Monday, 2020-06-22

*** spotz has joined #openstack-keystone00:25
*** markvoelker has joined #openstack-keystone01:25
*** markvoelker has quit IRC01:29
*** __ministry has joined #openstack-keystone02:06
*** __ministry has quit IRC02:16
*** __ministry has joined #openstack-keystone02:31
*** cp- has quit IRC02:56
*** rcernin_ has joined #openstack-keystone02:58
*** rcernin has quit IRC02:59
*** cp- has joined #openstack-keystone03:02
*** rcernin_ has quit IRC03:16
*** markvoelker has joined #openstack-keystone03:26
*** markvoelker has quit IRC03:30
*** rcernin_ has joined #openstack-keystone03:32
*** rcernin_ has quit IRC03:45
*** rcernin has joined #openstack-keystone03:45
*** markvoelker has joined #openstack-keystone04:14
*** markvoelker has quit IRC04:19
*** vishalmanchanda has joined #openstack-keystone04:29
*** evrardjp has quit IRC04:33
*** evrardjp has joined #openstack-keystone04:33
*** abdysn has joined #openstack-keystone05:00
*** rcernin has quit IRC05:32
*** rcernin has joined #openstack-keystone05:40
*** jbalciunas has joined #openstack-keystone06:11
*** markvoelker has joined #openstack-keystone06:15
*** markvoelker has quit IRC06:20
*** markvoelker has joined #openstack-keystone06:54
*** markvoelker has quit IRC06:59
*** bengates has joined #openstack-keystone07:20
*** stingrayza has joined #openstack-keystone07:23
*** also_stingrayza has quit IRC07:25
*** xek_ has joined #openstack-keystone07:30
openstackgerritVishakha Agarwal proposed openstack/keystone master: Remove an assignment from domain and project  https://review.opendev.org/73722507:34
*** bengates_ has joined #openstack-keystone07:44
*** bengates has quit IRC07:46
*** rcernin_ has joined #openstack-keystone07:47
*** rcernin has quit IRC07:47
*** rcernin_ has quit IRC07:54
*** markvoelker has joined #openstack-keystone08:24
*** markvoelker has quit IRC08:29
*** manuvakery has joined #openstack-keystone08:30
*** rajivmucheli has joined #openstack-keystone08:52
*** rajivmucheli has quit IRC09:13
openstackgerritVishakha Agarwal proposed openstack/keystone master: Remove an assignment from domain and project  https://review.opendev.org/73722509:14
*** tkajinam has quit IRC09:21
openstackgerritVishakha Agarwal proposed openstack/keystone master: Add "explicit_domain_id" to api-ref  https://review.opendev.org/73724809:52
openstackgerritMerged openstack/keystone master: ldap: fix config option docs for *_tree_dn  https://review.opendev.org/73489310:06
*** markvoelker has joined #openstack-keystone10:25
*** markvoelker has quit IRC10:30
*** manuvakery has quit IRC10:40
*** xek has joined #openstack-keystone11:01
*** xek_ has quit IRC11:01
*** raildo has joined #openstack-keystone11:48
*** markvoelker has joined #openstack-keystone12:26
*** markvoelker has quit IRC12:31
*** markvoelker has joined #openstack-keystone12:34
*** markvoelker has quit IRC12:39
*** lbragstad has joined #openstack-keystone13:12
Anticimexi have a customer on pike (soc 9) with SAML2 federation (ADFS) as well as kerberos federation. I haven't still wrapped my head exactly around how this works out, but the customer ask is: we want same authZ regardless if you click in through Horizon or kerberos from cli.13:50
Anticimexi'm thinking the answer is to define mappings for the SAML2 (which I know where to find) and something equivalent for the kerberos auth, but that's not nearly as well documented13:50
Anticimexhow do you apply role memberships for identities logging in with kerberos?13:51
AnticimexI'm guessing that mapping an identity regardless of authenticaiton method to the same group is the goal, but it does become a bit tricky.. (saw the older shadow-users/shadow-mapping blueprints as well)13:52
*** markvoelker has joined #openstack-keystone14:07
*** markvoelker has quit IRC14:12
*** abdysn has quit IRC14:21
openstackgerritMerged openstack/keystoneauth master: Implement HTTP Basic client support in keystoneauth1  https://review.opendev.org/72756214:34
knikollamnaser: that is correct. you can use the token itself to introspect the token. i guess that's the way it has always been and no one made it a priority.14:43
knikollaAnticimex: I'm not that familiar with Kerberos, but I think you can set it up using federation too, instead of the dedicated driver.14:47
lbragstadmnaser you mean service users?14:48
lbragstadhttps://review.opendev.org/#/q/ad46262148e7b099e6c7239887e20ade5b8e6ac8 should be good for some reviews now14:52
lbragstadcc mordred ^14:52
mordredlbragstad: I do not have stable core on ksa14:53
lbragstadmordred ahh14:53
lbragstadthat surprises me14:53
mordredlbragstad: it's only keystone-core on it, not keystoneauth-core14:54
lbragstadmordred ack14:54
mordredor - rather - keystone-stable-main14:54
mordredor - rather - keystone-stable-maint14:54
mordredso - you and cmurphy - plus the stable-maint team plus release-managers14:55
lbragstadsorry for the rogue ping :)14:55
mordredlbragstad: no worries! sorry I can't be more help :)14:55
*** beekneemech is now known as bnemec14:59
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Drop python 3.5 support  https://review.opendev.org/73728515:06
*** markvoelker has joined #openstack-keystone15:32
*** markvoelker has quit IRC15:36
*** manuvakery has joined #openstack-keystone15:42
*** gyee has joined #openstack-keystone15:55
openstackgerritMerged openstack/oslo.limit master: Add user guide about how to add a new service  https://review.opendev.org/72693016:04
cmurphylbragstad: https://review.opendev.org/#/admin/groups/538,members16:10
lbragstadmm16:11
lbragstadthanks cmurphy16:11
*** markvoelker has joined #openstack-keystone16:24
*** markvoelker has quit IRC16:29
*** bengates_ has quit IRC16:35
openstackgerritMerged openstack/keystoneauth master: Update lower-constraints versions  https://review.opendev.org/73480316:43
*** markvoelker has joined #openstack-keystone16:44
*** markvoelker has quit IRC16:48
mnaserknikolla, lbragstad: nah, i think knikolla was onto what i was saying.  so rather than having a service user talk to keystone to validate the token, instead, the token provided in the header (X-Auth-Token) is used to talk to keystone and validating the token17:04
mnaserknikolla: is there a straight forward way of doing this?  maybe another auth_plugin for the middleware?17:04
mnaseri'm happy to right it, it doesn't seem too.. wild17:04
*** xek has quit IRC17:16
lbragstadthat might affect long running operations - https://opendev.org/openstack/keystonemiddleware/src/branch/master/keystonemiddleware/auth_token/__init__.py#L374-L38317:17
lbragstadi think service tokens get process differently17:17
lbragstadprocessed*17:17
lbragstadmaybe not?17:18
cmurphyi thought service users existed before service tokens became special for long running operations, i'm struggling to rationalize why though17:19
lbragstadi thought jamie introduced the service token validation/expiry case so that deployments could use short token TTLs for everyone but service users17:20
lbragstadwell - actually, service users would still have the same token expiration, but they'd be exempt from token invalidation that would cause long running operations to fail17:21
mordredcmurphy, knikolla have a sec for https://review.opendev.org/#/c/737285/ ?17:44
cmurphymordred: so we decided 3.5 was more work than it's worth?17:45
mordredcmurphy: sort of - also we have the ussuri release now which works with 3.5 and with a proper python-requires metadata on it17:48
mordredso if we need to backport something to someone still on 3.5 - we can backport it to stable/ussuri17:49
mordredand those people should be good to go at this point17:49
mordredso since there is another solution to the "we have downstream consumers on 3.5" problem, it seems like diverging from the rest of openstack no longer has any real value, yeah?17:50
cmurphyyeah agreed17:50
knikollamnaser, lbragstad, cmurphy: yes, true, service users are allowed to validate expired tokens for long running operations, whereas using the same token would give you a 404 once it is expired.17:52
*** manuvakery has quit IRC17:52
mnaserknikolla, lbragstad, cmurphy: yeah i think the case here was that user foo takes a snapshot that takes 3 hours to create, upload fails if token expiration time was lapsed because nova would upload using the users' token18:23
mnaseri think that's a concern in the use case of the service in question doing asynchronous work.  in my scenario, i just have a simple API that i want the user to talk to with auth tokens, i dont really mind/care about service users18:23
lbragstadmnaser i think that might also cause issue if policy isn't setup correctly18:36
mordredfor a "normal" user token, keystoneauth should just re-auth as needed, no? the service issue was more that once the token has expired the servifce doesn't actually have the auth context from which to get a new token18:37
mordredor - I might need more coffee18:37
mnasermordred: yeah, you're right.  i think the issue here might be that keystonemiddleware with token-only auth (aka no service user) risks failing for services like nova, etc.18:48
mnaserin my case it's just a fully standalone api i'm building18:49
mordredyeah19:00
openstackgerritMerged openstack/keystoneauth master: Drop python 3.5 support  https://review.opendev.org/73728519:19
mordredknikolla: https://review.opendev.org/#/c/737365/19:32
mordredmnaser: oh - fwiw - do you know about the get-connection-from-oslo-config stuff in sdk that we added for nova?19:33
mordredmnaser: openstack.connection.from_config - along with the various keystonauth register_conf_options methods19:35
mordredmnaser: I'm not sure if you're having your service making calls to another service (I'm guessing based on context that you are not - but if you are - we should probably get you on the good juice from the beginning)19:36
knikollamordred: done :)20:12
*** vishalmanchanda has quit IRC20:16
*** markvoelker has joined #openstack-keystone20:55
*** markvoelker has quit IRC20:59
*** spatel has joined #openstack-keystone21:13
*** spatel has quit IRC21:36
*** spatel has joined #openstack-keystone21:42
*** spatel has quit IRC21:46
*** spatel has joined #openstack-keystone21:52
*** spatel has quit IRC22:10
*** spatel has joined #openstack-keystone22:28
*** spatel has quit IRC22:31
*** rcernin_ has joined #openstack-keystone22:33
*** rcernin_ has quit IRC22:47
*** tkajinam has joined #openstack-keystone22:51
*** markvoelker has joined #openstack-keystone22:56
*** markvoelker has quit IRC23:00
*** rcernin_ has joined #openstack-keystone23:02
*** rcernin_ has quit IRC23:16
*** rcernin has joined #openstack-keystone23:18
*** raildo has quit IRC23:30

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!