*** dave-mccowan has quit IRC | 00:14 | |
*** felipemonteiro has joined #openstack-keystone | 01:23 | |
*** imacdonn has quit IRC | 01:23 | |
*** imacdonn has joined #openstack-keystone | 01:23 | |
*** dave-mccowan has joined #openstack-keystone | 01:26 | |
*** ayoung has joined #openstack-keystone | 01:48 | |
openstackgerrit | ayoung proposed openstack/oslo.policy master: namespaced flag on checker CLI https://review.openstack.org/610402 | 01:50 |
---|---|---|
*** annp has joined #openstack-keystone | 01:58 | |
openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Updating doc of unified limit https://review.openstack.org/612226 | 02:07 |
*** felipemonteiro has quit IRC | 02:17 | |
*** felipemonteiro has joined #openstack-keystone | 02:31 | |
*** felipemonteiro has quit IRC | 02:31 | |
openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Adding 'date' for trust_flush https://review.openstack.org/607897 | 02:42 |
*** dave-mccowan has quit IRC | 03:11 | |
*** felipemonteiro has joined #openstack-keystone | 03:32 | |
openstackgerrit | Merged openstack/keystone master: Convert Normalizing filter to flask native Middleware https://review.openstack.org/609815 | 03:33 |
openstackgerrit | Merged openstack/keystone master: Move AuthContextMiddleware https://review.openstack.org/609836 | 03:33 |
*** hoonetorg has quit IRC | 04:48 | |
*** hoonetorg has joined #openstack-keystone | 05:01 | |
*** hoonetorg has quit IRC | 05:12 | |
*** hoonetorg has joined #openstack-keystone | 05:33 | |
*** felipemonteiro has quit IRC | 05:37 | |
*** pooja_jadhav has joined #openstack-keystone | 06:02 | |
*** pcaruana has joined #openstack-keystone | 06:21 | |
*** josecastroleon has joined #openstack-keystone | 06:33 | |
*** rdopiera has joined #openstack-keystone | 06:41 | |
*** bzhao__ has joined #openstack-keystone | 06:42 | |
*** pcaruana has quit IRC | 06:58 | |
*** rcernin has quit IRC | 06:59 | |
*** rcernin has joined #openstack-keystone | 07:05 | |
*** rcernin has quit IRC | 07:07 | |
*** pcaruana has joined #openstack-keystone | 07:13 | |
*** xek has joined #openstack-keystone | 07:31 | |
*** pooja_jadhav has quit IRC | 07:32 | |
*** pooja_jadhav has joined #openstack-keystone | 07:35 | |
*** aojea has joined #openstack-keystone | 08:05 | |
openstackgerrit | Neha Alhat proposed openstack/python-keystoneclient master: Add return-request-id-to-caller function(v3/contrib) https://review.openstack.org/268003 | 08:47 |
*** aojea has quit IRC | 09:18 | |
tobias-urdin | been browsing through a lot of the security docs around keystone, is there any recommended way to restrict access to service accounts? | 09:34 |
*** mvkr has quit IRC | 09:35 | |
*** zzzeek_ has quit IRC | 09:37 | |
*** zzzeek has joined #openstack-keystone | 09:40 | |
*** bnemec has joined #openstack-keystone | 09:45 | |
*** hoonetorg has quit IRC | 09:51 | |
*** xek has quit IRC | 09:51 | |
*** bnemec has quit IRC | 09:53 | |
*** aojea has joined #openstack-keystone | 09:55 | |
*** mvkr has joined #openstack-keystone | 09:59 | |
*** hoonetorg has joined #openstack-keystone | 10:08 | |
*** FlorianFa has joined #openstack-keystone | 10:08 | |
*** xek has joined #openstack-keystone | 10:14 | |
*** dave-mccowan has joined #openstack-keystone | 10:23 | |
*** aojea has quit IRC | 10:29 | |
openstackgerrit | Neha Alhat proposed openstack/python-keystoneclient master: Add return-request-id-to-caller function(v3/contrib) https://review.openstack.org/268003 | 10:35 |
*** dr_feelgood has joined #openstack-keystone | 10:40 | |
*** Dinesh_Bhor has joined #openstack-keystone | 10:40 | |
*** annp has quit IRC | 10:49 | |
*** Dinesh_Bhor has quit IRC | 11:03 | |
*** Dinesh_Bhor has joined #openstack-keystone | 11:05 | |
*** aojea_ has joined #openstack-keystone | 11:17 | |
*** Dinesh_Bhor has quit IRC | 11:21 | |
*** markvoelker has joined #openstack-keystone | 11:22 | |
*** pcaruana has quit IRC | 11:26 | |
*** markvoelker has quit IRC | 11:26 | |
*** dr_feelgood has quit IRC | 11:44 | |
*** pcaruana has joined #openstack-keystone | 11:48 | |
*** aojea_ has quit IRC | 11:53 | |
*** pcaruana has quit IRC | 12:12 | |
*** pcaruana has joined #openstack-keystone | 12:12 | |
*** raildo has joined #openstack-keystone | 12:14 | |
*** xek has quit IRC | 12:24 | |
*** xek has joined #openstack-keystone | 12:25 | |
*** aojea has joined #openstack-keystone | 12:45 | |
*** mvkr has quit IRC | 12:48 | |
*** jroll has quit IRC | 12:53 | |
*** jroll has joined #openstack-keystone | 12:54 | |
*** dr_feelgood has joined #openstack-keystone | 12:57 | |
*** mvkr has joined #openstack-keystone | 13:03 | |
*** aojea has quit IRC | 13:16 | |
*** mvkr has quit IRC | 13:23 | |
*** mvkr has joined #openstack-keystone | 13:23 | |
*** munimeha1 has joined #openstack-keystone | 13:35 | |
*** elbragstad is now known as lbragstad | 13:39 | |
lbragstad | tobias-urdin so that only service accounts can access specific APIs? | 13:40 |
tobias-urdin | more to protect service accounts from outside authentication or bruteforce for example, i can only think about doing it in the lb with packet inspection | 13:46 |
lbragstad | so you want to protect a service account (e.g., a nova service user) from being compromised by brute force? | 13:47 |
*** felipemonteiro has joined #openstack-keystone | 13:48 | |
tobias-urdin | yes, and admin user etc | 13:48 |
lbragstad | ok - the PCI-DSS requirements and configuration help you with that? Or do you mean you only want people from specific IPs to be able to authenticate | 13:49 |
*** aojea has joined #openstack-keystone | 13:50 | |
*** xek has quit IRC | 13:58 | |
tobias-urdin | the lockout is great, and i'll probably add that but still we'd need to ignore lockout for service users thus it would still be the same issue again | 14:00 |
tobias-urdin | otherwise the lockout on service accounts would be an issue itself | 14:00 |
tobias-urdin | locking service users to specific IP networks would allow to region authentication works but that bruteforce is not possible | 14:01 |
*** josecastroleon has quit IRC | 14:07 | |
*** SteelyDan is now known as dansmith | 14:11 | |
lbragstad | ah - i see what you mean | 14:16 |
lbragstad | afaik keystone doesn't support ip filtering | 14:16 |
lbragstad | natively | 14:16 |
*** aojea has quit IRC | 14:22 | |
tobias-urdin | yeah, it's kind of an big deal with security, bruteforce protection does some and having 32+ character passwords should probably suffice | 14:23 |
tobias-urdin | but some policies doesn't allow any form of such access | 14:24 |
tobias-urdin | (company policies that is) | 14:24 |
lbragstad | tobias-urdin you could also implement a strict password rotation time. https://docs.openstack.org/keystone/latest/admin/identity-security-compliance.html#configuring-password-expiration | 14:24 |
*** orange_julius has quit IRC | 14:25 | |
lbragstad | sure - that makes sense | 14:25 |
tobias-urdin | thanks for all the material :) | 14:26 |
tobias-urdin | and specifically admin access, which service accounts pretty much are, since that could compromise the cloud and not a project | 14:26 |
*** orange_julius has joined #openstack-keystone | 14:26 | |
lbragstad | right | 14:26 |
cmurphy | expiring passwords for service users would cause the same problem as the lockout, it breaks the service user which breaks the cloud | 14:29 |
cmurphy | you'd need to have your automation scheduled to do the password change, which you might as well do without setting an expiry | 14:29 |
cmurphy | but that of course causes downtime too | 14:29 |
tobias-urdin | yeah, it's also a huge administrative burden to do monthly instead of yearly for example | 14:29 |
cmurphy | and it's also never been proven that requiring password rotations is actually a security benefit | 14:30 |
cmurphy | https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes | 14:31 |
lbragstad | huh - interesting | 14:33 |
*** orange_julius has quit IRC | 14:54 | |
*** orange_julius has joined #openstack-keystone | 14:56 | |
*** felipemonteiro has quit IRC | 15:02 | |
*** david-lyle has joined #openstack-keystone | 15:07 | |
*** pcaruana has quit IRC | 15:12 | |
*** aojea has joined #openstack-keystone | 15:15 | |
*** dr_feelgood has quit IRC | 15:16 | |
kmalloc | o/ | 15:26 |
kmalloc | i'll be hit-miss today | 15:26 |
kmalloc | because dealing with car + doctor things for brie | 15:27 |
*** jmlowe has quit IRC | 15:27 | |
kmalloc | everyone is ok, brie dislocated her shoulder, but otherwise is not in bad shape considering she was rear-ended on i5 south on saturday | 15:27 |
lbragstad | :( hope everything goes well | 15:30 |
lbragstad | https://www.alvaka.net/new-password-guidelines-us-federal-government-via-nist/ pretty much gets rid of two pci-dss features we implemented | 15:31 |
*** xek has joined #openstack-keystone | 15:33 | |
kmalloc | yay | 15:33 |
kmalloc | we can just deprecate them | 15:33 |
kmalloc | lbragstad: i can implement a haveibeenpwned external checker for keystone | 15:34 |
lbragstad | i was just doing some more digging based on something cmurphy linked | 15:34 |
lbragstad | i was looking for an article about how frequency stability affects passwords, but i can't seem to find it | 15:35 |
kmalloc | yeah. | 15:38 |
kmalloc | there has been a lot of positive movement on password stuff lately | 15:38 |
kmalloc | i'll backlog a have-i-been-pwned aka "external password checker" mechanism for keystone | 15:38 |
kmalloc | it's super straightforward and *awesome* | 15:39 |
kmalloc | optional of course. it also never transmits the "in-the-clear" password on the network. | 15:39 |
kmalloc | (or even the complete hash) | 15:39 |
kmalloc | cmurphy: ftr, my employer does not force password changes in fixed timeframes. | 15:41 |
kmalloc | cmurphy: it is a pleasure that i can change the password as needed to conform to best practices (and/or isolate usage) | 15:42 |
cmurphy | i don't think we can deprecate that stuff, even if it's stupid it's still required for pci compliance | 15:42 |
kmalloc | i expect pci-dss to make adjustments to their requirements in the next XXX timeframe | 15:42 |
kmalloc | i meant deprecate when that happens. | 15:43 |
cmurphy | ah yeah that's fine | 15:43 |
lbragstad | cmurphy ++ | 15:43 |
kmalloc | pci folks tend to follow NIST recommendations (with a lag period) | 15:43 |
* lbragstad is super annoyed that he can't find the article he was looking for | 15:43 | |
lbragstad | YES! | 15:46 |
lbragstad | https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ | 15:46 |
*** itlinux has joined #openstack-keystone | 15:46 | |
cmurphy | lol so basically https://xkcd.com/936/ | 15:48 |
*** aojea has quit IRC | 15:48 | |
lbragstad | did you see https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html ? | 15:49 |
lbragstad | :) | 15:49 |
*** bnemec has joined #openstack-keystone | 15:51 | |
lbragstad | i guess one possible criticism of the diceware approach is that exclusive usage gives attackers the dictionary | 15:51 |
lbragstad | but schneier's article addresses that too, i suppose | 15:53 |
kmalloc | lbragstad: https://haveibeenpwned.com/API/v2 | 15:56 |
*** bnemec has quit IRC | 15:59 | |
*** gyee has joined #openstack-keystone | 16:00 | |
*** xek has quit IRC | 16:02 | |
*** david-lyle has quit IRC | 16:07 | |
*** aojea has joined #openstack-keystone | 16:41 | |
lbragstad | kmalloc whenever you're around - i have some questions regarding build_target and the comments you had | 16:48 |
*** jmlowe has joined #openstack-keystone | 16:54 | |
*** mvkr has quit IRC | 16:57 | |
*** neexio has joined #openstack-keystone | 16:59 | |
*** dklyle has joined #openstack-keystone | 17:02 | |
*** felipemonteiro has joined #openstack-keystone | 17:11 | |
*** raildo has quit IRC | 17:14 | |
kmalloc | sure | 17:15 |
kmalloc | here | 17:15 |
*** felipemonteiro has quit IRC | 17:15 | |
kmalloc | lbragstad: ask away | 17:15 |
*** aojea has quit IRC | 17:15 | |
lbragstad | actually - i might have figured it out... just about to run tests | 17:15 |
lbragstad | i'll push what i have and you can correct me | 17:15 |
kmalloc | lbragstad: functools.partial | 17:15 |
kmalloc | ;) | 17:15 |
kmalloc | it's how you pass arguments | 17:15 |
kmalloc | we do it elsewhere | 17:15 |
lbragstad | yeah ... but i might just be able to use flask.requests.view_args | 17:16 |
lbragstad | i didn't realize what that was doing until i looked at it a bit longer | 17:16 |
kmalloc | :) | 17:16 |
kmalloc | it's awesome how much extra you have available when you lean on flask | 17:17 |
kmalloc | and not have to extract crud from the request object that is passed through the whole chain | 17:17 |
kmalloc | yeah push the code up when you're ready and i'll look at it, i'm sure it'll be good. | 17:19 |
*** bnemec has joined #openstack-keystone | 17:19 | |
lbragstad | hmm | 17:27 |
lbragstad | taking the build_target approach makes these tests more complicated | 17:27 |
*** pcaruana has joined #openstack-keystone | 17:27 | |
lbragstad | https://review.openstack.org/#/c/594547/21/keystone/tests/unit/protection/v3/test_credentials.py@198 | 17:28 |
lbragstad | http://paste.openstack.org/show/732606/ makes 404 bubble up to unauthorized users | 17:28 |
lbragstad | instead of a 403 | 17:29 |
*** jmlowe has quit IRC | 17:31 | |
*** jmlowe has joined #openstack-keystone | 17:32 | |
*** ebukha has joined #openstack-keystone | 17:33 | |
*** irclogbot_3 has joined #openstack-keystone | 17:34 | |
openstackgerrit | Merged openstack/keystone-specs master: Explicit Domain Ids https://review.openstack.org/611201 | 17:34 |
*** raildo has joined #openstack-keystone | 17:37 | |
lbragstad | cc kmalloc ^ | 17:39 |
*** jmlowe has quit IRC | 17:43 | |
*** raildo has quit IRC | 17:43 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_type checking for credentials https://review.openstack.org/594547 | 17:46 |
kmalloc | lbragstad: right. | 17:53 |
*** mvkr has joined #openstack-keystone | 17:54 | |
kmalloc | the idea is to not run try/excepts and differing enforcements | 17:55 |
kmalloc | lbragstad: also, anything in the view_args should automatically be in the target dict | 17:55 |
kmalloc | iirc | 17:56 |
kmalloc | lbragstad: so... | 17:56 |
kmalloc | why are we doing | 17:56 |
kmalloc | try: | 17:56 |
kmalloc | credential = PROVIDERS.credential_api.get_credential(credential_id) | 17:56 |
kmalloc | target = {'credential': credential} | 17:56 |
kmalloc | except exception.NotFound: | 17:56 |
kmalloc | ENFORCER.enforce_call(action='identity:update_credential') | 17:56 |
kmalloc | raise | 17:56 |
*** irclogbot_3 has quit IRC | 17:56 | |
kmalloc | why not call enforcer.enforce_call first | 17:56 |
*** pcaruana has quit IRC | 17:57 | |
kmalloc | then just let the 404 raise up? do you need the credential in the target_dict? | 17:57 |
kmalloc | and do you want a 404 explicitly ? | 17:57 |
kmalloc | because a 404 on get_credential is likely to force a 403 in policy on the enforce in the except block | 17:58 |
kmalloc | unless you're not checking the target, which case, why are we jumping through hoops to generate a 404 after enforcement is called | 17:58 |
kmalloc | is it more correct to raise a 404 vs a 403. | 18:00 |
kmalloc | this seems like jumping through a lot of hoops | 18:00 |
*** raildo has joined #openstack-keystone | 18:01 | |
kmalloc | lbragstad: my guess is that the update_credential is going to fail with a 403 (or fall through to the old policy?) if called without target_attr | 18:03 |
kmalloc | so, my question becomes, why not just call enforce_call, then do the cred_check and then do a second enforce call with target_attr | 18:03 |
kmalloc | no try/except reraise needed | 18:03 |
*** jmlowe has joined #openstack-keystone | 18:04 | |
kmalloc | it is 100% ok to do a "ownership" enforcement call, or multiple enforcement calls | 18:04 |
*** irclogbot_3 has joined #openstack-keystone | 18:06 | |
*** aojea has joined #openstack-keystone | 18:07 | |
*** raildo has quit IRC | 18:11 | |
*** ebukha has quit IRC | 18:16 | |
*** ebukha_ has joined #openstack-keystone | 18:17 | |
lbragstad | kmalloc the behavior that i want is to make it so people unauthorized to call DELETE /v3/credentials/{non-existant-cred-id} get a 403 and people who are authorized get a 404 | 18:25 |
ebukha_ | Hello everyone. I just joined this keystone channel for the Outreachy internship. I am looking forward to a great experience with you all. cc cmurphy kmalloc | 18:26 |
kmalloc | ebukha_: welcome! :) | 18:26 |
lbragstad | hello ebukha_ | 18:26 |
ebukha_ | Thank you kmalloc. I,m excited to be here :) | 18:27 |
kmalloc | lbragstad: so, simply, i would run it as a dual check: "are you fundamentally allowed to do a delete" then do an ownership check, between those we raise the 404 | 18:27 |
kmalloc | ebukha_: we're excited to have you here! | 18:27 |
kmalloc | lbragstad: i'll be hit/miss a chunk of this week while I deal with car repairs and getting Brie settled with the new doctors. She can't drive until she gets out of the sling. | 18:28 |
lbragstad | kmalloc sounds good | 18:28 |
kmalloc | lbragstad: things turn out ot be more complex than expected... | 18:28 |
kmalloc | as always | 18:28 |
kmalloc | but in short, i will still get all the stuff done, just might be at really off hours even for me (Pacific post work) | 18:29 |
kmalloc | s/post work/business hours | 18:29 |
lbragstad | ok | 18:29 |
kmalloc | unrelated, we sure did have a lot of stuff flush through the gate this last week :) | 18:30 |
kmalloc | cleaned up a bunch of stuff | 18:30 |
kmalloc | i expect to do another pass on keystone and do a lot of abandon if it's ancient | 18:30 |
kmalloc | so we have a good idea of where we sit | 18:30 |
kmalloc | i'll also parse bugs and close out ones that are addressed by flask | 18:30 |
kmalloc | lbragstad: backports of the cache fix https://review.openstack.org/#/q/I14748bf2399e5da4ee360f451a8050f25dd90803 for app-creds | 18:31 |
ebukha_ | kmalloc: Thanks for the warm welcome. Any tips for me to get started? | 18:31 |
kmalloc | ebukha_: which outreachy project are you going to be working on? I can probably better direct you and help once I know :) | 18:33 |
lbragstad | kmalloc https://review.openstack.org/#/c/594547/22/keystone/api/credentials.py@161 handles the case where we're doing the "ownership" check | 18:33 |
kmalloc | ebukha_: also, i apologize in advance, had some personal life stuff come up this last weekend and i'll be spottily available over the next week while dealing with it all. | 18:33 |
lbragstad | when a credential doesn't exist | 18:33 |
kmalloc | lbragstad: right. | 18:33 |
kmalloc | hmmm | 18:34 |
*** neexio has quit IRC | 18:34 | |
kmalloc | lbragstad: can we call that blindly outside of the try/except? | 18:34 |
lbragstad | so - it raise a 403 if someone isn't able to execute it, if they are it passes and a 404 is raised | 18:34 |
kmalloc | so call that first | 18:34 |
kmalloc | always | 18:34 |
kmalloc | then do the "target build" | 18:35 |
kmalloc | which will raise a 404 | 18:35 |
kmalloc | and then do the enforce_call for ownership | 18:35 |
kmalloc | there is no rule saying you can only call enforce_call once in a request | 18:35 |
ebukha_ | kmalloc: I'll be working on improving OpenStack keystone API Unit Tests | 18:35 |
kmalloc | lbragstad | 18:35 |
lbragstad | right | 18:36 |
kmalloc | lbragstad: part of the design of the RBACEnforcer was to ensure it was called at least once, but move us away from the "we can only call it once" | 18:36 |
ebukha_ | kmalloc: No problem. I totally understand. | 18:36 |
*** aojea has quit IRC | 18:39 | |
kmalloc | ebukha_: ahh! Well then, I can defintely point you in a general direction to start. We have recently moved to flask from a custom WSGI framework. We now have a test framewwork that lets us use a context manager instead of needing to have a bunch of custom implementations of .put .get .post .patch (HTTP methods) | 18:40 |
kmalloc | ebukha_: so we're now using the flask.test_client() mechanism http://flask.pocoo.org/docs/1.0/testing/#the-testing-skeleton | 18:40 |
kmalloc | ebukha_: you can see some of the work we've done to make it available on the base test case, so you can do `with self.test_client() as c:` | 18:41 |
kmalloc | ebukha_: https://github.com/openstack/keystone/blob/master/keystone/tests/unit/core.py#L567 and https://github.com/openstack/keystone/blob/master/keystone/tests/unit/core.py#L519 | 18:42 |
kmalloc | ebukha_: an example of what our old test cases look like is https://github.com/openstack/keystone/blob/5814da527ba4224aed9f14ad09c0eb684c22ef46/keystone/tests/unit/test_v3_credential.py#L141-L164 | 18:43 |
cmurphy | hi ebukha_ ! | 18:43 |
kmalloc | ebukha_: and the newer style ends up being something like https://github.com/openstack/keystone/blob/86f968163ea90dfac515b5e59f20edf8c5554cee/keystone/tests/unit/test_v3_application_credential.py#L294-L317 | 18:43 |
kmalloc | ebukha_: don't hesitate to ask any/all questions, we're here to help :) | 18:43 |
kmalloc | ebukha_: also don't hesitate to say i'm dumping too much to process in irc ^_^ | 18:44 |
kmalloc | sometimes i am known to do that :P | 18:44 |
kmalloc | annnd here is cmurphy too! :) | 18:44 |
cmurphy | o/ | 18:44 |
*** ebukha has joined #openstack-keystone | 18:44 | |
cmurphy | ebukha_: what timezone are you in? | 18:46 |
*** rdopiera has quit IRC | 18:47 | |
ebukha_ | kmalloc: thanks for the heads up :) now i got a lot of reading to do, i think | 18:53 |
ebukha_ | cmurphy: hello. glad to join you here :) | 18:53 |
ebukha_ | cmurphy: i am in UTC+1 | 18:54 |
cmurphy | ebukha_: oh perfect me too | 18:54 |
cmurphy | well +2 for the next few weeks | 18:54 |
ebukha_ | cmurphy: yeah, but still awesome anyways :) | 18:55 |
ebukha_ | cmurphy: i was told you and kmalloc will be my mentor | 18:56 |
cmurphy | ebukha_: yep, feel free to ping either of us but i'm guessing my timezone is more compatible ;) | 18:59 |
cmurphy | if you want a slightly easier task for your first contribution i can dig through some of the low-hanging-fruit bugs | 19:00 |
ebukha_ | cmurphy: thanks alot. i'll appreciate that | 19:01 |
kmalloc | cmurphy: ++ | 19:12 |
*** irclogbot_3 has quit IRC | 19:14 | |
*** irclogbot_3 has joined #openstack-keystone | 19:15 | |
*** aojea has joined #openstack-keystone | 19:17 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_type checking for credentials https://review.openstack.org/594547 | 19:21 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_type checking for credentials https://review.openstack.org/594547 | 19:36 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_type checking for credentials https://review.openstack.org/594547 | 19:37 |
ildikov | lbragstad: knikolla: kmalloc: cmurphy: Keystone federation code from James that we've discussed on the Edge WG call last Tuesday: https://github.com/yahoo/openstack-collab/tree/master/keystone-federation-ocata | 19:38 |
ildikov | I'll put up the link to the wiki about Keystone edge architectures as well | 19:38 |
lbragstad | ildikov awesome! | 19:43 |
kmalloc | ildikov: i wont be there tomorrow, have a lot of stuff going on | 19:43 |
ildikov | kmalloc: I hear ya! | 19:43 |
kmalloc | ildikov: dealing with getting car repaired and some medical things handled | 19:43 |
kmalloc | ildikov: but lbragstad knows what i'm looking for in federation handling and my views | 19:44 |
kmalloc | we should have good coverage | 19:44 |
ildikov | kmalloc: ugh, one is worse than the other :/ I hope everything will turn out to be ok soon!! | 19:44 |
*** felipemonteiro has joined #openstack-keystone | 19:44 | |
ildikov | kmalloc: noted! | 19:44 |
kmalloc | ildikov: it's all fine, worst thing is brie dislocated her shoulder and needs to be careful / cant walk dogs / etc until she goes through some PT | 19:46 |
*** jmlowe has quit IRC | 19:46 | |
kmalloc | so really, it's ok, but man is it just a little frustrating and time consuming | 19:46 |
ildikov | kmalloc: OMG, that sounds bad, I'm sorry :( | 19:47 |
*** felipemonteiro has quit IRC | 19:47 | |
kmalloc | ildikov: like i said, it's all fine now - everyone walked away from the collision | 19:47 |
ildikov | kmalloc: I hope PT goes well and recovery will be quick | 19:47 |
kmalloc | ildikov: so do I! | 19:47 |
ildikov | kmalloc: fair enough, walking away sounds good overall | 19:48 |
kmalloc | exactly! | 19:49 |
kmalloc | :) | 19:49 |
*** jmlowe has joined #openstack-keystone | 19:50 | |
*** jmlowe has quit IRC | 19:51 | |
*** ebukha_ has quit IRC | 19:55 | |
lbragstad | ebukha if you don't mind me asking, what timezone are you located? I'm UTC -5 | 20:00 |
*** orange_julius has quit IRC | 20:01 | |
cmurphy | ebukha_ | cmurphy: i am in UTC+1 | 20:02 |
cmurphy | lbragstad: ^ | 20:02 |
lbragstad | oh - i completely missed that | 20:03 |
lbragstad | thanks! | 20:03 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Use request_body_json function in credential API https://review.openstack.org/612492 | 20:06 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Use request_body_json function in credential API https://review.openstack.org/612492 | 20:09 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove obsolete credential policies https://review.openstack.org/597187 | 20:10 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Pass context objects to policy enforcement https://review.openstack.org/605539 | 20:10 |
*** orange_julius has joined #openstack-keystone | 20:11 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Pass context objects to policy enforcement https://review.openstack.org/605539 | 20:11 |
*** jmlowe has joined #openstack-keystone | 20:12 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_type checking for credentials https://review.openstack.org/594547 | 20:13 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Pass context objects to policy enforcement https://review.openstack.org/605539 | 20:13 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove obsolete credential policies https://review.openstack.org/597187 | 20:13 |
*** irclogbot_3 has quit IRC | 20:27 | |
*** ebukha has quit IRC | 20:28 | |
*** felipemonteiro has joined #openstack-keystone | 20:28 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_types for user API https://review.openstack.org/611179 | 20:37 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_type checking for credentials https://review.openstack.org/594547 | 20:39 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Pass context objects to policy enforcement https://review.openstack.org/605539 | 20:39 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement scope_types for user API https://review.openstack.org/611179 | 20:39 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove obsolete credential policies https://review.openstack.org/597187 | 20:39 |
*** dmellado has quit IRC | 21:32 | |
*** spsurya has quit IRC | 21:38 | |
*** aojea has quit IRC | 21:41 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone-specs master: Clean up explicit domain IDs specification https://review.openstack.org/612524 | 21:47 |
*** bnemec has quit IRC | 22:18 | |
*** felipemonteiro has quit IRC | 22:44 | |
*** rcernin has joined #openstack-keystone | 22:46 | |
openstackgerrit | Merged openstack/keystone-specs master: Clean up explicit domain IDs specification https://review.openstack.org/612524 | 22:50 |
*** gyee has quit IRC | 23:00 | |
*** rcernin_ has joined #openstack-keystone | 23:28 | |
*** rcernin has quit IRC | 23:30 | |
*** dklyle has quit IRC | 23:32 | |
*** david-lyle has joined #openstack-keystone | 23:32 | |
*** david-lyle has quit IRC | 23:35 | |
*** dklyle has joined #openstack-keystone | 23:35 |
Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!