Monday, 2017-06-12

*** piliman974 has quit IRC00:10
*** thorst_afk has joined #openstack-keystone00:19
*** thorst_afk has quit IRC00:23
*** piliman974 has joined #openstack-keystone00:32
*** gagehugo has quit IRC01:00
*** chlong has quit IRC01:04
*** edmondsw has joined #openstack-keystone01:10
*** edmondsw has quit IRC01:15
*** chlong has joined #openstack-keystone01:19
*** thorst_afk has joined #openstack-keystone01:20
*** thorst_afk has quit IRC01:24
*** pnavarro has joined #openstack-keystone01:24
*** dikonoo has joined #openstack-keystone01:42
*** ducttape_ has quit IRC01:50
*** ducttape_ has joined #openstack-keystone01:51
*** ducttap__ has joined #openstack-keystone01:52
*** ducttape_ has quit IRC01:55
*** zhurong has joined #openstack-keystone01:56
*** thorst_afk has joined #openstack-keystone02:00
*** thorst_afk has quit IRC02:00
*** Shunli has joined #openstack-keystone02:01
*** piliman974 has quit IRC02:05
*** ducttap__ has quit IRC02:08
*** ducttape_ has joined #openstack-keystone02:09
*** ducttape_ has quit IRC02:13
*** piliman974 has joined #openstack-keystone02:18
*** ducttape_ has joined #openstack-keystone02:26
*** thorst_afk has joined #openstack-keystone02:36
*** thorst_afk has quit IRC02:36
*** ducttape_ has quit IRC02:37
*** ducttape_ has joined #openstack-keystone02:38
*** ducttape_ has quit IRC02:42
*** edmondsw has joined #openstack-keystone02:58
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Expose getting EndpointData on adapter and session  https://review.openstack.org/46909103:01
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Add support for version ranges  https://review.openstack.org/46909003:01
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Support explicitly requesting the 'latest' version  https://review.openstack.org/46908903:01
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Add flags to turn discovery on and off  https://review.openstack.org/46908803:01
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Plumb endpoint_override through get_endpoint_data  https://review.openstack.org/46909203:01
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Rename discover_versions to fetch_version_info  https://review.openstack.org/47027503:01
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Optimize matching version no microversion needed  https://review.openstack.org/47027403:02
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Rework EndpointData construction to normalize catalog first  https://review.openstack.org/46908503:02
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Move version discovery logic to keystoneauth1.discover  https://review.openstack.org/46908603:02
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Add url manipulation and microversion collection  https://review.openstack.org/46908703:02
*** edmondsw has quit IRC03:02
openstackgerritMerged openstack/oslo.policy master: Updated from global requirements  https://review.openstack.org/47303103:17
*** dikonoo has quit IRC03:31
*** dikonoor has joined #openstack-keystone03:31
*** piliman974 has quit IRC03:32
*** thorst_afk has joined #openstack-keystone03:37
*** gagehugo has joined #openstack-keystone03:46
*** dave-mccowan has quit IRC03:56
*** thorst_afk has quit IRC03:56
*** Dinesh_Bhor has joined #openstack-keystone04:10
*** namnh has joined #openstack-keystone04:13
*** Dinesh_Bhor has quit IRC04:24
*** Dinesh_Bhor has joined #openstack-keystone04:25
*** zhurong has quit IRC04:26
*** zhurong has joined #openstack-keystone04:35
*** catintheroof has joined #openstack-keystone04:36
*** pnavarro has quit IRC04:39
*** catintheroof has quit IRC04:42
*** zhurong has quit IRC05:06
*** zhurong has joined #openstack-keystone05:07
andreykurilinmorgan: I'm ok about complexity of password auth, but any way 5 seconds sounds very long for this operation05:35
andreykurilinmorgan: `rally is not a great indicator in this regard and never has been`. any facts? or it is just words?05:47
*** zsli_ has joined #openstack-keystone05:49
*** Shunli has quit IRC05:51
*** thorst_afk has joined #openstack-keystone05:54
morganlook at the delay in devstack and elsewhere, this is clearly not causing a 5-second delay on every single auth05:56
morganrally has never been a good indicator on much of anything real world05:56
morganthe scenarios have been poor for keystone05:56
morganand show contrived/limited data sets that do not mirror real world applications05:57
morganmy guess is your rally setup is binding up on other things.05:57
morganyou can tune the bcrypt and scrypt settings05:58
morgani'm saying we are not reverting this without a look at rally and it's setup and/or may consider different default options05:58
morganif it took 5 seconds to auth everyt time with that patch landed, no gate could pass05:59
*** thorst_afk has quit IRC05:59
*** tobberydberg has joined #openstack-keystone06:10
*** mdnadeem has joined #openstack-keystone06:18
*** rcernin has joined #openstack-keystone06:19
*** liujiong has joined #openstack-keystone06:21
*** edmondsw has joined #openstack-keystone06:34
*** rcernin has quit IRC06:36
*** edmondsw has quit IRC06:39
*** rcernin has joined #openstack-keystone06:40
openstackgerritHemanth Nakkina proposed openstack/keystone master: Add functional test cases for v3-ext/OS-OAUTH1  https://review.openstack.org/47323106:51
*** pcaruana has joined #openstack-keystone06:52
*** thorst_afk has joined #openstack-keystone06:55
*** thorst_afk has quit IRC06:59
*** tesseract has joined #openstack-keystone07:19
openstackgerritHemanth Nakkina proposed openstack/keystone-tempest-plugin master: Add functional test cases for v3-ext/OS-OAUTH1  https://review.openstack.org/47324507:27
andreykurilinmorgan: it is a poor devstack without custom settings. if default configs of keystone for devstack is not really good, it is not problem of rally. as for that scenario, it is quite simple, keystoneauth and keystonclient are used there. If it is possible to use them in the way that auth become so slow, again it is problem of user-interface of those libraries.07:27
andreykurilinlet's do not discuss who is worse and try to find a solution to speed up password auth method07:28
andreykurilinmorgan: `if it took 5 seconds to auth everyt time with that patch landed, no gate could pass`. Ok, please next time start your statement from asking more details about our scenarios. As I mentioned in the bug report, such bad timings we obtained while authenticating 20  concurrent users. It is not what your regular gates do. The min time is not so big - it is less that 1s (as it should be), the median 3.5-4s and the maximum 5.1s07:32
openstackgerritHemanth Nakkina proposed openstack/keystone-tempest-plugin master: Add functional test cases for v3-ext/OS-OAUTH1  https://review.openstack.org/47324507:32
*** f13o has quit IRC07:32
*** jpena|off is now known as jpena07:35
*** jpena has left #openstack-keystone07:35
*** ducttape_ has joined #openstack-keystone07:38
*** ducttape_ has quit IRC07:43
openstackgerritzhengliuyang proposed openstack/keystonemiddleware master: Clean up code about hash algorithms  https://review.openstack.org/47325907:52
*** f13o has joined #openstack-keystone07:54
*** thorst_afk has joined #openstack-keystone07:56
*** tobberyd_ has joined #openstack-keystone07:59
*** zzzeek has quit IRC08:00
*** zzzeek has joined #openstack-keystone08:00
*** thorst_afk has quit IRC08:00
*** tobberydberg has quit IRC08:03
*** jaosorior has joined #openstack-keystone08:16
*** edmondsw has joined #openstack-keystone08:22
*** edmondsw has quit IRC08:27
*** thorst_afk has joined #openstack-keystone08:56
openstackgerritzhengliuyang proposed openstack/keystonemiddleware master: Clean up code about hash algorithms  https://review.openstack.org/47325909:03
*** thorst_afk has quit IRC09:16
*** piliman974 has joined #openstack-keystone09:18
*** nicolasbock has joined #openstack-keystone09:24
*** tobberyd_ has quit IRC09:24
*** tobberydberg has joined #openstack-keystone09:24
*** tobberydberg has quit IRC09:25
*** tobberydberg has joined #openstack-keystone09:26
*** nicolasbock has quit IRC09:28
*** zsli_ has quit IRC09:36
*** mdnadeem has quit IRC09:36
*** nicolasbock has joined #openstack-keystone09:54
*** f13o has quit IRC09:56
*** david-lyle has quit IRC10:02
*** liujiong has quit IRC10:03
*** edmondsw has joined #openstack-keystone10:11
*** mvk has quit IRC10:11
*** tobberydberg has quit IRC10:11
*** tobberydberg has joined #openstack-keystone10:11
*** zhurong has quit IRC10:12
*** thorst_afk has joined #openstack-keystone10:13
*** edmondsw has quit IRC10:15
*** mariusv has quit IRC10:16
*** piliman974 has quit IRC10:16
*** thorst_afk has quit IRC10:17
*** david-lyle has joined #openstack-keystone10:24
*** piliman974 has joined #openstack-keystone10:36
*** zhurong has joined #openstack-keystone10:38
*** mvk has joined #openstack-keystone10:39
*** Shunli has joined #openstack-keystone10:43
*** Shunli has quit IRC10:44
*** raildo has joined #openstack-keystone11:02
*** nicolasbock_ has joined #openstack-keystone11:06
*** nicolasbock_ has quit IRC11:06
*** namnh has quit IRC11:19
*** piliman974 has quit IRC11:25
andreykurilinmorgan: btw, I think that it is not a good idea to put any mark at revert of your own patch ;)11:32
*** aojea has joined #openstack-keystone11:33
*** nicolasbock has quit IRC11:35
*** nicolasbock has joined #openstack-keystone11:36
*** ducttape_ has joined #openstack-keystone11:39
*** thorst_afk has joined #openstack-keystone11:43
*** ducttape_ has quit IRC11:43
*** ducttape_ has joined #openstack-keystone11:59
*** tobberydberg has quit IRC12:04
*** tobberydberg has joined #openstack-keystone12:05
openstackgerritzhengliuyang proposed openstack/keystonemiddleware master: Clean up code about hash algorithms  https://review.openstack.org/47325912:10
*** ducttape_ has quit IRC12:11
*** ducttape_ has joined #openstack-keystone12:11
*** ducttape_ has quit IRC12:16
*** zhurong has quit IRC12:16
*** catintheroof has joined #openstack-keystone12:27
*** catintheroof has quit IRC12:28
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Expose getting EndpointData on adapter and session  https://review.openstack.org/46909112:30
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Add support for version ranges  https://review.openstack.org/46909012:30
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Support explicitly requesting the 'latest' version  https://review.openstack.org/46908912:31
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Add flags to turn discovery on and off  https://review.openstack.org/46908812:31
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Plumb endpoint_override through get_endpoint_data  https://review.openstack.org/46909212:31
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Rename discover_versions to fetch_version_info  https://review.openstack.org/47027512:31
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Optimize matching version no microversion needed  https://review.openstack.org/47027412:31
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Move version discovery logic to keystoneauth1.discover  https://review.openstack.org/46908612:31
openstackgerritMonty Taylor proposed openstack/keystoneauth master: Add url manipulation and microversion collection  https://review.openstack.org/46908712:31
*** edmondsw has joined #openstack-keystone12:38
*** dave-mccowan has joined #openstack-keystone12:39
*** ducttape_ has joined #openstack-keystone12:52
*** ducttape_ has quit IRC12:57
*** dikonoo has joined #openstack-keystone13:01
*** dikonoor has quit IRC13:01
*** pnavarro has joined #openstack-keystone13:07
*** ducttape_ has joined #openstack-keystone13:08
*** ducttap__ has joined #openstack-keystone13:10
*** ducttape_ has quit IRC13:12
*** ducttap__ has quit IRC13:16
*** aojea has quit IRC13:22
*** ducttape_ has joined #openstack-keystone13:25
*** lucasxu has joined #openstack-keystone13:29
*** ducttape_ has quit IRC13:31
*** ducttape_ has joined #openstack-keystone13:33
*** ducttape_ has quit IRC13:49
*** catintheroof has joined #openstack-keystone13:52
*** ducttape_ has joined #openstack-keystone13:57
*** ducttape_ has quit IRC13:58
*** ducttape_ has joined #openstack-keystone13:59
*** spzala has joined #openstack-keystone13:59
*** ducttape_ has quit IRC14:05
*** ma9_ has joined #openstack-keystone14:18
ma9_When trying to map users coming from SAML federation to Keystone, I would like to have a mapping which can map multiple groups (e.g. coming from the variable: MELLON_groups: 'firstgroup;secondgroup;thirdgroup') to multiple Keystone projects…. is there a way to do this?14:21
*** ducttape_ has joined #openstack-keystone14:21
ma9_is it possible to split them on the ';' separator with a mapping rule?14:21
*** dikonoo has quit IRC14:23
lbragstadma9_: that's a good question, i think that specific mapping would be handled by mod_shib or mod_mellon14:25
ma9_I found this page, maybe it's documented here.. https://docs.openstack.org/developer/keystone/federation/mapping_combinations.html I'll check it out14:25
lbragstadma9_: I was just about to suggest that page14:26
lbragstadma9_: i'm not sure there is a way to parse an attribute like that in keystone directly14:26
lbragstadma9_: but the parsing and mapping of attributes from the actual SAML is done by either mod_shib or mod_mellon14:26
lbragstadma9_: the mapping in keystone takes the things that were pulled out of the SAML assertion by mod_shib or mod_mellon and maps them to keystone (so there are two kinds of mappings really)14:27
*** ducttape_ has quit IRC14:28
ma9_mm ok, what would be the ideal way to get a user mapped to multiple projects then (variable number)?14:31
ma9_do I need to create a variable for project or something like that?14:31
*** pnavarro has quit IRC14:31
lbragstadma9_: so you want a user to get a role assignment on a project if they have specific variables?14:35
*** tobberyd_ has joined #openstack-keystone14:35
lbragstadit looks like all the projects you want to map to are in a single attribute14:36
lbragstadma9_: we do support auto-provisioning, which sounds like that might help? https://docs.openstack.org/developer/keystone/federation/federated_identity.html#auto-provisioning14:36
*** tobberydberg has quit IRC14:38
*** tobberyd_ has quit IRC14:40
*** jlvacation is now known as jlvillal14:41
ma9_the thing is that I want to map a user to more than one project…. I receive all the projects from SAML, at the moment they are listed in a single variable, separated by a semicolumn14:44
ma9_in that auto-provisioning section it seems like it-s possible to map users to more than one project, but only one project is derived from a SAML variable14:44
ma9_I would like to be able to get more than one from SAML14:45
lbragstadma9_: right the federated auto provisioning stuff is new as of ocata14:45
*** ducttape_ has joined #openstack-keystone14:45
ma9_yes.. I'm fine to do this on Ocata14:45
lbragstadma9_: if there is a way to get mod_shib or mod_mellon to separate that specific attribute into multiple variables, then the auto-provisioning stuff might help14:46
lbragstadma9_: otherwise, i don't think there is a way to support that in keystone directly14:46
ma9_ok.. but then again it would be a dynamic list of variables14:46
ma9_0 to many14:46
lbragstadma9_: right14:46
lbragstadma9_: that makes sense14:47
*** phalmos has joined #openstack-keystone14:47
lbragstadma9_: we do have some work proposed for keystone that hasn't landed yet, but it pulls more of the SAML logic into keystone14:47
lbragstadma9_: so instead of having to setup a mapping for shibboleth or mellon and keystone, you'd specify a single mapping and keystone would handle the saml directly14:48
lbragstadand map it to projects/groups/etc...14:48
ma9_I see.. so I guess it's still a bit early for this14:48
lbragstadit's not supported today, but your use case sounds like it would be important for that feature14:48
ma9_in our setup we use Keycloak (RH-SSO) and we use it to fetch Users and Groups from LDAP+KRB (as Keystone does not work with passwords stored in KRB)14:49
ma9_so we would have liked to get full user + group mapping from LDAP to Keycloak to Keystone14:49
lbragstadsince keystone would be the only thing dealing with the SAML, we could explore adding something that makes it handle a list of attributes with a delimiter14:49
lbragstadma9_: oh - interesting14:50
lbragstadma9_: we do have a few folks here who are familiar with keycloak14:50
lbragstadcc jdennis and hrybacki ^14:50
ma9_we managed to get the full list of users and groups into Keycloak… we got all users and 'primary groups' into keystone, but we are missing all the other groups14:51
ma9_which would need to come from that list inside of a variable ;)14:51
lbragstadma9_: i see14:51
lbragstadma9_: i'm not sure if they've attempted that specific use case, but it might be worth checking14:52
ma9_I'll check with them thanks!14:53
lbragstadma9_: absolutely, if you end up coming up with a solution, we should document it14:54
*** ducttape_ has quit IRC15:03
*** ducttape_ has joined #openstack-keystone15:04
openstackgerritAlvaro Lopez Garcia proposed openstack/keystoneauth master: Pass kwargs to the plugin getter  https://review.openstack.org/47349415:06
*** dklyle has joined #openstack-keystone15:07
*** david-lyle has quit IRC15:10
*** aselius has joined #openstack-keystone15:11
openstackgerritLance Bragstad proposed openstack/keystone master: Cleanup colon usage in domain config docs  https://review.openstack.org/47349615:11
lbragstadlamt: fixed ^15:12
lamtlbragstad :)15:12
lbragstadlamt: thanks for the review15:13
lamtlbragstad not a problem15:13
*** aojea has joined #openstack-keystone15:21
andreykurilinstevemar: hi!15:25
jdennislbragstad: helping ma9 now ...15:25
ma9_if others are interested, this should work for me: https://docs.openstack.org/developer/keystone/federation/federated_identity.html#mappings-examples15:26
*** aloga has quit IRC15:28
*** aloga has joined #openstack-keystone15:29
*** aojea has quit IRC15:30
*** pcaruana has quit IRC15:31
lbragstadjdennis: awesome - thank you!15:39
lbragstadma9_: did you get it figured out?15:39
*** tobberydberg has joined #openstack-keystone15:43
ma9_It seems the link has the necessary information, I need to read it with calm a little later15:44
ma9_I'll let you know if it works15:45
*** rcernin has quit IRC15:45
*** tobberydberg has quit IRC15:47
*** dklyle has quit IRC15:49
*** david-lyle has joined #openstack-keystone15:49
knikollao/15:51
*** raildo has quit IRC15:52
*** aojea has joined #openstack-keystone15:54
*** raildo has joined #openstack-keystone15:54
lbragstadma9_: sounds good15:59
ma9_thanks to you all ;)16:01
*** rderose has joined #openstack-keystone16:04
*** gyee has joined #openstack-keystone16:04
*** ma9_ has left #openstack-keystone16:07
knikollalbragstad: regarding your changes adding HEAD support. I think updating api-ref in most of them is unnecessary.16:10
knikollawhen they are checking the existence of a resource or relationship, like HEAD identity_providers/idp1 or /role/role1/implies/role2 they make sense. but doing head on identity_providers or default config isn't really checking anything and therefore of limited use16:13
*** spzala has quit IRC16:16
lbragstadknikolla: what do you mean by checking?16:23
*** sjain has joined #openstack-keystone16:23
cmurphyHEAD has specific meaning for checking the existence of certain objects or for checking relationships like HEAD /projects/{}/users/{}/roles/{}, but for list operations it's not "checking" anything, it'll return 200 whether there are 0 or 100 items in the list16:27
lbragstadit's specifically important for cache management16:27
lbragstadhttps://www.pragmaticapi.com/blog/2013/02/14/restful-patterns-for-the-head-verb/16:27
*** sjain has quit IRC16:27
cmurphy++ for making HEAD work for that reason, it just doesn't need to be explicitly documented16:28
*** sjain has joined #openstack-keystone16:30
morgancmurphy: ++ yay16:33
morganHEAD shouldn't need to ever be explicitly documented.16:33
morganit should just work, identically to any GET op16:33
morganthough for lists... unless we support etag data, could be short circuted16:34
*** charz has quit IRC16:34
lbragstadok - we should go through the existing documentation then and make sure we're consistent with HEAD across the board16:35
lbragstadsome APIs reference it  and some don't16:35
morganlbragstad: yeah, we could support etags which case HEAD on a list is interesting16:35
lbragstads/reference/document/16:35
morganbut otherwise, *shrug*16:35
cmurphylbragstad: the APIs that reference it are the ones that give special meaning to it, like role checking16:35
cmurphyi think it's otherwise consistent16:36
*** charz has joined #openstack-keystone16:36
morgancmurphy: fair, we could just revamp that to make GETs the canonical operation and HEAD being notated in all GETs as "working as expected with HTTP"16:36
morganprovided we have GETs for everything16:37
lbragstadso - we have HEAD /v3/projects/{project_id}/groups/{group_id}/roles/{role_id}16:38
lbragstadbut GET /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} isn't documented16:38
lbragstad?16:38
cmurphyi guess that always made sense to me because the only value that's important is the 200 or 404, there's no reasonable body to return16:40
lbragstadsure16:40
lbragstadhttps://github.com/openstack/keystone/blob/c528539879e824b8e6d5654292a85ccbee6dcf89/keystone/assignment/routers.py#L11216:40
lbragstadi guess the part i'm stumbling over is the consistency in the docs then?16:40
lbragstadget support GET and HEAD for /v3/projects/{project_id}/users/{user_id}/roles/{role_id}16:41
lbragstadbut we don't document HEAD16:41
lbragstadin other APIs we support GET and HEAD but only document GET16:41
lbragstadand assume HEAD to be implied?16:41
lbragstadjust want to make sure I'm on the same page as everyone16:42
cmurphyHEAD looks documented here https://developer.openstack.org/api-ref/identity/v3/index.html#check-whether-user-has-role-assignment-on-project16:42
lbragstadcmurphy: yep - do we document GET for that API?16:43
lbragstadGET /v3/projects/{project_id}/users/{user_id}/roles/{role_id} that is?16:43
cmurphyno we don't16:43
lbragstadok16:43
lbragstadshould we be?16:43
morganyes16:44
morganwe should16:44
morganGET may not return anything else interesting16:44
morganwe might need to impl a get?16:44
morganbut GET should be the default (imo)16:44
lbragstadmorgan: we seem to through get_head_action16:44
morganHEAD should be implemented for all GETs.16:44
morganyeah16:44
morgani think we do16:44
morganbut just confirm.16:44
cmurphyi'd be fine with documenting get instead of head16:44
morganbefore we adjust documents ;)16:45
cmurphyjust rationalizing why it always made sense to me so far16:45
morgancmurphy: i think it's more consistent to always document GET.16:45
morganeven if it returns no data besides a 200 OK16:45
cmurphymorgan: sure, seems reasonable to me16:45
morganor a 204, or whatever 2XX it returns today w/ the HEAD16:45
lbragstadcool16:46
lbragstadso what if we go through, document all GET and have a blanket statement that says all GET APIs support HEAD, too?16:46
morganthat would be perfect16:47
morganimo16:47
*** spilla has joined #openstack-keystone16:47
cmurphy++16:47
lbragstadsweet!16:47
lbragstadi will update my patches then16:47
lbragstadknikolla: cmurphy morgan thanks for the help :)16:47
cmurphyo716:48
lbragstaddoes it bother anyone else when you have two of the *exact* same monitors but there is something different between the two that causes font to render ever-so-slightly different?!16:51
cmurphyi use linux, i'm just feeling lucky i got it to stop mirroring :P16:53
lbragstadlol16:53
lbragstadi'm surprised that worked for me out of the box with fedora 2516:54
*** sjain has quit IRC17:02
*** morgan is now known as mordgan17:03
*** mordgan is now known as morgan17:03
*** piliman974 has joined #openstack-keystone17:08
*** mvk has quit IRC17:09
*** jose-phillips has quit IRC17:12
knikollalbragstad: :)17:12
samueldmqlbragstad: that question... I am using 2 of the same monitors in the last 2 weeks17:15
samueldmqand now I am looking carefully to see if I can find differences :(17:16
*** jose-phillips has joined #openstack-keystone17:18
*** lucasxu has quit IRC17:24
*** aojea has quit IRC17:33
*** jaosorior is now known as jaosorior_away17:41
*** tesseract has quit IRC17:54
*** spzala has joined #openstack-keystone17:55
*** lucasxu has joined #openstack-keystone18:08
morganlbragstad: i have that problem18:13
morganlbragstad: you know what it is for me... 2 different graphics card18:13
morganlbragstad: a gtx 1080 and the integrated one.18:13
lbragstadmorgan: really?!18:13
morganthe integrated one causes a different brightness18:13
lbragstadah - interesting18:14
morganother issue is not using the same cables18:14
morganif you use HDMI for one and displayport for the other18:14
morganyou need to calibrate them individually18:14
morganif it is all 100% the same18:14
morgan(1 video card, same port types, etc)18:14
morganthen it could be minor differences in the panel18:14
lbragstadyeah18:14
morgansome monitor companies source panels from different vendors18:14
lbragstadI'd believe that18:15
morganit's why i try and buy monitors from folks who make their own panels (aka not Sony, not Apple)18:15
morganbreton: it isn't about offending someone in that patchset to revert. I am 100% open to tuning defaults (though lets be careful not to make it insecure). Auth by nature must be relatively slow if your hashes are meant to be secure.18:16
morganbreton: we need to help people re-use tokens *and* maybe tune devstack (it is lower powered) differently. However, the real-world impact here is "we can have insecure password hashes, that are easy to break" or we can have slower auth. For a system that is trying to be more secure, we have to err to the latter18:17
morganwe allow people to tune their deployments, and in this case, really it is about tuning the deployments. Devstack does not have a lot of processes, so it will be slower.18:18
*** spzala has quit IRC18:18
morganthis is also why rally is a very poor mechanism for evaluating keystone. Some things we do are, frankly, by design CPU and Ram intensive. it cannot be evaluated against a devstack easily nor in a way that represents a real deployment18:19
morganthis is the trade off on security.18:20
morganlbragstad: ^ cc18:21
lbragstadreading18:21
morganwe should default to more secure password hashes. if speed is really a serious concern, there are ways to speed up (and make hashes less secure).18:22
lbragstadlooking at the original bug reports - we should support alternative password hash mechanisms18:23
morganwe do.18:23
lbragstadhttps://bugs.launchpad.net/keystone/+bug/1668503 and https://bugs.launchpad.net/keystone/+bug/154304818:23
openstackLaunchpad bug 1668503 in OpenStack Security Advisory "sha512_crypt is insufficient, use pbkdf2_sha512 for password hashing" [Undecided,Incomplete]18:23
morganwe support bcrypt, scrypt, AND pbkdf2 now18:23
openstackLaunchpad bug 1543048 in OpenStack Identity (keystone) "support alternative password hashing in keystone" [High,Fix released] - Assigned to Morgan Fainberg (mdrnstm)18:23
morganwe no longer support sha512_Crypt18:23
lbragstadi think the importance of doing so is well described there, too18:23
morganas that is considered relatively insecure18:23
morganbcrypt is considered industry standard18:23
lbragstadthen that's what we should be doing by default - which i think we are18:24
morganbut pbkdf2 is "ok". it however is much more breakable with ASIC and FPGAs18:24
morganwe are doing bcrypt with standard passlib defaults18:24
morganexcept in our unit tests.18:24
morganbecause we aren't testing bcrypt security18:24
lbragstadmorgan: which we lower in order to get performance benefits18:24
lbragstadright18:24
morgancorrect18:24
morganyou can lower the rounds needed for bcrypt18:24
morganwhich increases speed for the cost of security18:25
morgani would have defaulted to scrypt, but it actually has a significant ram cost18:25
morganand i don't want to move that way by default18:25
morganbcrypt is mostly sufficient18:25
morganannnyway18:27
morganthat is my stance on this.18:27
morganand why i -2'd the revert18:27
morgani am 100% ok with saying devstack should tune for it's resources18:27
morgani am also ok with considering changing our default (somewhat)18:27
lbragstadmorgan: we did that once with the old implementation i believe18:28
morganbut i don't want to see us revert a security hardening that is important like this because of the known tradeoff between security and speed18:28
morganlbragstad: we did18:28
morganwe tuned down our default18:29
morganin this case i'd be more inclined to tune devstack18:29
morgandevstack is not testing if bcrypt is secure, or scrypt, or pbkdf218:29
lbragstadi think that's the right direction as well18:29
morganand rally will continue to be a poor indicator on performance in auth for this exact reason (it can be much more indicative for say token validation)18:29
morgansince that is more consistent even in devstack.18:30
*** catinthe_ has joined #openstack-keystone18:31
*** catintheroof has quit IRC18:33
openstackgerritLance Bragstad proposed openstack/keystone master: Add HEAD API to domain config  https://review.openstack.org/47287618:35
openstackgerritLance Bragstad proposed openstack/keystone master: Cleanup colon usage in domain config docs  https://review.openstack.org/47349618:35
morganlbragstad: anyway, going to be very picky about changing the default rounds in keystone. We should tune devstack first (commented on the patch)18:38
*** erlon has joined #openstack-keystone18:38
lbragstadmorgan: yeah - i did too18:38
lbragstadsounds like another revision is on the way18:38
morganboris indicated (boris42) he was going to propose changing the default rounds18:39
morgannot in devstack18:39
morganso, like i said, be very careful, as that really impacts how secure the hashes are18:39
morgani'd like to see real deployment figures with actual resources with bcrypt defaults18:39
morgannot devstack ones, before we actually do something18:40
lbragstadsure - i think that's fair18:40
lbragstadi wouldn't be opposed to using that information to write a guide if we can't point to an existing one18:40
morganthe sha512_crypt round change was based upon a "real-ish" deployment on real hardware used by dolphm at rax18:41
morgan++18:41
lbragstadyeah - that was mostly virtual machines deployed across rax datacenters18:41
lbragstadbut we modeled it after production deployments18:42
lbragstadwe wanted to know how much keystone we needed to handle the volume of requests we see in public cloud deployments18:42
lbragstadi think i included the password hashing analysis in the report i wrote on it, but i don't have access to it anymore18:42
morganyeah18:44
morganit was one thing18:44
*** jose-phillips has quit IRC18:46
*** spzala has joined #openstack-keystone18:47
*** jose-phillips has joined #openstack-keystone18:47
*** spzala has quit IRC18:47
*** spzala has joined #openstack-keystone18:47
openstackgerritLance Bragstad proposed openstack/keystone master: Add HEAD API to auth  https://review.openstack.org/47288118:50
openstackgerritLance Bragstad proposed openstack/keystone master: Move domain config to DocumentedRuleDefault  https://review.openstack.org/44933718:53
lbragstadalright - stepping away for a bit to get a run in and mow the lawn18:54
*** aojea has joined #openstack-keystone19:08
*** ducttape_ has quit IRC19:21
*** ducttape_ has joined #openstack-keystone19:21
*** tobberydberg has joined #openstack-keystone19:21
*** tobberydberg has quit IRC19:34
*** tobberydberg has joined #openstack-keystone19:34
*** aojea has quit IRC19:38
*** tobberydberg has quit IRC19:39
*** catintheroof has joined #openstack-keystone19:39
*** aojea has joined #openstack-keystone19:41
*** catinthe_ has quit IRC19:42
*** aojea has quit IRC19:43
*** jose-phillips has quit IRC19:51
*** jose-phillips has joined #openstack-keystone19:54
*** jose-phillips has quit IRC19:57
*** jose-phillips has joined #openstack-keystone20:10
*** piliman974 has quit IRC20:12
*** nicolasbock has quit IRC20:14
*** raildo has quit IRC20:27
*** piliman974 has joined #openstack-keystone20:35
*** aojea has joined #openstack-keystone20:48
openstackgerritLance Bragstad proposed openstack/keystone master: Add HEAD API to domain config  https://review.openstack.org/47287620:53
openstackgerritLance Bragstad proposed openstack/keystone master: Move domain config to DocumentedRuleDefault  https://review.openstack.org/44933720:53
*** spzala has quit IRC20:57
*** harlowja has quit IRC21:02
*** lucasxu has quit IRC21:12
*** thorst_afk has quit IRC21:25
*** thorst_afk has joined #openstack-keystone21:45
*** aojea has quit IRC21:45
*** aojea has joined #openstack-keystone21:48
*** thorst_afk has quit IRC21:49
*** edmondsw has quit IRC21:50
*** spilla has quit IRC21:56
*** edmondsw has joined #openstack-keystone21:59
openstackgerritLance Bragstad proposed openstack/keystone master: Add HEAD APIs to federated API  https://review.openstack.org/47285822:01
openstackgerritLance Bragstad proposed openstack/keystone master: Make federation documentation consistent  https://review.openstack.org/47287522:01
*** edmondsw has quit IRC22:03
*** edmondsw has joined #openstack-keystone22:05
*** harlowja has joined #openstack-keystone22:06
*** dave-mccowan has quit IRC22:09
*** edmondsw has quit IRC22:09
*** edmondsw has joined #openstack-keystone22:11
*** edmondsw_ has joined #openstack-keystone22:14
*** edmondsw has quit IRC22:15
*** spzala has joined #openstack-keystone22:15
*** edmondsw_ has quit IRC22:18
*** boris-42_ has joined #openstack-keystone22:20
boris-42_Hi everybody22:20
boris-42_@morgan hi22:20
boris-42_@morgan so this patch https://review.openstack.org/#/c/473571/1 sets proper value in devstack and resotres performance https://review.openstack.org/#/c/473571/1 and unblocks rally gates22:21
morganJenkins is cranky with that oy35 (might just need a recheck)22:22
morganotherwise looks good to me22:22
bretonboris-42_: we can even stop encrypting passphrases completely and performance will be O(len(password)) ;)22:28
boris-42_@morgan ya i did recheck22:28
boris-42_@breton 4 rounds is like 2 ** 4 which is 16 Ops22:29
boris-42_which is like quite quick=)22:31
boris-42_btw bcrypt lib is slow (even if it is designed to be slow)22:33
boris-42_it could use all cores22:34
boris-42_so it will generate faster stuff for core keeping the same amount of resources required22:34
boris-42_for developer*22:34
*** spzala has quit IRC22:40
*** edmondsw has joined #openstack-keystone22:42
*** edmondsw has quit IRC22:46
*** rderose has quit IRC22:47
*** sjain_ has joined #openstack-keystone22:47
*** catintheroof has quit IRC22:47
*** gagehugo has quit IRC22:59
morganbreton: no, we cannot, the code does not allow that.23:03
morganboris-42_: we set the value to the floor in our unit tests23:04
*** gagehugo has joined #openstack-keystone23:04
morganso, it is as fast as it can be23:04
morganthat is acceptable for devstack as well23:04
*** piliman974 has quit IRC23:15
openstackgerritMerged openstack/keystone master: Updated from global requirements  https://review.openstack.org/47280723:18
*** yushiro has joined #openstack-keystone23:20
*** ducttape_ has quit IRC23:31
*** piliman974 has joined #openstack-keystone23:34
*** adriant has quit IRC23:35
*** phalmos has quit IRC23:38
*** liujiong has joined #openstack-keystone23:43
*** catintheroof has joined #openstack-keystone23:45
*** aojea has quit IRC23:51
*** gagehugo has quit IRC23:59

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!