Tuesday, 2017-08-01

*** https_GK1wmSU has joined #openstack-outreachy00:31
*** https_GK1wmSU has left #openstack-outreachy00:33
*** lwanderley has quit IRC00:49
*** lwanderley has joined #openstack-outreachy00:53
*** lwanderley has quit IRC01:18
*** rmascena has quit IRC01:58
*** rossella_s has quit IRC02:19
*** rossella_s has joined #openstack-outreachy02:21
*** https_GK1wmSU has joined #openstack-outreachy02:56
*** https_GK1wmSU has left #openstack-outreachy02:59
*** leanderthal has joined #openstack-outreachy10:46
*** leanderthal is now known as leanderthal|afk10:48
*** lwanderley has joined #openstack-outreachy11:59
*** raildo has joined #openstack-outreachy12:10
*** lwanderley has quit IRC12:30
*** rmascena has joined #openstack-outreachy15:40
*** raildo has quit IRC15:42
*** rossella_s has quit IRC15:48
*** rossella_s has joined #openstack-outreachy15:50
*** lwanderley has joined #openstack-outreachy16:57
*** lwanderley has quit IRC17:31
*** lwanderley has joined #openstack-outreachy17:31
lwanderleyping raildo rodrigods17:33
rodrigodshey lwanderley17:33
rodrigods:)17:33
lwanderleyhi :)17:33
rodrigodsaround rmascena?17:33
rodrigodslwanderley, first patch merged! \o/17:33
lwanderleyyay, yes!17:33
rodrigodsi took some time last week to ping the QA ppl17:34
lwanderleythanks17:34
rodrigodslet's wait a bit for rmascena17:34
lwanderleyok17:34
rodrigodslet's get started lwanderley17:36
rodrigodsrmascena can catch up later17:36
rodrigodslwanderley, i remember that you were going to try to fix the tempest failures in the LDAP env17:37
rodrigodscorrect?17:37
lwanderleyyep17:37
rodrigods(i just forgot to add the AI in the meeting notes)17:37
lwanderleyand i have some news on that17:37
lwanderleyi need some help to decide what to do17:37
rodrigodscool17:37
rodrigodsgo ahead :)17:37
lwanderleyThe problem is not the LDAP domain specifically, it happens because our scenario has domain-specific drivers enabled. Because these option is enabled, the test_list_users test creates another domainto hold its domain enabled user, this new domain is different from the one that contains all the services and the not enabled users (the default domain)17:38
lwanderley.17:38
lwanderleyhere #link https://github.com/openstack/tempest/blob/master/tempest/api/identity/admin/v3/test_list_users.py#L4017:38
lwanderleyWhen the test uses keystone api endpoints to retrieve its users (and groups) they only return objects from the default domain, that causes the tests to fail.17:39
rodrigods"another domainto hold its domain enabled user" couldn't understand that17:39
rmascenasorry, I'm here now17:40
lwanderleyi don't understand exactly how it happens but when the domain specific driver are enabled that line on the test creates a new domain17:41
lwanderleyhi rmascena17:41
lwanderleythen it adds a user to that domain and the api does not retrieve it17:42
rodrigodslwanderley, only when the specific driver is enabled?17:43
rodrigodsthought that would always create another domain17:43
lwanderleyyes, you are right sorry17:44
lwanderleybut still what happens is that the api does not retrieve it17:44
lwanderleythere's a note about this on this keystone configuration doc17:45
lwanderley#link https://github.com/openstack/keystone/blob/master/doc/source/configuration.rst17:45
lwanderleyNote17:46
lwanderleyIt is important to notice that by enabling either of the domain-specific configuration methods, the operations of listing all users and listing all groups are not supported, those calls will need either a domain filter to be specified or usage of a domain scoped token.17:46
rodrigodscool, got it17:46
rodrigodsyeah, that's what i suspected17:46
rodrigodsso basically, what you need to do is to specify the domain in list_users17:46
rmascenaexactly, on this line: https://github.com/openstack/tempest/blob/master/tempest/api/identity/admin/v3/test_list_users.py#L9217:47
rmascenayou have to say in which domain you're listing that users17:47
lwanderleyok17:47
rmascenasince we now have more than 1 domain, this asserts will fail17:47
rmascenapropbably the same thing for groups17:47
lwanderleywhat happens in this specific test is that it tests if the 2 users created on the test setup are inside the list, but each user belongs to a different domain17:48
lwanderleyso using one domain id would still fail the assert17:49
rmascenaso, you can do a request for each domain and assert that with this result17:50
rodrigodsok, you need to modify the test than17:51
rodrigodsbasically, what you need is a feature flag17:51
rodrigodsfeature flags are settings used to modify the test behavior depending in the environment17:51
rodrigodslwanderley, example: https://review.openstack.org/#/c/428292/17:51
rmascenalwanderley, makes sense for you?17:51
rodrigodslwanderley, see: this portion of the tests is only executed if the feature flag is enabled: https://review.openstack.org/#/c/427345/11/tempest/api/identity/admin/v3/test_roles.py17:52
rodrigodsyou basically need to do something similar to that17:52
lwanderleyok, i think i get it17:53
rodrigodscool17:53
rodrigodslet us know if you have any doubts17:53
lwanderleyjust one thing17:53
rodrigodsbut, basically: add a setting in tempest for the LDAP feature flag17:53
rodrigodsthen enable this flag only in the specific job that configures the LDAP plugin17:54
rodrigodsyou can even modify your LDAP plugin to enable this whenever the "ldap" service is enabled17:54
rodrigodsgot it?17:54
lwanderleyyes, i got it17:55
lwanderleyi will have another test case that tests basically the same thing but only runs when ldap is enabled while the current test case should be prevented to run17:55
lwanderleywhen ldap is enabled?17:55
rodrigodsyou don't need an extra test case17:56
lwanderleyyeah, i see it now just a condition17:56
rodrigodsjust add a condition in the existing ones to match the behavior when it is enabled17:56
rodrigodslwanderley, exactly17:57
lwanderleycool17:57
rmascenagreat17:57
rodrigodsi'll let you figure out the patches dependencies yourself, lwanderley17:58
lwanderleyok, no problem17:59
rodrigodssince you might have a chicken/egg problem there :)17:59
rodrigodsanything else?17:59
lwanderleynot from me17:59
rmascename neither17:59
rodrigodscool, so see you next week17:59
rodrigodslet us know if you have any questions18:00
rodrigodsgood progress so far, lwanderley18:00
rodrigodso/18:00
rmascenalwanderley, yeap, if you don't have so much progress on this, please ping us asap18:00
lwanderleyok, thanks!18:00
lwanderleyrmascena rodrigods have a nice week18:02
rodrigodsthanks, you too!18:02
*** lwanderley has quit IRC18:05
*** rmascena has quit IRC22:00
-openstackstatus- NOTICE: osic nodes have been removed from nodepool due to a problem with the mirror host beginning around 22:20 UTC. please recheck any jobs with failures installing packages.23:47

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!