:54
*** tkajinam__ has joined #openstack-keystone07:05
*** tkajinam_ has quit IRC07:07
*** pcaruana has joined #openstack-keystone07:10
*** shyamb has quit IRC07:19
*** shyamb has joined #openstack-keystone07:19
*** shyamb has quit IRC07:38
*** awalende has joined #openstack-keystone08:11
*** shyamb has joined #openstack-keystone08:20
*** xek has joined #openstack-keystone08:23
*** tkajinam__ has quit IRC08:25
*** shyamb has quit IRC08:27
*** shyamb has joined #openstack-keystone08:27
*** rcernin has quit IRC08:36
*** shyamb has quit IRC09:14
*** shyamb has joined #openstack-keystone09:17
*** shyamb has quit IRC09:38
*** shyamb has joined #openstack-keystone09:42
*** rcernin has joined #openstack-keystone09:44
*** shyamb has quit IRC10:21
*** rcernin has quit IRC10:24
*** xek_ has joined #openstack-keystone10:37
openstackgerritMerged openstack/keystone master: Implement system reader functionality for grants  https://review.openstack.org/64588910:38
*** xek has quit IRC10:39
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596810:46
*** shyamb has joined #openstack-keystone11:06
*** ileixe has quit IRC11:20
*** mvkr has joined #openstack-keystone11:22
*** shyamb has quit IRC11:30
*** shyamb has joined #openstack-keystone11:31
*** shyamb has quit IRC12:09
*** shyamb has joined #openstack-keystone12:21
*** markvoelker has quit IRC12:31
*** shyamb has quit IRC12:36
*** mchlumsky has joined #openstack-keystone12:43
*** lbragstad has joined #openstack-keystone12:46
*** ChanServ sets mode: +o lbragstad12:46
*** jamesmcarthur has joined #openstack-keystone12:46
*** jmlowe has quit IRC12:52
cmurphymorning lbragstad12:53
lbragstadhey cmurphy12:53
lbragstadthanks for proposing the backports for grants12:54
cmurphyno problem12:54
cmurphydo you think I should break up https://review.openstack.org/643937 into reader/member/admin patches? it felt a little more natural to write it together but i could see how it's a beast to review12:54
lbragstadi'm pretty familiar with the flow so i should be able to review it as one patch12:56
cmurphymmk12:56
lbragstadi suppose we could revisit the approach, too12:57
lbragstadmaybe 6 patches for each resources isn't needed anymore?12:57
cmurphymight be a tiny bit excessive12:58
cmurphyotoh your stackalytics stats are through the roof so that's something ;)12:58
openstackgerritLance Bragstad proposed openstack/keystone master: Consolidate user protection tests  https://review.openstack.org/62332312:58
* lbragstad pads stats12:58
lbragstadthe credential API was all one patch and it was about 1500+ lines12:59
lbragstadat the time i was like "there is no way i'm going to get people to review all these" :)13:00
*** erus has quit IRC13:00
cmurphythis one is +762,-51 so still pretty big but it's all in the unit tests13:00
lbragstadyeah13:00
lbragstadfwiw - i did a count of master yesterday13:00
*** awalende has quit IRC13:01
lbragstadwe've added about 750 additional protection tests 0.013:01
*** erus has joined #openstack-keystone13:01
*** awalende has joined #openstack-keystone13:01
cmurphyi think all this code is slowing down our pep8 tests, it's been feeling really sluggish for the last few weeks13:01
lbragstadit is..13:01
lbragstadif you run `tox -e py37 -- keystone.tests.unit.protection` you can time just the protection tests13:02
lbragstad750 tests took 256 seconds to run yesterday for me13:02
lbragstadbut... something we might be able to revisit now that we're using all the flask utilities for these tests...13:05
*** awalende has quit IRC13:05
lbragstadis proper test classes and using setupClass() effectively instead of duplicating all the steps for each test13:05
cmurphy++13:06
lbragstadthe last time I tried to make that change with our tests we were still using all of our own utilities and sharing them through inheritance, which caused a whole bunch of issues13:06
cmurphythe token getting with flask can definitely be dried up13:06
lbragstadyeah - same with calling bootstrap13:07
lbragstadwe call that on every test13:07
lbragstadbut i don't think those tests actually modify the data from bootstrap13:07
*** jistr is now known as jistr|afk13:16
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Run lower-constraints job on Xenial  https://review.openstack.org/64760413:26
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Run lower-constraints on Bionic and update python-keystoneclient  https://review.openstack.org/64773613:26
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Run lower-constraints job on Xenial  https://review.openstack.org/64760413:29
*** awalende has joined #openstack-keystone13:30
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Run lower-constraints job on Xenial  https://review.openstack.org/64760413:31
*** awalende has quit IRC13:34
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Run lower-constraints job on Xenial  https://review.openstack.org/64760413:35
*** jmlowe has joined #openstack-keystone13:37
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Run lower-constraints on Bionic and update python-keystoneclient  https://review.openstack.org/64773613:38
openstackgerritColleen Murphy proposed openstack/keystone master: Add release prelude about changing policies  https://review.openstack.org/64773713:41
cmurphylbragstad: ^13:41
lbragstadsweet13:42
*** vishakha has quit IRC13:45
lbragstadi might be double booked on saturday during the PTG13:55
cmurphyyeah i figured13:56
cmurphywe're also scheduled to start later on thursday13:56
cmurphyshould we ask if we can move our slot up so we get a full thursday and friday?13:57
*** mvkr has quit IRC13:59
lbragstadcmurphy up to you - but don't bend over backwards on my account14:05
lbragstadi'm also not sure how full our days are going to be?14:05
lbragstadhttps://etherpad.openstack.org/p/DEN-keystone-forum-sessions looks like it's kind of set - so it could be grouped into a rough schedule?14:06
cmurphyi feel like everyone is going to want to leave early or listen in on the tc session on saturday so might as well see if we can move it up unless it conflicts with something else14:07
lbragstad++14:07
cmurphyagreed that we can start coming up with a schedule14:08
cmurphyi was going to do that...soonish...14:08
* lbragstad waves hands14:08
lbragstad"this is not the droid you're looking for"14:09
cmurphylol14:09
*** jamesmcarthur has quit IRC14:11
cmurphylooks like the edge group is meeting thursday morning so not sure we want to overlap with that14:11
lbragstadlooks like we have a bullet in our forum section dedicated to edge stuff14:12
lbragstadif we have things to talk about with them, maybe we can use the same time on thursday?14:12
*** jamesmcarthur has joined #openstack-keystone14:13
*** jamesmcarthur has quit IRC14:14
cmurphysure14:15
*** jistr|afk is now known as jistr14:15
lbragstaddo you want me to self-approve? https://review.openstack.org/#/q/status:open+project:openstack/keystone+branch:stable/stein+topic:implement-default-roles since your +1 is on it?14:16
cmurphymaybe kmalloc can approve if he's around today14:17
* lbragstad nods14:17
kmallocI am14:17
cmurphylbragstad: were there specific things we want to touch on with the edge group at the ptg? there's not a lot of details in the etherpad14:18
lbragstadhttps://review.openstack.org/#/q/status:open+project:openstack/keystone+branch:stable/stein+topic:bug/1806762 needs stable reviews, too14:18
lbragstadwell - i know they have questions about the federation testing stuff and the athenz approach, because that comes up weekly during the edge call14:19
lbragstad(which is happening right now)14:19
cmurphyyeah i'm on it14:19
lbragstadoh - you're hiding14:20
lbragstadif i knew that was you'd i wouldn't have answered the keystone question ;)14:20
*** erus has quit IRC14:20
cmurphywell she called you :P14:21
lbragstads/you'd/you/14:21
*** redrobot has joined #openstack-keystone14:21
*** erus has joined #openstack-keystone14:21
cmurphythe qa team's slot starts thursday morning so may be can invade them during that time14:22
kmalloc+2/+A and +2 where it made sense (no other +2)14:22
cmurphythanks kmalloc14:23
lbragstadoh - good call14:23
*** xek_ has quit IRC14:24
*** xek_ has joined #openstack-keystone14:24
eruso/14:24
cmurphy\o14:24
lbragstadhttps://review.openstack.org/#/c/647553/ and https://review.openstack.org/#/c/647552/ could use some stable eyes14:25
*** mvkr has joined #openstack-keystone14:26
lbragstadkmalloc ^14:27
gagehugoo/14:32
*** vishakha has joined #openstack-keystone14:35
*** jamesmcarthur has joined #openstack-keystone14:36
*** erus has quit IRC14:36
*** erus has joined #openstack-keystone14:37
knikollao/14:48
*** xek_ has quit IRC14:53
*** jmlowe has quit IRC15:02
*** jmlowe has joined #openstack-keystone15:07
redrobotHello keystone friends!15:08
*** jmlowe has quit IRC15:09
redrobotI'm trying to debug a failing barbican gate.  It seems to be failing when trying to find keystone-manage15:09
redrobothttp://logs.openstack.org/57/645857/1/check/barbican-dogtag-devstack-functional-fedora-latest/6670b03/logs/devstacklog.txt.gz#_2019-03-22_20_03_07_09215:09
redrobotHas there been recent changes to the way Keystone is installed in DevStack?15:09
openstackgerritMerged openstack/keystone master: Make system admin policies consistent for grants  https://review.openstack.org/64589015:12
*** shyamb has joined #openstack-keystone15:17
lbragstadredrobot o/15:22
lbragstadnot that i am aware of15:22
redrobotohai lbragstad!15:23
redrobotdang... I was hoping y'all would have some awesome insight. :-P15:23
*** jmlowe has joined #openstack-keystone15:25
lbragstadi wonder if that job is doing anything different with keystone?15:26
lbragstadi haven't seen that error before15:26
openstackgerritColleen Murphy proposed openstack/keystone master: Add domain scope support for group policies  https://review.openstack.org/64393715:32
openstackgerritMerged openstack/keystone master: Replace openstack.org git:// URLs with https://  https://review.openstack.org/64643215:35
openstackgerritMerged openstack/keystone master: Remove external-dev and consolidate to contributor  https://review.openstack.org/64564015:35
*** shyam89 has joined #openstack-keystone15:59
cmurphykeystone meeting now in #openstack-meeting-alt16:01
*** shyamb has quit IRC16:03
*** jmlowe has quit IRC16:21
*** gyee has joined #openstack-keystone16:25
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596816:26
openstackgerritVishakha Agarwal proposed openstack/keystone master: Make domain admin policies consistent for grants  https://review.openstack.org/64780116:26
*** shyam89 has quit IRC16:34
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596816:38
openstackgerritColleen Murphy proposed openstack/keystone master: Add keystone's technical vision reflection  https://review.openstack.org/64137416:39
*** erus has quit IRC16:46
*** erus has joined #openstack-keystone16:47
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596816:51
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596816:55
lbragstadcmurphy kmalloc picked up the last two in the grant chain and proposed them to stable/stein https://etherpad.openstack.org/p/keystone-stein-rc2-tracking17:02
lbragstadlines 72 and 7317:02
cmurphyoh good17:02
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596817:05
openstackgerritVishakha Agarwal proposed openstack/keystone master: WIP: implement domain reader support for grants  https://review.openstack.org/64596817:09
cmurphylbragstad: weird, i thought i already fixed the tests on https://review.openstack.org/647586 but maybe i forgot to git review17:25
*** jamesmcarthur has quit IRC17:25
lbragstadi started tinkering with it locally, but your test coverage is exhaustive17:41
lbragstadafaict, they're failing because the group policies aren't being overridden17:42
lbragstadsidenote: those tests are hard to grok17:42
aning_lbragstad: what's the feature related to system assignment? where can I find document about it?17:47
*** mvkr has quit IRC17:50
lbragstadaning_ http://specs.openstack.org/openstack/keystone-specs/specs/keystone/queens/system-scope.html17:50
lbragstadhttp://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/policy-goals.html17:51
lbragstadhttp://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/policy-security-roadmap.html17:51
lbragstadand finally17:51
lbragstadhttp://specs.openstack.org/openstack/keystone-specs/specs/keystone/rocky/define-default-roles.html17:51
*** jmlowe has joined #openstack-keystone17:51
aning_lbragstad: Thx. I guess these 3 specs are all related to system assignment, right?17:52
lbragstadthe first one is pretty much the implementation spec17:52
lbragstadthe next two are overall documents that describe the issues on a higher level17:52
aning_lbragstad: Great, thx again.17:53
lbragstadthe last is another specification that we did after the system-scope work was in place that makes all that work more useful17:53
lbragstadalso - this is written for developers as the audience17:53
*** mvkr has joined #openstack-keystone17:53
lbragstadbut it also describes a lot of detail around the problem and how system-scope fixes it17:53
lbragstadhttps://docs.openstack.org/keystone/latest/contributor/services.html#authorization-scopes17:53
lbragstadhttps://docs.openstack.org/keystone/latest/contributor/services.html#why-are-authorization-scopes-important17:53
lbragstadand finally https://docs.openstack.org/keystone/latest/contributor/services.html#how-do-i-incorporate-authorization-scopes-into-a-service17:54
lbragstadaning_ let us know if you have specific questions we can help you with17:54
aning_Wow, it is big17:54
lbragstadyeah... it's a complicated problem :(17:54
aning_lbragstad: sure.17:54
aning_lbragstad: need time to digest.17:55
lbragstad++17:55
*** jamesmcarthur has joined #openstack-keystone17:56
*** stevebot has joined #openstack-keystone17:59
lbragstadomg - a stevebot18:00
stevebot@lbragstad what year is this?!18:01
lbragstadi'm surprised your nick still works ;)18:01
stevebotno meeting?18:01
lbragstadmeeting was two hours ago18:02
stevebotfuuuuu18:02
gagehugolol18:02
lbragstad:)18:02
lbragstadwah wah...18:02
steveboti wanted to congratulate @cmurphy :)18:02
steveboti've clearly gotten too used to slack18:02
lbragstads/congratulate/offer condolences/18:03
lbragstadre: slack i was bummed to hear the the irc gateway is no longer supported18:04
*** dolphm has joined #openstack-keystone18:07
dolphmsorry i'm late18:08
lbragstado..... m...... g.......18:08
* lbragstad marks the calendar18:08
dolphmjust wanted to drop in and say congrats to @cmurphy!18:09
kmallocwhoa18:09
kmallochi dolphm !18:09
dolphmkmalloc: o/18:09
dolphmdoes keystone still support 401's?18:10
lbragstadmostly just 503s18:12
stevebotthe openstack channels for irc certainly gave me a 401 :P18:12
lbragstadfollowed promptly by a 30218:13
kmallocdolphm: unuathorized, should be fine.18:17
kmallocand supported18:17
kmallocoh hah18:18
kmallocwait dolphm AND stevebot, i mean we just need joe heck and termie.18:18
kmallocand it'll be like old times.18:18
dolphmthere, i did a code review18:21
kmallocare you going to submit code change and get ATC again too?18:22
dolphmhow many more code reviews until i get a prize?18:22
* kmalloc hands dolphm a prize18:22
dolphmkmalloc: i mean, i guess i could. gotta keep voting in elections!18:22
kmalloc:)18:22
* kmalloc hands dolphm a +2 for said code change (provisionally applied) even though it doesn't exist yet18:23
*** jmlowe has quit IRC18:23
stevebotdolphm https://review.openstack.org/#/c/641374/ for an easy review18:26
dolphmthat one sounds too important18:27
stevebotwhere are the job results for https://review.openstack.org/#/c/641374/3 ?18:27
lbragstadon your machine stevebot - just need to run them ;)18:28
stevebot:O18:29
stevebottox -e docs?18:29
*** jmlowe has joined #openstack-keystone18:29
lbragstadyup18:29
cmurphystevebot: dolphm omg <318:30
dolphm\o/ congrats!18:35
cmurphycongrats to lbragstad for successfully conning me18:35
lbragstadi learnt from the best18:36
cmurphylol18:36
dolphmi promise it won't hurt too bad after awhile18:38
openstackgerritDolph Mathews proposed openstack/keystone master: Update broken links to dogpile.cache docs  https://review.openstack.org/64786618:39
*** jmlowe has quit IRC18:39
dolphmBOOM18:40
dolphmATC here i come18:40
stevebotopenstack denver watch out18:40
stevebot+118:41
stevebotdamn, approved and gating already18:42
stevebothere i am stuck in a meeting18:42
lbragstadlemme guess, you and dolphm are in the same meeting?18:43
stevebotno, he skipped it18:43
lbragstadlol smart18:43
lbragstadlemme guess, you couldn't skip it?18:43
stevebotprobably could have but glad i didn't, someone asked me for something18:43
aning_lbragstad: A quick question pop up in my mind, if admin@Default has a admin role in System, does admin implicitely have admin role (or other) in all projects and domains target?18:43
*** jmlowe has joined #openstack-keystone18:44
lbragstadaning_ no - it only gets a role assignment on the system and a project created by `keystone-manage bootstrap`18:44
lbragstads/it/admin@Default/18:46
dolphmwhy is Default capitalized?18:47
* dolphm asking the hard questions18:47
* lbragstad deflects to cmurphy 18:48
cmurphydecisions somebody made before my time18:48
lbragstad#flawless18:48
cmurphyB)18:49
aning_lbragstad: the project created by 'keystone-manage bootstrap', you the "admin" project?18:49
lbragstadaning_ yep18:49
stevebotis "Default" the name and "default" the id?18:49
aning_stevebot: ++18:49
kmallocstevebot: that sounds right18:50
steveboti should leave before i start doing reviews haha18:50
kmallocthe real secret... trying to rope stevebot back into openstack :P18:51
aning_lbragstad: then how different is it from admin@Default has admin role in admin project? I know 'System' seems to be another layer of scope, but don't get it yet ...18:53
*** jmlowe has quit IRC18:54
lbragstadaning_ system-scope was developed to move us away from having to use project-scoped tokens for everything18:55
aning_lbragstad: k, need continue digging18:57
lbragstadsince openstack has APIs that operate on resources inside and outside of project-scope, we didn't really have a clean way of protecting APIs that fell outside of project-scope18:57
aning_lbragstad: that makes sense18:58
lbragstadsystem-scope (and domain-scope) should help us move towards better support for hard-tenancy18:59
*** erus has quit IRC18:59
*** erus has joined #openstack-keystone19:00
aning_lbragstad: by giving admin a role in system so that admin can access these resources outside of project-scope, like managing the deployed system19:01
lbragstadright19:01
*** jmlowe has joined #openstack-keystone19:01
lbragstadfor example: having admin on project Foo shouldn't let uses modify entries in the service catalog19:02
lbragstadusers*19:02
aning_lbragstad: since service catalog is a system wide resource?19:03
lbragstadyeah19:03
*** awalende has joined #openstack-keystone19:03
aning_lbragstad: BTW what's hard_tenancy?19:03
lbragstador another example: having admin on project Foo shouldn't let users query hypervisor information from nova that instances from multiple projects could be running on19:03
lbragstadhard tenancy assumes users are malicious and untrustworthy (in a way)19:05
aning_Yeah, make sense since hypervisor is really a system resource.19:05
lbragstade.g., you have to assume a user will do something if they have the ability to do so19:06
*** erus has quit IRC19:06
*** erus has joined #openstack-keystone19:07
dolphmsounds like that supersedes this then https://blueprints.launchpad.net/keystone/+spec/service-scoped-tokens19:07
*** awalende has quit IRC19:07
lbragstadyeah - it would be really cool to get it to that point19:07
lbragstadjamielennox had a really cool idea during the Queens ptg19:08
lbragstadwhich was to reuse the hierarchical nature of the service catalog and expose services (in keystone) as grant targest19:08
lbragstadtargets*19:08
lbragstadi could have `admin` on the compute service in the us-west region, but cmurphy could have `admin` on the entire deployment system19:10
*** jmlowe has quit IRC19:11
*** mvkr has quit IRC19:15
aning_lbragstad: so far region is not a scope yet19:16
lbragstadaning_ not for assignments, no19:16
aning_I can see region scope may have use cases though.19:17
aning_Region support is a whole big topic ...19:18
lbragstad++19:19
lbragstadwhile system-scope includes the entire deployment system today, we could break it into services in the future19:19
stevebotservice assignments is something that folks have wanted for a while iirc19:20
lbragstadimplementing another authorization scope is already a significant amount of work, so we thought it best to hold off on that part19:20
stevebotkinda worked around it with service accounts :\19:20
kmallocyeah, system scope is much cleaner19:21
*** erus has quit IRC19:21
kmallocit's something we needed19:21
lbragstadi agree it would be nice to offer a way to minimize the attack surface an admin has19:21
kmallocwe can def. expand system scope19:22
*** erus has joined #openstack-keystone19:22
cmurphyit was built with the idea that it might turn into the top level of a service or region scope19:22
*** vishakha has quit IRC19:25
*** jmlowe has joined #openstack-keystone19:29
*** jmlowe has quit IRC19:33
openstackgerritMerged openstack/keystonemiddleware master: Run lower-constraints job on Xenial  https://review.openstack.org/64760419:34
*** jamesmcarthur has quit IRC19:45
lbragstadgagehugo cmurphy kmalloc stable stein fix for ksm https://review.openstack.org/64790720:05
openstackgerritLance Bragstad proposed openstack/keystonemiddleware master: Revert "Run lower-constraints job on Xenial"  https://review.openstack.org/64790920:05
cmurphydo we need to backport it to rocky too? or is rocky safe?20:06
*** jmlowe has joined #openstack-keystone20:06
cmurphyif it's only a problem for stein then i think we can get away with doing the version bump there20:07
lbragstadi can't recreate it on stable/rocky locally?20:09
lbragstadbut i'd trust whatever zuul tests on stable/rocky more than what i have setup locally20:10
lbragstadfwiw - the revert is rolled into https://review.openstack.org/#/c/647736/220:12
openstackgerritMerged openstack/keystone master: Added keystone identity provider installation to Devstack plugin  https://review.openstack.org/48412120:13
lbragstadactually - the version bump is rolled into the revert*20:13
openstackgerritMerged openstack/keystone master: Consolidate user protection tests  https://review.openstack.org/62332320:13
gagehugoack20:20
openstackgerritColleen Murphy proposed openstack/keystone master: Remove redundant policies from v3cloudsample  https://review.openstack.org/64758620:25
cmurphyha just found the tab where git review was waiting for me to type 'yes'20:25
kmallochehehe20:25
*** dustinc has joined #openstack-keystone20:27
openstackgerritColleen Murphy proposed openstack/keystone master: Add domain scope support for group policies  https://review.openstack.org/64393720:28
openstackgerritColleen Murphy proposed openstack/keystone master: Remove redundant policies from v3cloudsample  https://review.openstack.org/64758620:28
*** stevebot has quit IRC20:37
*** lbragstad has quit IRC21:01
*** pcaruana has quit IRC21:33
*** whoami-rajat has quit IRC21:37
*** mchlumsky has quit IRC21:43
openstackgerritMerged openstack/keystonemiddleware master: Run lower-constraints on Bionic and update python-keystoneclient  https://review.openstack.org/64773622:09
openstackgerritColleen Murphy proposed openstack/keystone master: Remove redundant policies from v3cloudsample  https://review.openstack.org/64758622:27
*** rcernin has joined #openstack-keystone22:38
*** tkajinam has joined #openstack-keystone22:57
openstackgerritMerged openstack/keystone master: Update broken links to dogpile.cache docs  https://review.openstack.org/64786622:58
*** gyee has quit IRC23:53

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!