*** kgriffs|afk is now known as kgriffs | 00:12 | |
*** dave-mccowan has joined #openstack-barbican | 00:15 | |
*** kgriffs is now known as kgriffs|afk | 00:22 | |
*** rm_work is now known as rm_work|away | 00:35 | |
*** john278 has joined #openstack-barbican | 01:43 | |
*** john278 has left #openstack-barbican | 01:45 | |
*** kgriffs|afk is now known as kgriffs | 02:01 | |
*** kgriffs is now known as kgriffs|afk | 02:11 | |
*** kgriffs|afk is now known as kgriffs | 03:50 | |
*** kebray has joined #openstack-barbican | 03:59 | |
*** kgriffs is now known as kgriffs|afk | 03:59 | |
*** kebray has quit IRC | 05:12 | |
*** dave-mccowan has quit IRC | 05:17 | |
*** kgriffs|afk is now known as kgriffs | 05:39 | |
*** kebray has joined #openstack-barbican | 05:48 | |
*** kgriffs is now known as kgriffs|afk | 05:48 | |
*** kebray has quit IRC | 05:49 | |
*** woodster_ has quit IRC | 06:40 | |
*** kgriffs|afk is now known as kgriffs | 07:27 | |
*** atiwari2 has quit IRC | 07:35 | |
*** kgriffs is now known as kgriffs|afk | 07:37 | |
*** atiwari has joined #openstack-barbican | 07:44 | |
*** jaosorior has joined #openstack-barbican | 07:54 | |
*** kgriffs|afk is now known as kgriffs | 09:16 | |
*** kgriffs is now known as kgriffs|afk | 09:26 | |
*** kgriffs|afk is now known as kgriffs | 11:05 | |
*** kgriffs is now known as kgriffs|afk | 11:15 | |
*** kgriffs|afk is now known as kgriffs | 12:51 | |
*** kgriffs is now known as kgriffs|afk | 13:00 | |
*** woodster_ has joined #openstack-barbican | 13:47 | |
*** lisaclark1 has joined #openstack-barbican | 14:07 | |
*** alee has joined #openstack-barbican | 14:23 | |
*** nkinder has quit IRC | 14:26 | |
*** kgriffs|afk is now known as kgriffs | 14:31 | |
*** kgriffs is now known as kgriffs|afk | 14:40 | |
*** igueths has quit IRC | 14:45 | |
*** igueths has joined #openstack-barbican | 14:46 | |
*** ametts has joined #openstack-barbican | 14:47 | |
*** lisaclark1 has quit IRC | 14:52 | |
*** dave-mccowan has joined #openstack-barbican | 14:54 | |
*** lisaclark1 has joined #openstack-barbican | 14:55 | |
*** paul_glass has joined #openstack-barbican | 15:05 | |
*** dimtruck is now known as zz_dimtruck | 15:06 | |
dave-mccowan | hockeynut: hi steve, this is a fix for the bug we were looking at together last wednesday: https://bugs.launchpad.net/barbican/+bug/1424393 | 15:14 |
---|---|---|
openstack | Launchpad bug 1424393 in Barbican "Functional test fails when using override-url option" [Undecided,In progress] - Assigned to Dave McCowan (dave-mccowan) | 15:14 |
hockeynut | thanks dave-mccowan ! | 15:15 |
*** nkinder has joined #openstack-barbican | 15:17 | |
*** darrenmoffat has quit IRC | 15:24 | |
*** darrenmoffat has joined #openstack-barbican | 15:25 | |
*** kgriffs|afk is now known as kgriffs | 15:34 | |
*** zz_dimtruck is now known as dimtruck | 15:38 | |
*** lisaclark1 has quit IRC | 15:39 | |
*** kebray has joined #openstack-barbican | 15:40 | |
*** kebray has quit IRC | 15:40 | |
*** kebray has joined #openstack-barbican | 15:48 | |
*** lisaclark1 has joined #openstack-barbican | 15:53 | |
*** xaeth_afk is now known as xaeth | 16:01 | |
openstackgerrit | Ade Lee proposed openstack/barbican: Modified plugin contract to include barbican-meta-dto https://review.openstack.org/157919 | 16:03 |
alee | woodster_, jaosorior , redrobot , ^^ | 16:04 |
alee | redrobot, how is it going with the dogtag gate? | 16:04 |
jaosorior | alee: Will take me some days to review, cause I'm in another event in Prague :/ | 16:06 |
alee | jaosorior, ah no worries | 16:06 |
jaosorior | back to business on Wednesday though | 16:06 |
*** lisaclark1 has quit IRC | 16:06 | |
alee | jaosorior, you seem to be jetsetting :) | 16:06 |
alee | jaosorior, they have good beer in Prague too | 16:07 |
*** lisaclark1 has joined #openstack-barbican | 16:11 | |
jaosorior | alee: Indeed they do :D | 16:12 |
dave-mccowan | does anyone have a good one-slide description of Barbican and some use cases with a pretty picture? i'd like to use it to help justify my Barbican time to my corporate overlords. | 16:14 |
openstackgerrit | Thomas Dinkjian proposed openstack/python-barbicanclient: Adds orders behaviors and smoke tests. https://review.openstack.org/157130 | 16:19 |
redrobot | alee still waiting on infra for this patch https://review.openstack.org/#/c/157607/ but once it merges we can start running it on the experimental pipeline. | 16:27 |
alee | redrobot, cool | 16:28 |
*** gyee has joined #openstack-barbican | 16:55 | |
*** lisaclark1 has quit IRC | 16:56 | |
*** lisaclark1 has joined #openstack-barbican | 16:56 | |
*** lisaclark1 has quit IRC | 16:59 | |
*** lisaclark1 has joined #openstack-barbican | 16:59 | |
hockeynut | would love some love here -> https://review.openstack.org/#/c/157231/ | 16:59 |
*** kfox1111 has joined #openstack-barbican | 17:00 | |
kfox1111 | so, I'm finishing standing up a new cloud. We've been using a system we call the keyserver to get keys to vm's. Looks like its time again to look at barbican... | 17:01 |
kfox1111 | Has any progress been made since icehouse in having an easy way to restrict which keys a vm can download? | 17:02 |
kfox1111 | and having read only access? | 17:02 |
redrobot | kfox1111 you may be interested in this blueprint http://specs.openstack.org/openstack/barbican-specs/specs/kilo/add-creator-only-option.html | 17:04 |
*** lisaclark1 has quit IRC | 17:05 | |
*** lisaclark1 has joined #openstack-barbican | 17:06 | |
kfox1111 | is there a blueprint for it? can't find it. | 17:08 |
kragniz | kfox1111: this one? https://blueprints.launchpad.net/barbican/+spec/add-per-secret-policy | 17:08 |
kfox1111 | ah. thanks. | 17:09 |
kfox1111 | So, just the spec was merged so far. | 17:10 |
kfox1111 | what are the odds that kilo will have it? | 17:10 |
redrobot | kfox1111 still looking for someone to implement it. there's a few folks in neutron-lbass (octavia) that are really interested in the feature, but no clear commitment to get it landed. :-\ | 17:19 |
redrobot | kragniz thanks, copied the wrong link for some reason >_< | 17:20 |
*** tkelsey has joined #openstack-barbican | 17:20 | |
*** jkf has joined #openstack-barbican | 17:22 | |
kragniz | redrobot: how long do you think it would take to implement by someone who doesn't know barbican well? | 17:24 |
kfox1111 | bummer. :/ | 17:28 |
kfox1111 | barbican's really not useful to us in its current state. :( | 17:29 |
openstackgerrit | Merged openstack/barbican: Cleaning up application initialization https://review.openstack.org/158104 | 17:29 |
woodster_ | kfox1111, please let us know if that blueprint looks sufficient for your needs though | 17:42 |
woodster_ | alee, I'll take a look at your CR this afternoon | 17:42 |
alee | woodster_, thanks | 17:42 |
hockeynut | woodster_ https://review.openstack.org/#/c/158099 isn't crashing coverage anymore - I'd like to workflow but you still have a -1 on it | 17:44 |
kfox1111 | woodster_: a quick glance makes it seem like it gets closer. | 17:45 |
kfox1111 | it still needs to be paired with something like keystone domains that are in user control, and a non existant heat reasource to create users. :/ | 17:45 |
kfox1111 | all very complicated for just letting a server download a key. :/ | 17:45 |
kfox1111 | What we have now is, a metadata field on vm's called keyserver_groups. | 17:46 |
kfox1111 | its just a space seperated list of strings. | 17:46 |
woodster_ | hockeynut, it is still running that cover gate I think | 17:46 |
kfox1111 | we have a keyserver that lets you associate files with those groups. groups are per tenant. | 17:46 |
woodster_ | reaperhulk, just pulling you into the discussion above :) ^^^ | 17:47 |
kfox1111 | and lastly, a vendordata plugin, that reads in the metadata, and creates a signed token that says the bearer token that says that the vm can download files from those groups. | 17:47 |
hockeynut | woodster_ finished 27 mins ago | 17:47 |
kfox1111 | the vm can then simply download the token from the metadata server, and go contact the keyserver with the token to get the keys it needs. | 17:48 |
kfox1111 | the user doesn't have to do anything special in the heat template but tag the vm with what keys its allowed to download. | 17:48 |
kfox1111 | can something like that be implemented with barbican? | 17:49 |
woodster_ | hockeynut, oh I see...yeah just some missing lines then | 17:49 |
kfox1111 | having users have to create/manage users for vm's so they can download keys is a pain. :/ | 17:49 |
hockeynut | yes - but at least not crashing :-) Celebrate the small victories! | 17:50 |
hockeynut | woodster_ I'll hold off | 17:50 |
kfox1111 | Does barbican support named groups of keys yet? | 17:51 |
reaperhulk | kfox1111: we support containers, which are groupings of secrets | 17:52 |
reaperhulk | whether that does what you need, I don't know :) | 17:52 |
kfox1111 | can you name them? :) | 17:54 |
woodster_ | dave-mccowan btw several of us have made presentations for barbican now, including at this past Paris summit | 17:54 |
kfox1111 | If so, I wander if we can pull out the token validation code out of the Keyserver and put it in Barbican. Mapping gropus to containers. | 17:54 |
reaperhulk | kfox1111: nope, they're uuid only sorry :( | 17:55 |
kfox1111 | The rest of the code should work as is then, I think. | 17:55 |
kfox1111 | :/ | 17:55 |
redrobot | reaperhulk kfox1111 containers do have a name field | 17:55 |
reaperhulk | oh, shows what I know. | 17:55 |
kfox1111 | well, uuid would still work. just much harder for the users to keep track of which is which. | 17:55 |
kfox1111 | ah. cool. | 17:56 |
reaperhulk | never listen to me about barbican outside of its actual cryptographic primitive implementations | 17:56 |
kfox1111 | so, I'll just have to figure out how to write a module that bypasses keystone auth.... hmm.... | 17:56 |
dave-mccowan | woodster_ yes, i'm hoping someone can share ppt source with me (at least one slide's worth) | 17:57 |
kfox1111 | in the pipeline, can you have one module skip another, like a pam sufficient? | 17:57 |
*** lisaclark1 has quit IRC | 17:57 | |
*** dimtruck is now known as zz_dimtruck | 17:57 | |
reaperhulk | keystone auth is implemented as middleware so you should be able to just not load that middleware (redrobot check me to confirm I'm not spouting nonsense again) | 17:57 |
kfox1111 | well, I want the keystone middleware for barbican, just for the api call to do the key get, I want it to do either keystone auth, or a token validation. | 17:58 |
kfox1111 | maybe I just make another api part just for the other form of auth and put a different auth handler on it hmmmm... I'm really not familior with that code at all though. :/ | 17:59 |
*** zz_dimtruck is now known as dimtruck | 18:00 | |
*** lisaclark1 has joined #openstack-barbican | 18:00 | |
*** lisaclark1 has quit IRC | 18:06 | |
woodster_ | dave-mccowan: I'll send the slides from the plugin presentation we did...after lunch if that's ok? | 18:06 |
dave-mccowan | woodster_ yes, thank you! | 18:07 |
*** david-lyle_afk is now known as david-lyle | 18:09 | |
openstackgerrit | Merged openstack/barbican: Using a central secret store manager to remove lock https://review.openstack.org/158099 | 18:13 |
*** lisaclark1 has joined #openstack-barbican | 18:20 | |
chellygel | dave-mccowan, http://slides.com/chellygel/barbican-storing-secrets#/ | 18:29 |
chellygel | :) | 18:29 |
dave-mccowan | chellygel: thanks Chelsea | 18:35 |
chellygel | of course, slides is awesome becausey ou can fork presentations | 18:37 |
chellygel | so you are welcome to kidnap whatever material you need out of there | 18:37 |
*** tkelsey has quit IRC | 18:41 | |
*** kgriffs is now known as kgriffs|afk | 18:42 | |
*** jaosorior has quit IRC | 18:51 | |
*** lisaclark1 has quit IRC | 19:26 | |
*** dave-mccowan has quit IRC | 19:30 | |
*** lisaclark1 has joined #openstack-barbican | 19:31 | |
*** lisaclark1 has quit IRC | 19:33 | |
*** lisaclark1 has joined #openstack-barbican | 19:34 | |
openstackgerrit | Merged openstack/barbican: Split override-url in functional test config file https://review.openstack.org/158132 | 19:36 |
*** openstackgerrit has quit IRC | 19:51 | |
*** openstackgerrit has joined #openstack-barbican | 19:52 | |
*** kfarr has joined #openstack-barbican | 19:54 | |
*** bdpayne has joined #openstack-barbican | 19:56 | |
*** dave-mccowan has joined #openstack-barbican | 19:58 | |
redrobot | Weekly IRC meeting is starting now in #openstack-meeting-alt | 19:59 |
*** jkf has quit IRC | 20:03 | |
*** tkelsey has joined #openstack-barbican | 20:05 | |
*** rm_work|away is now known as rm_work | 20:07 | |
*** lisaclark1 has quit IRC | 20:50 | |
*** chellygelly has joined #openstack-barbican | 20:51 | |
*** tkelsey has quit IRC | 21:00 | |
redrobot | jvrbanac reaperhulk woodster_ y'all got time for a 30-second code review? | 21:07 |
redrobot | https://review.openstack.org/#/c/158145/ | 21:07 |
reaperhulk | we're in a meeting but I'll try to look | 21:07 |
reaperhulk | redrobot: what's the experimental gate there | 21:08 |
redrobot | reaperhulk the new functional test gate... FAILURE is what I was expecting... will coordinate with tdink_ to get it fixed | 21:08 |
reaperhulk | also, why do the tests require sudo? Is it because they pip install some things? | 21:09 |
reaperhulk | I guess I could get all nitpicky here and say this should ideally use pip install --user but then you'd need to add the pip user dir to $PATH so whatever | 21:09 |
reaperhulk | lgtm | 21:09 |
redrobot | reaperhulk good question... the sudo pip install was because I didn't want to futz around with who is running what in the throwaway dsvm. As far as sudo for running the tests, I'm not sure it's necessary. I was just copy/pastaing | 21:10 |
redrobot | (hence this CR fixing the copy/pasta error) | 21:11 |
reaperhulk | pip install --user is the ideal, but it does require adding the pip user dir to the $PATH | 21:11 |
*** jkf has joined #openstack-barbican | 21:13 | |
hockeynut | redrobot for the client CR - we need a functional barbican running in that devstack so I will guess that the pre_test_hook.sh code that we have on the API side will be needed for the devstack we bring up for client functional tests | 21:14 |
redrobot | hockeynut yes indeed. It's all working already if you look at https://review.openstack.org/#/c/158145/ ... well working in the sense that Barbican server is up, and the functional test suite is executed | 21:15 |
redrobot | hockeynut would love a +2 there :) | 21:15 |
hockeynut | redrobot just did | 21:15 |
*** kgriffs|afk is now known as kgriffs | 21:21 | |
kfox1111 | ah.... keystonemiddleware has a delay_auth_decision mode. | 21:26 |
morganfainberg | kfox1111, yes | 21:27 |
morganfainberg | kfox1111, it sets a header that indicates auth passed vs not | 21:27 |
kfox1111 | it might be really easy to make a Keyserver workalike on top of barbican then. :) | 21:27 |
morganfainberg | kfox1111, ideally all openstack should move to delay_auth_decision so we can have thigns that don't need an active token to work | 21:27 |
kfox1111 | I just gota set that flag, pull out the token validation code out of the keyserver into a module, and slide it in. :) | 21:28 |
openstackgerrit | Thomas Dinkjian proposed openstack/python-barbicanclient: Adds orders behaviors and smoke tests. https://review.openstack.org/157130 | 21:32 |
openstackgerrit | Thomas Dinkjian proposed openstack/python-barbicanclient: Adds positive orders functional tests https://review.openstack.org/158454 | 21:32 |
*** kgriffs is now known as kgriffs|afk | 21:33 | |
*** lisaclark1 has joined #openstack-barbican | 21:40 | |
*** xaeth is now known as xaeth_afk | 21:40 | |
kfox1111 | is there a barbican horizon plugin yet? | 21:42 |
redrobot | kfox1111 none that I'm aware of | 21:43 |
kfox1111 | :/ | 21:43 |
kfox1111 | k. | 21:43 |
kfox1111 | so, is rackspace using barbican in production? if so, did they write their own ui? | 21:44 |
*** lisaclark1 has quit IRC | 21:44 | |
redrobot | kfox1111 we're doing a slow rollout to production. Currently in internal preview. All internal customers are using API only. | 21:45 |
redrobot | kfox1111 Rackspace doesn't run Horizon, so we'll have to provide a custom UI anyway | 21:45 |
kfox1111 | ah. ok. | 21:46 |
kfox1111 | ah. found an example of delay_auth_decision. glance uses it. | 21:48 |
kfox1111 | now to figure out what its dowing.... | 21:48 |
kfox1111 | so, what would be the best way about blocking all of the api except the get of a credential in a container? Should I just do that in the middleware with a filter? | 21:52 |
kfox1111 | can you replace the uuid of a secret/container with a name in the uri? | 21:59 |
redrobot | kfox1111 middleware could certainly block all of the api. You could also use something like http://openrepose.org/ | 22:00 |
redrobot | kfox1111 currently we require the uuid in the url. | 22:01 |
kfox1111 | I can plug openrepose into barbican's pipeline easily? | 22:01 |
alee | woodster_, don't forget my cr :) | 22:01 |
kfox1111 | so you have to make multiple api calls to say, | 22:01 |
redrobot | kfox1111 we use openrepose in front of barbican at rackspace... repose is a proxy, so clients talk to repose, then repose forwards the request to barbican | 22:02 |
kfox1111 | so, you have to know the uuid of the container, then look up the list of secrets, | 22:02 |
alee | jvrbanac, hockeynut, redrobot -- you guys too please -- https://review.openstack.org/#/c/157919/ | 22:02 |
kfox1111 | then map the secret name you want to retrieve to the secret, look that up in the returned document, then request by uuid the specific secret? | 22:02 |
redrobot | kfox1111 yes... so for Barbican we consider the entire URL the thing that describes a particular entity. So you'd need the entire URL for the certificate, but then you could follow links after that. | 22:03 |
kfox1111 | yeah... that just complicates the client side a bit. | 22:03 |
redrobot | alee trade you for a Workflow on https://review.openstack.org/#/c/158145/ | 22:03 |
kfox1111 | we wrote the keyserver to be as simple as possible to curl a secret down. | 22:03 |
kfox1111 | that way we didn't have to install anything in the vm image. | 22:03 |
hockeynut | alee I'll look at yours if you look at mine :-) https://review.openstack.org/#/c/157231/ | 22:04 |
kfox1111 | almost seems easier just to require the barbican client to be installed with that api. :/ | 22:04 |
kfox1111 | maybe it would be better to add a different api endpoint just for this purpose. | 22:05 |
*** igueths has quit IRC | 22:05 | |
kfox1111 | a curlable secret download url. you give it a /v1-vm/<containername>/<secretname> | 22:05 |
*** tkelsey has joined #openstack-barbican | 22:06 | |
kfox1111 | I could probably just have the middleware do the lookups itself, mangle the url to the right secret get request, then let it on through. | 22:07 |
*** chellygelly has quit IRC | 22:09 | |
*** igueths has joined #openstack-barbican | 22:09 | |
woodster_ | alee, checkout the sub-status CR when you can as well: https://review.openstack.org/#/c/157565/ | 22:14 |
alee | woodster_, will do | 22:16 |
kfox1111 | hmm... todo that, I'd have to either call into the repo model from the middleware directly, | 22:17 |
jvrbanac | FYI, This is me looking and some of our tests: http://i.imgur.com/yxYbIHh.gif | 22:17 |
kfox1111 | or create a new http request into barbican. :/ | 22:17 |
kfox1111 | is there a preference? | 22:17 |
kfox1111 | I guess I could call back into barbican with admin credentials... | 22:18 |
redrobot | jvrbanac lol | 22:18 |
kfox1111 | is an admin allowed to view all Containers in all Tenants? | 22:18 |
redrobot | kfox1111 I would think that a middleware would just look into the db... if you're going to forward requests, you might as well write a stand alone proxy | 22:19 |
kfox1111 | so just import barbican.model.repositories and do a repo.ContainerRepo() object. | 22:19 |
kfox1111 | ok. that should be easy enough to do. | 22:20 |
alee | redrobot, I'll take that trade .. done | 22:21 |
alee | hockeynut, I'll take that trade too -- done | 22:27 |
hockeynut | thx! | 22:28 |
*** kfarr has quit IRC | 22:32 | |
*** paul_glass has quit IRC | 22:40 | |
*** kgriffs|afk is now known as kgriffs | 22:42 | |
*** tkelsey has quit IRC | 22:46 | |
*** lisaclark1 has joined #openstack-barbican | 22:49 | |
openstackgerrit | Thomas Dinkjian proposed openstack/python-barbicanclient: Adds orders behaviors and smoke tests. https://review.openstack.org/157130 | 22:50 |
*** tkelsey has joined #openstack-barbican | 22:50 | |
*** lisaclark1 has quit IRC | 22:54 | |
woodster_ | kfox1111, you would also want to call db lifecycle methods such as per this code: https://github.com/openstack/barbican/blob/master/barbican/queue/server.py#L44 | 22:55 |
kfox1111 | hmmmm. ok. thanks. | 22:56 |
*** kebray has quit IRC | 22:56 | |
woodster_ | kfox1111, it seems to be though it would be better to manage things via the client code if at all possible...maybe to the point of just making direct calls to secrets in your container | 22:57 |
kfox1111 | client code is hard to control. | 22:58 |
*** tkelsey has quit IRC | 22:58 | |
kfox1111 | a million different little vm's. I'd rather not touch that as much as possible. | 22:58 |
kfox1111 | arg... the rpm build process needs work. :/ | 23:00 |
woodster_ | kfox1111, got it. Another issue jvrbanac has noticed is that we've been lazy initializing the db which is breaking the first few requests that arrive to the server, so he introduced a setup call such as here: https://github.com/openstack/barbican/blob/master/barbican/queue/server.py#L108 that would be good to call initially. | 23:01 |
kfox1111 | ah. ok. | 23:02 |
woodster_ | alee, fyi some comments on https://review.openstack.org/#/c/157919 now... | 23:06 |
kfox1111 | arg..... wow... the rpmbuild scripts really don't like beign in a venv... | 23:09 |
*** kebray has joined #openstack-barbican | 23:09 | |
kfox1111 | there we go... rpms. | 23:11 |
kfox1111 | hmm.... going to need some systemd scripts as well... | 23:12 |
redrobot | kfox1111 I think the in-script rpm files will be deprecated at some point. We've got an effort now to get barbican into Fedora. The repo for that is here https://github.com/gregswift/barbican-spec | 23:13 |
redrobot | kfox1111 it's a much nicer setup than what we have in barbican now | 23:13 |
kfox1111 | nice. thanks for the pointer. | 23:14 |
kfox1111 | is anyone pushing the rdo folks to get it in? :) | 23:14 |
redrobot | kfox1111 I think that's part of the plan... unfortunately Greg is afk... maybe alee has some info? | 23:15 |
kfox1111 | whats the keystone-listener do? | 23:16 |
kfox1111 | will I need to hook in there too, or is that unrelated? | 23:16 |
redrobot | kfox1111 listens to keystone events, acts accordingly. I think it cleans up the DB to remove projects that have been deleted, etc. | 23:17 |
kfox1111 | ah. ok. then I should be able to ignore it. | 23:17 |
kfox1111 | so do you copy the contents of the gregswift repo over the barbican repo? | 23:19 |
openstackgerrit | Merged openstack/python-barbicanclient: Run client functional tests https://review.openstack.org/158145 | 23:21 |
kfox1111 | yeah.. looks like it. | 23:24 |
redrobot | kfox1111 did it work? you can ping xaeth_afk when he's not afk for questions re: spec | 23:28 |
kfox1111 | no. stuck in milestone/release/whatever heck. | 23:34 |
kfox1111 | its looking for a tarball named X, and I have one called Y. :) | 23:34 |
*** igueths has quit IRC | 23:40 | |
*** ametts has quit IRC | 23:48 | |
*** jkf has quit IRC | 23:50 | |
kfox1111 | yeah.. realy not sure how these macro's play together. | 23:50 |
kfox1111 | Tried setting one, the other, or both... | 23:50 |
kfox1111 | or ignoring them and hard coding a value. the latter almost worked, but produced a bad python-barbican. no actual python code in it. :/ | 23:50 |
kfox1111 | hmm.. changing the second line to #global release_number 2 makes it go farther. still unusable result though. same as just hardcoding the value. | 23:53 |
openstackgerrit | John Vrbanac proposed openstack/barbican: Making RootController load child controller at runtime https://review.openstack.org/158496 | 23:58 |
Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!