Friday, 2014-08-22

*** richm has quit IRC00:00
*** RicoLin has joined #openstack-keystone00:10
*** ayoung-afk has quit IRC00:18
*** gokrokve has joined #openstack-keystone00:20
*** gokrokve has quit IRC00:21
*** gokrokve has joined #openstack-keystone00:22
*** gokrokve has quit IRC00:26
*** mikedillion has quit IRC00:33
*** amerine has quit IRC00:36
openstackgerritBrant Knudson proposed a change to openstack/identity-api: Fix typo and grammar issues in os-revoke-ext  https://review.openstack.org/11614400:37
*** gokrokve has joined #openstack-keystone00:39
*** ayoung has joined #openstack-keystone00:45
*** amerine has joined #openstack-keystone00:47
jamielennoxbknudson: moving httpd to warn means that everything for the python process goes to the warn level right01:00
*** harlowja is now known as harlowja_away01:00
bknudsonjamielennox: let me find a log...01:00
bknudsonjamielennox: http://logs.openstack.org/73/111573/4/check/check-tempest-dsvm-full/c5ce3bd/logs/screen-key.txt.gz01:01
bknudsonjamielennox: there's a bunch of authz_core:debug01:02
bknudsonjamielennox: looks like all the keystone logging goes to error01:02
bknudson(which is probably from stderr or stdout?)01:02
bknudsonlooks like 3/2 of the log is authz_core:debug01:03
jamielennoxyea, ok so we elevate log level to warn means we should still get the error output from keystone just not the authz_core stuff01:03
bknudsonyes, that's what happened in my env.01:03
jamielennoxthat makes sense01:04
jamielennoxfirefox keeps timing out trying to even open that file01:04
bknudsonI don't see any :warn messages in the apache log so I don't know what that includes01:04
jamielennoxwarn messages from apache probably should end up in the logs anyway01:05
bknudsonjamielennox: want me to copy-paste it into irc?01:05
jamielennoxbknudson: no that's fine01:06
jamielennoxbknudson: comment on https://review.openstack.org/#/c/116135/01:06
bknudsonjamielennox: I'm fine with keystone_error.log, although it also includes keystone debug output, so not sure if that would be confusing.01:07
jamielennoxbknudson: don't think so it's an apache error log, but i see your point01:08
bknudsonif people want their keystone logs somewhere else we can using python logging config to do it.01:08
bknudson(and maybe that would be a better way to do keystone logging anyways)01:08
*** dims has quit IRC01:09
jamielennoxprobably should do something like that01:09
jamielennoxbknudson: hey, i'm somewhat stuck on something - do you have any idea how we can uniquely identity a plugin01:12
jamielennoxi need to replicate --os-cache with auth plugins01:13
jamielennoxi have a review that lets us serialize a plugin01:13
jamielennoxi feel there should be a way to determine like a fingerprint for a keyring key value without having to implement a new method on all the plugins01:14
*** dims has joined #openstack-keystone01:17
*** marcoemorais has quit IRC01:18
*** diegows has quit IRC01:26
*** harlowja_away is now known as harlowja01:40
*** gokrokve has quit IRC01:49
*** KanagarajM2 has quit IRC01:54
*** yasukun has joined #openstack-keystone01:58
*** topol has joined #openstack-keystone02:01
bknudsonjamielennox: not something I'm familiar with.02:11
bknudsonmaybe base it off of the plugin properties?02:12
jamielennoxbknudson: i was hoping i could just do it off the auth_request02:13
*** hrybacki has quit IRC02:13
jamielennoxunfortunately in v3 you pass a session to that method02:13
jamielennoxi was thinking maybe it could be based on the properties that are used to construct the object from conf or cli02:14
jamielennoxbut that's a classmethod that constructs the object02:14
jamielennoxtrying not to need a new method that returns all the properties02:15
bknudsondir() returns the properties02:15
jamielennoxbknudson: yea i think it will need to be more controlled than that02:22
*** stevemar has joined #openstack-keystone02:32
*** dims has quit IRC02:34
*** rushiagr_away is now known as rushiagr02:37
openstackgerritA change was merged to openstack/identity-api: Fix typo and grammar issues in os-revoke-ext  https://review.openstack.org/11614402:42
*** wanghong has joined #openstack-keystone02:42
*** harlowja is now known as harlowja_away02:49
*** KanagarajM has joined #openstack-keystone02:51
morganfainberghmm.02:52
morganfainbergwhy is it that when evening comes my brain feels like there is less of a fog :P02:52
morganfainbergand it's easier to write code.02:52
*** jim33 has joined #openstack-keystone03:03
jim33does anyone have a few mins? i have trouble tryin to authenticate03:04
*** ayoung has quit IRC03:10
*** ayoung has joined #openstack-keystone03:11
*** amerine has quit IRC03:13
*** jim33 has quit IRC03:14
*** hrybacki has joined #openstack-keystone03:17
*** hrybacki has quit IRC03:17
*** hrybacki has joined #openstack-keystone03:17
*** hrybacki has quit IRC03:18
*** ayoung has quit IRC03:18
*** hrybacki has joined #openstack-keystone03:18
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Updated from global requirements  https://review.openstack.org/11162003:23
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/11616503:23
*** hrybacki has quit IRC03:23
*** gyee has quit IRC03:24
*** hrybacki has joined #openstack-keystone03:32
*** dims has joined #openstack-keystone03:35
*** dims has quit IRC03:39
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Add CADF notifications for role assignment create and delete  https://review.openstack.org/11220403:45
*** topol has quit IRC04:00
*** amerine has joined #openstack-keystone04:10
*** praneshp has quit IRC04:10
*** amerine has quit IRC04:14
*** wanghong has quit IRC04:29
*** dims has joined #openstack-keystone04:36
*** dims has quit IRC04:41
*** gokrokve has joined #openstack-keystone04:47
*** praneshp has joined #openstack-keystone04:52
*** praneshp has quit IRC04:57
*** amerine has joined #openstack-keystone05:00
*** shakamunyi has quit IRC05:03
*** amerine has quit IRC05:05
*** praneshp has joined #openstack-keystone05:05
*** rushiagr is now known as rushiagr_away05:21
*** ncoghlan has joined #openstack-keystone05:22
*** rushiagr_away is now known as rushiagr05:29
openstackgerritSteve Martinelli proposed a change to openstack/identity-api: Update revoke-ext  https://review.openstack.org/11485705:29
*** ukalifon1 has joined #openstack-keystone05:39
*** rushiagr is now known as rushiagr_away05:40
*** harlowja_away has quit IRC05:44
*** ukalifon1 has quit IRC05:47
openstackgerritA change was merged to openstack/identity-api: Update revoke-ext  https://review.openstack.org/11485705:50
*** gokrokve has quit IRC05:54
*** amerine has joined #openstack-keystone06:01
*** amerine has quit IRC06:05
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/11192006:07
*** chandankumar has joined #openstack-keystone06:09
*** henrynash has joined #openstack-keystone06:14
*** stevemar has quit IRC06:20
*** ajayaa has joined #openstack-keystone06:22
*** dims has joined #openstack-keystone06:25
*** Jean-Daniel has joined #openstack-keystone06:28
*** shakamunyi has joined #openstack-keystone06:29
*** dims has quit IRC06:30
*** wanghong has joined #openstack-keystone06:31
*** shakamunyi has quit IRC06:34
*** rushiagr_away is now known as rushiagr06:34
*** k4n0 has joined #openstack-keystone06:35
openstackgerritMarcos Fermín Lobo proposed a change to openstack/python-keystoneclient: Attributes required using token for auth  https://review.openstack.org/11522806:39
*** ncoghlan is now known as ncoghlan_afk06:42
*** afazekas has joined #openstack-keystone06:48
*** gokrokve has joined #openstack-keystone06:48
*** hrybacki has quit IRC06:49
*** amirosh has joined #openstack-keystone06:52
*** gokrokve has quit IRC06:53
*** ncoghlan_afk is now known as ncoghlan06:55
*** praneshp has quit IRC06:55
*** amerine has joined #openstack-keystone07:02
openstackgerritA change was merged to openstack/python-keystoneclient: Allow unauthenticated discovery  https://review.openstack.org/10757007:04
openstackgerritA change was merged to openstack/keystone: Add audit ids to tokens  https://review.openstack.org/11430607:04
openstackgerritA change was merged to openstack/keystone: Sync with oslo-incubator  https://review.openstack.org/11486307:04
openstackgerritA change was merged to openstack/keystone: Convert to urlsafe base64 audit ids  https://review.openstack.org/11570707:05
*** amerine has quit IRC07:06
*** ajayaa has quit IRC07:45
*** ajayaa has joined #openstack-keystone07:48
*** gokrokve has joined #openstack-keystone07:49
*** gokrokve has quit IRC07:53
*** wanghong has quit IRC08:01
*** wanghong has joined #openstack-keystone08:02
*** sunrenjie6 has joined #openstack-keystone08:02
*** amerine has joined #openstack-keystone08:02
*** amerine has quit IRC08:07
*** dims has joined #openstack-keystone08:14
*** dims has quit IRC08:19
*** chandankumar has quit IRC08:19
*** BAKfr has joined #openstack-keystone08:24
*** jamielennox is now known as jamielennox|away08:29
*** ncoghlan has quit IRC08:30
*** gokrokve has joined #openstack-keystone08:48
*** gokrokve has quit IRC08:53
*** amerine has joined #openstack-keystone09:03
*** amerine has quit IRC09:08
*** Kui has joined #openstack-keystone09:10
*** aix has joined #openstack-keystone09:14
*** alex_xu has joined #openstack-keystone09:16
*** henrynash has quit IRC09:22
*** chandankumar has joined #openstack-keystone09:25
*** sunrenjie6 has quit IRC09:39
*** kwss has joined #openstack-keystone09:42
*** gokrokve has joined #openstack-keystone09:48
*** gokrokve has quit IRC09:53
*** dims has joined #openstack-keystone09:59
*** amerine has joined #openstack-keystone10:04
*** dims has quit IRC10:05
*** amerine has quit IRC10:09
*** diegows has joined #openstack-keystone10:19
openstackgerritMarcos Fermín Lobo proposed a change to openstack/keystone: Implement validation on the Catalog V3 resources  https://review.openstack.org/9626610:20
*** ajayaa has quit IRC10:34
openstackgerritKanagaraj Manickam proposed a change to openstack/keystone: Endpoint table is missing reference to region table  https://review.openstack.org/11318310:46
*** gokrokve has joined #openstack-keystone10:48
*** ajayaa has joined #openstack-keystone10:51
*** diegows has quit IRC10:51
*** gokrokve has quit IRC10:53
*** dimsum_ has joined #openstack-keystone10:59
*** alex_xu has quit IRC11:07
*** dims_ has joined #openstack-keystone11:09
*** dimsum_ has quit IRC11:11
*** KanagarajM has quit IRC11:21
openstackgerritYaguang Tang proposed a change to openstack/keystone: Fix Unicode decode error with Windows AD as identity backend  https://review.openstack.org/11623111:23
openstackgerritMarcos Fermín Lobo proposed a change to openstack/keystone: Add information regarding HTTPS for SSL enabled endpoints  https://review.openstack.org/9554511:23
*** gokrokve has joined #openstack-keystone11:48
*** gokrokve has quit IRC11:53
openstackgerritMarek Denis proposed a change to openstack/keystone: IdP SAML Metadata generator  https://review.openstack.org/11485011:57
openstackgerritMarek Denis proposed a change to openstack/keystone: Transform a Keystone token to a SAML assertion  https://review.openstack.org/11054211:57
*** amirosh has quit IRC12:03
*** amirosh has joined #openstack-keystone12:04
*** amerine has joined #openstack-keystone12:06
*** amirosh has quit IRC12:08
*** amerine has quit IRC12:11
*** yasukun has quit IRC12:12
openstackgerritMarek Denis proposed a change to openstack/keystone: Generate IdP Metadata with keystone-manage.  https://review.openstack.org/11556412:19
openstackgerritMarek Denis proposed a change to openstack/keystone: Routes for Keystone-IdP metadata endpoint.  https://review.openstack.org/11588312:22
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Updated from global requirements  https://review.openstack.org/11162012:28
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystonemiddleware: Updated from global requirements  https://review.openstack.org/11616512:28
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone-specs: Updated from global requirements  https://review.openstack.org/11624512:28
*** jdennis has quit IRC12:30
openstackgerritOpenStack Proposal Bot proposed a change to openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/11625512:34
*** alex_xu has joined #openstack-keystone12:34
*** jdennis has joined #openstack-keystone12:36
*** ajayaa has quit IRC12:40
*** gokrokve has joined #openstack-keystone12:48
*** rushiagr is now known as rushiagr_away12:51
*** gokrokve has quit IRC12:53
*** gordc has joined #openstack-keystone12:57
*** dims_ has quit IRC13:07
*** dimsum_ has joined #openstack-keystone13:08
*** richm has joined #openstack-keystone13:10
dstaneklbragstad: you around?13:11
*** joesavak has quit IRC13:12
BAKfrIs there someone who can give me information about the delete_grant method in assignment/core.py ?13:12
*** _elmiko is now known as elmiko13:12
BAKfrWhen we revoke a role on a specific project, all tokens of concerned users are revoked.13:13
BAKfrIs there a reason it doesn't revoke only tokens associated to the project ?13:14
lbragstaddstanek: yes13:15
*** nkinder has quit IRC13:19
openstackgerritRodrigo Duarte proposed a change to openstack/keystone: Create, update and delete hierarchical projects  https://review.openstack.org/11184213:24
*** bknudson has quit IRC13:24
lbragstaddstanek: what's up?13:25
marekdorsonmmz: in order to setup my devstack with a review patch i shall set KEYSTONE_REPO=https://review.openstack.org/openstack/keystone and KEYSTONE_BRANCH=refs/changes/83/115883/3 or some other way?13:30
*** amirosh has joined #openstack-keystone13:31
*** jasondotstar has joined #openstack-keystone13:37
*** zzzeek has joined #openstack-keystone13:44
*** bknudson has joined #openstack-keystone13:48
*** gokrokve has joined #openstack-keystone13:48
*** gokrokve has quit IRC13:52
*** russellb is now known as rustlebee13:54
*** k4n0 has quit IRC13:55
*** alex_xu has quit IRC14:06
*** nkinder has joined #openstack-keystone14:07
*** stevemar has joined #openstack-keystone14:09
*** oomichi has quit IRC14:11
*** david-lyle has joined #openstack-keystone14:19
*** amirosh has quit IRC14:30
*** amirosh has joined #openstack-keystone14:31
*** amirosh has quit IRC14:35
*** chandankumar has quit IRC14:36
*** ayoung has joined #openstack-keystone14:43
*** gokrokve has joined #openstack-keystone14:48
*** rushiagr_away is now known as rushiagr14:49
openstackgerritRodrigo Duarte proposed a change to openstack/keystone: Create, update and delete hierarchical projects  https://review.openstack.org/11184214:50
*** bknudson has quit IRC14:52
*** gokrokve has quit IRC14:53
*** mflobo has quit IRC14:58
gabriel-bezerraHi. Can Keystone use replicated (for load balancing) LDAPs as backend?15:00
gabriel-bezerramore specifically, identity backend15:00
*** gokrokve has joined #openstack-keystone15:12
*** maelfius has joined #openstack-keystone15:12
*** morganfainberg has quit IRC15:14
*** maelfius is now known as morganfainberg15:14
*** henrynash has joined #openstack-keystone15:21
*** cjellick has quit IRC15:24
*** shakamunyi has joined #openstack-keystone15:24
*** cjellick_ has joined #openstack-keystone15:24
*** cjellick has joined #openstack-keystone15:24
marekddevstack runs with apache automatically or apache needs some configuration prior to runnin ./stack.sh ?15:27
richmmarekd: Do you mean, running keystone using apache mod_wsgi?15:31
*** amirosh has joined #openstack-keystone15:31
marekdrichm: yeah15:31
marekdrichm: actually i don't need it at the moment.15:32
richmmarekd: I'm not sure, but I doubt it, unless ayoung has already added that to devstack15:32
*** amirosh has quit IRC15:32
marekdayoung: does devstack currently run keystone w/ apache by default?15:33
richmmarekd: I'm working on adding support for puppet based installs (packstack, astapor, etc.) to automatically set up keystone to use mod_wsgi15:33
richmbut I don't know about devstack15:33
*** amirosh has joined #openstack-keystone15:33
ayoungmarekd, you give me credit for other people's work15:34
ayoungtwas morganfainberg that did the devstack to httpd15:34
marekdayoung: richm did that credit.15:35
ayoungah...misread15:35
ayoungmarekd, need to chat with you about WebSSO15:35
morganfainbergrichm, marekd, all gate checks (except postgres) use mod_Wsgi now15:35
richmmorganfainberg: Thanks15:36
marekdmorganfainberg: uhm.15:36
marekdayoung: websso will be a Kilo story i think...but fireaway.15:36
*** bknudson has joined #openstack-keystone15:36
*** amirosh has quit IRC15:37
ayoungmarekd, yeah, but it will also take a lot of collaboration between us and Horizon, so we need to start talking now.15:38
ayoungmarekd, I've been in Kilo mindset since J215:38
marekdayoung: ++15:38
ayoungmarekd, https://keystone.younglogic.net/keystone/cops/15:38
morganfainbergdolphm, rekicked https://review.openstack.org/#/c/115941/ so we can get dstanek's changes for catalog through w/o HASHSEED getting in the way15:39
ayoungits a straight javascript client for Keystone.15:39
marekdayoung: i think i see what you want to say now.15:39
ayoungmarekd, a demo is worth 1000 meetings15:40
*** praneshp has joined #openstack-keystone15:40
marekdayoung: +10015:40
marekdayoung: so you want to have a saml client implemented in JS15:41
ayoungmarekd, I have it linked up to LDAP as well, but the server seems to be down at the moment.  I need to troubleshoot15:41
ayoungmarekd, so the flow would be like this:15:41
*** shakamunyi has quit IRC15:41
ayounghit horizon.  Javascript lets user select auth mechanism.   kicks off an AJAX call to Keystone15:42
ayoungSo if we do SAML, that handshake would be between Horizon and the SAML provider, with the Javascript sending the SAML to Keystone.  I think15:42
ayoungthat is assuming that the SAML provider does some sort of visual web login15:42
ayoungKeystone is assumed to be non-visual/AJAX only15:43
*** bklei has joined #openstack-keystone15:43
ayoungIt would require CORS support, which is, I think, the only change we need to make to Keystone itself, and could  be done as an optional middleware component. I think that CORS would then be  based on the Service catalog15:44
marekdayoung: you are again trying to start federated autn workflow with horizon and end wih keystone.15:44
*** bklei has left #openstack-keystone15:44
marekdi'd say: hit horizon, choose 'federation authn', and js client is smart enough to go and initiate federation authn wokflow with keystone.15:45
marekdit let's shibboleth redirect to the IdP, authenticate (with graphical ui), keystone returns a token + headers and JS is again clevel enough to return with that to horizon.15:46
marekdunscoped token is fine for horizon to let user in, right?15:46
ayoungmarekd, there are some business use cases to consider, but basically, yes15:46
ayoungthe difference between CERN and Rackspace, for example15:46
marekdayoung: you mena?15:46
ayoungCERN can prepopulate the list of IdPs15:46
marekdmean15:46
ayoungRacksapce doesn't want to publish their customer list...15:47
marekdayoung: true.15:47
ayoungSo the Rackspace case, the user should probably enter the IdP url themselves, or let Rackspace figure out what to show to whom15:47
marekdwe need to keep in mind one big federation with 100s of IdP inside and 100s of one Idp 'federations'.15:47
marekdayoung: it's still horizon level15:48
ayoungfortunately, tuning that in Javascript is pretty lightweight.  Question is how to communicate that between Horiozn and Keystone15:48
*** gokrokve_ has joined #openstack-keystone15:48
ayoungHorizon should have a single URL for Keystone.  The Horizon service user should be able to query the specific info it needs from Keystone via that URL15:49
marekdayoung: it's easy in Keystone - today you must specify IdP of your choice (v3/OS-FEDERATION/identity_providers/{IDP}/protocols/{protocol}/auth)15:49
ayoungmarekd, I'd put in a few caveats: Horizon should be able to propopulate the IdP and protocol based on a cookie for an unauthenticated user15:50
ayoungbut not carte-blanc15:50
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Mark methods on token_api deprecated  https://review.openstack.org/11534715:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove trust dependency on token_api  https://review.openstack.org/10946215:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Revoke by Audit Id / Audit Id Chain instead of expires  https://review.openstack.org/11486415:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Update AuthContextMiddleware to not use token_api  https://review.openstack.org/11342915:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Notification Constant Cleanup and internal notify type  https://review.openstack.org/11533715:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove assignment_api dependency on token_api  https://review.openstack.org/11533815:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove wsgi and base controller dependency on token_api  https://review.openstack.org/11520515:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove identity_api dependency on token_api  https://review.openstack.org/11504515:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove oauth controller dependency on token_api  https://review.openstack.org/11534315:51
marekdayoung: and this cookie you would get from...?15:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Remove SAML2 plugin dependency on token_api  https://review.openstack.org/11501215:51
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add __repr__ to KeystoneToken model  https://review.openstack.org/11343015:51
ayoungmarekd, its a cookie, and thus should only be set and readable from Horizon15:51
ayoungits fro second and additional logins15:51
ayoungfor15:51
*** gokrokve has quit IRC15:51
ayoungbut enumerating Protocols for the same IdP is probably OK15:51
marekdayoung: yes.15:52
ayoungso if you've already logged in from Cern, but Via X509, its ok to show you the list of protocols available to CERN users, for example15:52
ayoungthis is in the weeds, just to give some context15:52
*** afazekas has quit IRC15:53
*** gokrokve_ has quit IRC15:53
openstackgerritMorgan Fainberg proposed a change to openstack/keystone: Add extra guarding to revoke_by_audit_id methods  https://review.openstack.org/11514715:53
marekdayoung: let's get back to the workdlow. say, i want websso and will use my cern user/pass credentials against my local IdP. I will hit horizon, choose 'federation authn' option and then specify my IdP ("CERN").15:54
marekdayoung: you want horizon to return a list of protocols I can use?15:55
ayoungyep15:55
ayoungmarekd, lets punt on that for now15:55
ayoungI'd say it would  be a potential feature in the future15:55
marekdayoung: you w'd be able to  bruteforce and guess RAX's clients by checking random (or less random) IdP names.15:56
marekdayoung: but that's fine for me :P15:56
ayoungmarekd, actually, no.  There would be no indication that the IdP is actually valid15:57
ayounghmmm...need to think that one through15:57
ayoungwe should probably say OK  to any request against15:58
ayoungv3/OS-FEDERATION/identity_providers/{IDP}/protocols/{protocol}/auth15:58
*** KanagarajM has joined #openstack-keystone15:58
ayoungand just let the IdP say "403"15:58
ayoungor 401 or whatever is appropriate15:58
marekdayoung: wait a sec....15:59
ayoungactually, since IdP ID is a uuid, we should be OK15:59
marekdIdP id in keystone backend is a string...16:00
marekdcustom string.16:00
ayoungmarekd, yeah, there are going to be some security concerns there, but I suspect we won't solve them right here and now16:01
*** ayoung is now known as ayoung-lunch16:04
ayoung-lunchmarekd, gotta run, back in a few16:05
*** kwss has quit IRC16:05
marekdayoung-lunch: bin app.16:07
*** amerine has joined #openstack-keystone16:08
marekdayoung-lunch: so basically I will have it checked next week, but in the websso there is somthing like DS (discovery service). From the user perspective it's usually a website where user chooses the IdP he wants to use. It can be either a list of IdP (say they are all in one federation agreement) or we can also provide a website where User needs to specify his IdP. But that's the SP/DS level.16:09
marekdgotta run too.16:11
*** marekd is now known as marekd|away16:11
marekd|awaymorganfainberg: what linux distro are you usually using for running devstack locally ?16:12
morganfainbergmarekd|away, ubuntu16:12
marekd|awaylts?16:12
morganfainbergyeah trusty now16:12
morganfainbergpreviously precise16:12
marekd|awayok thank?16:13
marekd|awaythanks16:13
*** bklei has joined #openstack-keystone16:22
*** bklei_ has joined #openstack-keystone16:23
*** bklei_ has left #openstack-keystone16:24
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Create SAML generation route and controller  https://review.openstack.org/11413816:26
*** BAKfr has quit IRC16:27
*** bklei has quit IRC16:28
*** amerine has quit IRC16:29
*** packet has joined #openstack-keystone16:30
*** rushiagr is now known as rushiagr_away16:31
*** chandankumar has joined #openstack-keystone16:32
*** openstackgerrit has quit IRC16:34
*** gokrokve has joined #openstack-keystone16:38
*** amerine has joined #openstack-keystone16:41
stevemarbknudson, dstanek, i think this one is ready now: https://review.openstack.org/#/c/112204/16:45
*** amirosh has joined #openstack-keystone16:45
stevemarif role_assignment notifications and kristys refactoring of saml auth both go in today, topol is going to have to do a ton of rebasing, it's going to be awesome16:46
*** bknudson has quit IRC16:54
*** topol has joined #openstack-keystone17:01
*** comstud is now known as bearhands17:02
*** amirosh has quit IRC17:06
*** amirosh has joined #openstack-keystone17:07
*** amirosh has quit IRC17:11
*** gyee has joined #openstack-keystone17:20
*** packet has quit IRC17:22
*** dimsum_ has quit IRC17:24
*** dimsum_ has joined #openstack-keystone17:25
dstanekstevemar: nice, was lunching - I'll take a look17:25
stevemardstanek, cool, just finished up lunch myself17:26
gyeehenrynash, sorry, missed your ping yesterday17:28
*** openstackgerrit has joined #openstack-keystone17:29
*** dimsum_ has quit IRC17:29
*** harlowja has joined #openstack-keystone17:36
nkinderif anyone has a few spare minutes, we have a keystone related OSSN that we would like a review on - https://review.openstack.org/#/c/114971/17:40
*** packet has joined #openstack-keystone17:50
*** packet has quit IRC17:55
*** bknudson has joined #openstack-keystone17:58
*** amirosh has joined #openstack-keystone18:00
gabriel-bezerraHello. Is it currently possible to configure Keystone to use load balancing replicated LDAPs as identity backend?18:09
henrynashgyee: np, I think we worked it out (was just asking about how people used regions & endpoints)18:10
henrynashgabriel-bezerra: so keystone itself doesn’t do that, but I know of customers who out an haproxy in front of their LDAP cluster of servers and give keystone the url of the proxy18:11
gabriel-bezerrahenrynash: do you think it would be valuable/feasible to implement such feature in Keystone? Or is the haproxy a better approach anyway?18:21
henrynashgabriel-bezerra: I guess I’d want to understand what advantage it would be to support this in keystone directly…would it have better perfomance, or functionality, or debugging…or something to warant duplcation of existing functionality18:22
gyeehenrynash, JNDI supports multiple LDAP hosts18:24
gyeebut yeah, talking to a VIP would work too18:24
gyeehenrynash, btw, I think the user_id map in LDAP is currently broken18:25
*** dimsum_ has joined #openstack-keystone18:25
openstackgerrithenry-nash proposed a change to openstack/identity-api: Change location of OS-ENDPOINT-POLICY name in API urls.  https://review.openstack.org/11635818:26
henrynashgyee: user_id map is broekn?18:27
dstanekstevemar: do you still have the pastie of the JSON output?18:27
stevemardstanek, hmmmmm18:27
*** chandankumar has quit IRC18:28
stevemardstanek, https://gist.github.com/stevemart/c5f52d0592ca6944b3a2 ?18:28
gyeehenrynash, yeah, looks like this one no longer works https://github.com/openstack/keystone/blob/master/etc/keystone.conf.sample#L88318:28
gyeealways map to cn18:28
gyeeI am still digging18:29
*** dimsum_ has quit IRC18:30
henrynashgyee: so remember with mapping, what that means is that the ID of the user you will see published by keystone will not be ‘cn’ (it will be a hash), but this shoudl still be mapped to ‘cn'18:30
henrynashgyee: under teh covers18:31
gyeehenrynash, we are testing against OpenLDAP, user_id_attribute = uid, user_name_attribute = cn18:32
dstanekstevemar: (maybe a question for topol) should the action be more specific like 'create:assignment' vs. just 'create' ?18:32
gyeebut GET /v3/users have cn in both 'id' and 'name' field18:32
stevemardstanek, action has a very limited set of valid values18:32
gyeeI haven't had a chance to look at the latest code yet, just from observation so far18:33
dstanekstevemar: ah, ok. i thought the spec had some "namespaced" values in there18:33
stevemardstanek, naw https://github.com/openstack/pycadf/blob/master/pycadf/cadftaxonomy.py#L22-L5718:33
stevemardstanek, i was thinking allow/deny/revoke, but i settled on create, since a role assignment is created18:34
dstanekstevemar: that only has to start with those values18:34
dstanekstevemar: so 'create:assignment' would pass the check18:34
dstanekstevemar: https://github.com/openstack/pycadf/blob/master/pycadf/cadftaxonomy.py#L6218:35
stevemarreally.... i thought i had it as 'create.assignment' and it was failing18:35
stevemarlet me try18:36
*** amirosh has quit IRC18:38
*** amirosh has joined #openstack-keystone18:39
henrynashis this teh default domain?18:39
henrynashgyee: is this the default domain?18:39
*** RicoLin has quit IRC18:39
dstanekstevemar: no idea if it's valuable, but someone may want to query for all assignments18:41
dstanekstevemar: looking at the record in the gist i can't tell what the event type is18:41
stevemardstanek, are you cool with 'create.assignment'18:43
*** amirosh has quit IRC18:43
dstanekstevemar: absolutely18:43
gyeehenrynash, yes, this is not a per-domain backend setup18:43
stevemardstanek, one more q18:43
stevemardstanek, you know how in the manager, it's called: notifications.role_assignment('created')18:43
stevemaris there anyway to pull out "role_assignment" ?18:43
gabriel-bezerragyee: What do you mean when you say JNDI supports multiple LDAP hosts?18:44
henrynashgyee: by default it is runs in “backward compatible” mode…which mean we don’t sue mapping for the default domain18:44
henrynashgyee: there’s a config switch to disable backward compatibility mode..18:44
bknudsongyee is proposing to rewrite keystone in java.18:44
gyeehenrynash, k, we may have a bug then18:44
dstanekstevemar: just make it a clas variable so there's no magic18:44
stevemardstanek, fair enough18:44
gyeegabriel-bezerra, with JNDI, you can specify multiple LDAP hosts in the url18:45
dstanekstevemar: since the name role_assignment is actually just a label from a class and not the class name it's hard to get at the name18:45
henrynashgyee: identity_mapping.backward_compatible_ids18:45
gyeeit will do the round robin dance when talking to LDAP servers18:45
dstanekstevemar: the only way i can think of right now it go up in the stack frames and that's no good18:45
stevemaryeah, no good18:46
gyeehenrynash, I need to specify the mapping there?18:46
stevemarrole_assignment it is then, create.role_assignment18:46
*** diegows has joined #openstack-keystone18:46
henrynashgyee: that’s a boolean…set it to Fales and mapping will happen for teh default domain as well18:46
gyeebknudson, no, in erlang for performance :D18:46
henrynashgyee: false, even18:46
dstanekstevemar: crazy garbage like - https://github.com/dstanek/snake-guice/blob/master/snakeguice/decorators.py#L6118:46
bknudsongyee: then we could upgrades without even shutting down18:47
* stevemar runs away scared18:47
gyeeheh18:47
*** hrybacki has joined #openstack-keystone18:48
*** henrynash has quit IRC18:49
gabriel-bezerragyee: that is what I was asking if keystone could do18:52
gabriel-bezerraI know that shibboleth can18:52
gyeedon't think python-ldap supports that, but I could be wrong though18:54
*** hrybacki has quit IRC18:55
*** radez_g0n3 is now known as radez18:57
*** nkinder has quit IRC19:01
*** dimsum_ has joined #openstack-keystone19:02
*** KanagarajM has quit IRC19:03
gabriel-bezerraok. thanks gyee and henrynash19:04
openstackgerritSteve Martinelli proposed a change to openstack/keystone: Add CADF notifications for role assignment create and delete  https://review.openstack.org/11220419:05
stevemardstanek, donezo!19:05
bknudsonstevemar: http://www.urbandictionary.com/define.php?term=donezo19:06
stevemarbknudson, you know it, surprised i spelled it correctly19:07
stevemarcorrect enough for urban dictionary anyway19:07
bknudsonstevemar: which definition were you using?19:07
stevemarbknudson, #119:07
stevemari'm being confident here, claiming that my patch is done, and it'll land19:08
bknudsonI was hoping it was one of the other ones19:08
stevemar#7 would be an interesting thing to proclaim on IRC19:08
bknudsonstevemar: I didn't know if the OUTCOME_PENDING notification was required for CADF?19:09
bknudsonis it an optional thing that you would typically skip it?19:10
stevemarbknudson, http://paste.openstack.org/show/98868/19:13
stevemarseems like it's supposed to be for long running processes19:13
bknudsonok, just wanted to make sure it wasn't a CADF requirement.19:14
praneshphenrynnash yt?19:17
praneshpmorganfainberg: bknudson can one of you point me on how to insert a user into multiple roles in a tenant?19:18
praneshpsomething similar to https://github.com/openstack/keystone/commit/ec995b33763f99755e8512e0e0aa497c01e37449#diff-d6550cfbcb5b15b775973fd8fd58bd05R28919:18
ayoung-lunchstevemar, morganfainberg can I get a second +2 here?  This is the KC mirror of the patch for auth_token  that went into keystonemiddleware already19:23
ayoung-lunchhttps://review.openstack.org/#/c/114654/19:23
*** radez is now known as radez_g0n319:27
*** hrybacki has joined #openstack-keystone19:35
*** morganfainberg is now known as morganfainberg_Z19:35
gabriel-bezerragyee, bknudson: it seems to be possible https://mail.python.org/pipermail/python-ldap/2014q2/003370.html19:36
bknudsongabriel-bezerra: the C api supports it, so the python api should also... I think most deployments would prefer a load balancer.19:38
gabriel-bezerrafor more control of how to balance?19:40
bknudsongabriel-bezerra: yes19:41
gabriel-bezerrasounds reasonable :) Thanks19:43
*** vhoward has left #openstack-keystone19:45
praneshpgyee: ping19:48
*** hrybacki has quit IRC19:49
*** henrynash has joined #openstack-keystone19:51
gyeepraneshp, here19:55
*** ayoung-lunch is now known as ayoung19:56
gyeegabriel-bezerra, nice!19:56
praneshpgyee I’ve been looking at the keystone patch taht changed UserProjectGrant, etc19:56
praneshphttps://github.com/openstack/keystone/commit/ec995b33763f99755e8512e0e0aa497c01e37449#diff-d6550cfbcb5b15b775973fd8fd58bd05R28919:56
praneshpI want to add a user to several roles in a tenant19:57
gyeek19:57
praneshpearlier, the call i used to make was something like #                    session.add(UserProjectGrant(user_id=user_id,19:57
praneshp#                                                 project_id=project_id,19:57
praneshp#                                                 data=rec['data']))19:57
praneshpsorry19:58
praneshpsession.add(UserProjectGrant(user_id=user_id, project_id=project_id, data=rec['data']))19:58
praneshpwhere rec[‘data’][‘roles’] contained the list of roles to add to19:58
praneshpI was wondering what the equivalent in the new way is19:58
praneshpi understand this is a very specific questin though, henry nash left the room before i got in19:59
praneshphey henrynash  I see you’re back :)19:59
gyee:), henrynahs's the person you are after19:59
praneshphenrynash: ping. ypu’re  probably  the best person to answer ^^19:59
gyeecan you even do that, adding several roles at a time?20:01
ayoungpraneshp, I think you are OK doing that still20:03
praneshpayoung: ah really? let me try. I tried to pas roles as a list, which is actually not the same as what was being done bfore20:03
ayoungpraneshp, not sure if you can pass multiple roles at once20:04
ayoungpraneshp, lets see...the underlying call is20:04
praneshpayoung: hmmm. so the right way to do this now owuld be loop over each role and call  this?20:05
praneshp                    session.add(RoleAssignment( type=AssignmentType.USER_PROJECT, actor_id=user_id, target_id=project_id, role_id=role, inherited=False))20:05
ayounghttps://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3.md#grant-role-to-user-on-domain-put-domainsdomain_idusersuser_idrolesrole_id20:06
ayoungthat is for domain, but project is the same20:06
gyeeayoung, API allows one at a time20:06
ayounghttps://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3.md#grant-role-to-user-on-project-put-projectsproject_idusersuser_idrolesrole_id20:06
ayoungpraneshp, yes.20:06
praneshpayoung:  great, thanks!20:06
ayoungpraneshp, just remember:  Try it your self.  I lie.  I make things up.20:07
praneshpayoung: of course20:07
praneshpthanks ayoung gyee20:08
*** marcoemorais has joined #openstack-keystone20:09
*** topol has quit IRC20:12
*** rwsu has quit IRC20:13
*** fifieldt has quit IRC20:23
openstackgerritwerner mendizabal proposed a change to openstack/keystone: Set revoke_api attribute to None on provider object  https://review.openstack.org/11637420:24
*** rushiagr_away is now known as rushiagr20:27
*** gyee has quit IRC20:28
*** vhoward has joined #openstack-keystone20:32
*** gyee has joined #openstack-keystone20:35
*** fifieldt has joined #openstack-keystone20:36
*** Haneef_ has joined #openstack-keystone20:41
Haneef_ayoung:  Question on ldap mapping.  Why do we ignore user_id mapping from keystone.conf and always take the id from dn?20:42
ayoungHaneef_, I give up.  Why?20:42
Haneef_I don't know know. Is there a reason for doing so.20:43
ayoungHaneef_, the behavior changes whether you do filtered queries or not20:44
ayoungthe assumption origianlly was that the users would all be in a single container, with userid being the first segment of the DN20:44
ayoungthen someone wanted filtered queries20:44
ayoungevolution20:44
bknudsonI think it depends on the scope... if it's set to onelevel or subtree ?20:45
ayoungor,  another way to put it, sometimes I make bad assumptions20:45
ayoungyep20:45
*** henrynash has quit IRC20:45
ayoungsubtree does an attribute query20:45
ayoungconverting user id to DN should be possible without going to the server20:46
ayoungso its much more efficient20:46
Haneef_I'm taking about the other way.  Since it takes the first attribute, which is not what I want as id attribute20:46
Haneef_ldap result to rest model20:47
ayoungthen switch to subtree20:47
ayoungHaneef_, it ain't the greatest.  I'm willing to entertain alternatives20:48
gyeethis? https://github.com/openstack/keystone/blob/master/etc/keystone.conf.sample#L85120:51
gyeeone to sub20:51
*** meera has joined #openstack-keystone20:51
ayounggyee, yep20:52
ayoungThe LDAP mapping sucks.  Whoever wrote it should be fired.20:52
gyeehahahah20:53
gyeelmao20:53
*** stevemar has quit IRC20:56
*** nkinder has joined #openstack-keystone21:11
*** dimsum_ has quit IRC21:17
*** dimsum_ has joined #openstack-keystone21:18
*** rushiagr is now known as rushiagr_away21:20
*** dimsum_ has quit IRC21:22
*** rushiagr_away is now known as rushiagr21:33
*** rushiagr is now known as rushiagr_away21:36
openstackgerritwerner mendizabal proposed a change to openstack/keystone: Set revoke_api attribute to None on provider object  https://review.openstack.org/11637421:44
*** jasondotstar has quit IRC21:48
*** meera has quit IRC21:52
*** wwriverrat has joined #openstack-keystone21:53
*** gordc has quit IRC21:55
*** wwriverrat has quit IRC22:00
*** henrynash has joined #openstack-keystone22:03
*** elmiko is now known as _elmiko22:11
bambam1hello fellas does anybody knows if I have to configure something to be able to retrieve the list of users from the rest API? I'm getting a 404 on v2.0/users22:12
bknudsonbambam1: the admin api supports v2.0/users, the public api doesn't. see http://developer.openstack.org/api-ref-identity-v2.html22:18
*** dimsum_ has joined #openstack-keystone22:19
bknudsonalso apparently you need the OS-KSADM extension.22:19
bambam1thank you bknudson i'm gonna take a look at that22:21
*** gordc has joined #openstack-keystone22:22
*** dimsum_ has quit IRC22:23
*** gordc has quit IRC22:38
*** gokrokve has quit IRC22:57
*** david-lyle has quit IRC23:14
*** henrynash has quit IRC23:35
openstackgerritOpenStack Proposal Bot proposed a change to openstack/keystone: Updated from global requirements  https://review.openstack.org/11162023:38
*** dimsum_ has joined #openstack-keystone23:50
*** dimsum_ has quit IRC23:54

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!