Wednesday, 2018-11-21

ayoungjamielennox, depends on what stage of the development cycle we clone.00:23
ayoungjamielennox, good to hear from you.  Did you read the context?  Horizon is doing something unsavory with the user_id and the client00:24
ayoungrafaelweingartne, for K2K?00:24
jamielennoxi didn't  really look, something about context?00:24
rafaelweingartnek2k?00:30
rafaelweingartnewell, I would like to integrate OpenStack in a federation00:30
rafaelweingartnewe already have IdPs, which are implemented with Keycloak00:30
rafaelweingartneTherefore, OpenStack would be an SP00:30
rafaelweingartneI need to know the endpoints that OpenStack uses to configure in Keycloak (as a client), and it is always easier to get that data from a metadata file that describer the provider (IdP or SP)00:31
openstackgerritVishakha Agarwal proposed openstack/keystone master: Add openstack_groups to assertion  https://review.openstack.org/58821101:00
*** vishakha has joined #openstack-keystone01:05
cmurphyrafaelweingartne: for keystone as a saml identity provider then the metadata endpoint is /v3/OS-FEDERATION/saml2/metadata, for keystone as a service provider it depends on the auth module you're using, for shibboleth it's /Shibboleth.sso/Metadata i think, for mellon it's something different01:36
rafaelweingartneThanks01:39
vishakhacmurphy:  Hey!01:48
cmurphyhi vishakha01:52
vishakhacmurphy: Again a question from federation01:56
vishakhacmurphy: I was trying with samltest.id. But after logging with my saml credentials in horizon, I am getting unauthorized user01:57
vishakhacmurphy: I have set up my  keystone apache01:57
*** rafaelweingartne has quit IRC01:57
vishakhacmurphy: Have setup my shibholeth2.xml, but only error I am getting is of authorization01:58
cmurphyvishakha: which part is giving you the unauthorized message, is it the samltest.id site, or the horizon dashboard, or is it from keystone? you should be able to tell based on the url in the browser bar02:00
*** Dinesh_Bhor has joined #openstack-keystone02:02
cmurphyvishakha: i suspect it's coming from keystone, in which case you can set insecure_debug=true and it should tell you more02:02
vishakhacmurphy: I have set insecure_debug = True, But still the same error . No more information02:05
cmurphyvishakha: can you tell where it's coming from? is it keystone, shibboleth/apache, horizon, or is it on the samltest.id site itself?02:10
vishakhacmurphy: getting these logs from horizon_error02:23
vishakhahttps://www.irccloud.com/pastebin/p5480Vmw/02:23
vishakhacmurphy: No logs in keystone02:23
cmurphyvishakha: those tracebacks in horizon are normal actually02:24
cmurphyit's weird :(02:24
vishakhacmurphy:  when logging , no logs are there in keystone.02:25
cmurphyvishakha: when you see the unauthorized message in the browser, does the url in the browser bar have a /identity path in it? or /dashboard? or is it coming from the samltest.id site itself?02:25
vishakhacmurphy:  http://127.0.0.1/identity/v3/auth/OS-FEDERATION/websso/saml2?origin=http://localhost:5440/dashboard/auth/websso/02:25
cmurphyvishakha: okay, so it's coming from keystone02:26
cmurphykeystone or shib02:26
vishakhahttps://www.irccloud.com/pastebin/C5T4K5FN/02:26
cmurphyvishakha: is there any error in /var/log/shibboleth/shibd.log or shibd_warn.log?02:26
cmurphyor in the main apache error log02:27
cmurphyor sometimes those logs end up in the horizon logs so keep looking for other errors in the horizon logs02:27
vishakhacmurphy:  Yes I looked in all the log files,No error like log02:28
vishakhacmurphy: let me share with you02:28
openstackgerritwangxiyuan proposed openstack/keystone master: Update contributor doc  https://review.openstack.org/61751302:29
vishakhacmurphy: In shibholeth, no logs for today02:31
vishakhacmurphy: I dont understand why there are so less logs02:33
cmurphy:/02:37
vishakhacmurphy, wxy-xiyuan : Also updated patch for adding openstack_groups in SAML. https://review.openstack.org/#/c/588211/. Pl review02:39
cmurphyvishakha: thanks for that, will take a look soon02:39
vishakhacmurphy: :)02:41
*** Dinesh_Bhor has quit IRC02:44
*** Dinesh_Bhor has joined #openstack-keystone02:52
*** jmlowe has quit IRC02:59
*** jmlowe has joined #openstack-keystone03:00
*** itlinux has joined #openstack-keystone04:33
openstackgerritMerged openstack/keystone master: Document user options  https://review.openstack.org/61882305:35
openstackgerritMerged openstack/keystone master: Add missing ws seperator between words  https://review.openstack.org/61868905:35
openstackgerritMerged openstack/keystone master: changed port in tools/sample_data.sh  https://review.openstack.org/61819606:01
*** annp has joined #openstack-keystone06:17
*** artem_vasilyev has joined #openstack-keystone06:49
openstackgerritShuayb Popoola proposed openstack/keystone master: Fix --bootstrap-password's default password error  https://review.openstack.org/61910107:01
*** rcernin has quit IRC07:26
*** sapd1__ has quit IRC08:54
*** sapd1 has joined #openstack-keystone08:55
*** jaosorior has quit IRC09:26
*** pcaruana has joined #openstack-keystone09:48
*** jaosorior has joined #openstack-keystone10:03
*** breton has quit IRC10:08
*** Emine has joined #openstack-keystone10:10
*** Emine has quit IRC10:31
*** shrasool has joined #openstack-keystone10:34
openstackgerritShuayb Popoola proposed openstack/keystone master: Fix --bootstrap-password's default password error  https://review.openstack.org/61910110:44
*** Emine has joined #openstack-keystone10:54
*** mvkr has quit IRC11:03
*** Dinesh_Bhor has quit IRC11:37
*** xek has quit IRC11:39
*** mvkr has joined #openstack-keystone11:43
*** mugsie has joined #openstack-keystone11:49
*** raildo has joined #openstack-keystone11:59
*** erus has quit IRC12:01
*** xek has joined #openstack-keystone12:04
*** pvradu has joined #openstack-keystone12:31
*** pvradu has quit IRC12:32
*** pvradu has joined #openstack-keystone12:33
lbragstadkmalloc yeah - i was more or less curious if we should have bugs open for that12:36
lbragstadbut i think that answers my question and that we should12:36
lbragstadoriginally - i was just opening bugs for keystone subsystems that didn't take into account system-scope, but there are parts that do but don't use the new default roles12:37
mbuilvishakha: did you manage to switch to the SP in horizon successfully?12:38
lbragstadvishakha i responded to your comments here - let me know if you have further questions https://review.openstack.org/#/c/605851/412:39
*** amoralej is now known as amoralej|lunch13:13
*** artem_vasilyev has quit IRC13:27
openstackgerritLance Bragstad proposed openstack/keystone master: Add region protection tests for system readers  https://review.openstack.org/61908513:43
openstackgerritLance Bragstad proposed openstack/keystone master: Update region policies to include system member  https://review.openstack.org/61908613:43
openstackgerritLance Bragstad proposed openstack/keystone master: Update region policies to use system admin  https://review.openstack.org/61924113:43
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with regions  https://review.openstack.org/61924213:43
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for project users interacting with regions  https://review.openstack.org/61924313:43
openstackgerritLance Bragstad proposed openstack/keystone master: Remove region policies from policy.v3cloudsample.json  https://review.openstack.org/61924413:43
*** erus has joined #openstack-keystone13:49
*** BlackDex has quit IRC14:02
*** pvradu_ has joined #openstack-keystone14:03
*** BlackDex has joined #openstack-keystone14:04
*** pvradu has quit IRC14:07
*** pvradu_ has quit IRC14:07
*** pvradu has joined #openstack-keystone14:08
*** amoralej|lunch is now known as amoralej14:13
*** jaosorior has quit IRC14:25
openstackgerritJohn Dennis proposed openstack/oslo.policy master: Fully log RBAC enforcement data  https://review.openstack.org/61926014:31
openstackgerritJens Harbott (frickler) proposed openstack/keystone master: DNM: Test jobs running on bionic instead of xenial  https://review.openstack.org/61156314:41
lbragstadjdennis nice - thanks the for the patch14:44
lbragstadfor the*14:44
lbragstadi'm clearly under-caffeinated14:45
jdennislbragstad: you're welcome14:53
*** shrasool has quit IRC15:13
*** Emine has quit IRC15:17
*** Emine has joined #openstack-keystone15:18
*** jaosorior has joined #openstack-keystone15:24
kmallocjdennis: woot!15:25
kmalloclbragstad: yep15:25
lbragstaddid gerrit just die?15:32
lbragstadoh - nevermind15:32
lbragstadit's back15:32
kmalloclbragstad: hehe15:37
*** erus has quit IRC15:38
kmallocjdennis: the patch looks good. the mask_password / mask_dict_password should solve dhellman's concerns15:47
kmallocon the "logged data" bit the best we can.15:48
*** devx has quit IRC15:48
openstackgerritLance Bragstad proposed openstack/keystone master: Update service policies for system reader  https://review.openstack.org/61927715:49
openstackgerritLance Bragstad proposed openstack/keystone master: Update service policies for system member  https://review.openstack.org/61927815:49
openstackgerritLance Bragstad proposed openstack/keystone master: Update service policies for system admin  https://review.openstack.org/61927915:49
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with services  https://review.openstack.org/61928015:49
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for project users interacting with services  https://review.openstack.org/61928115:49
openstackgerritLance Bragstad proposed openstack/keystone master: Remove service policies from policy.v3cloudsample.json  https://review.openstack.org/61928215:49
jdenniskmalloc: I see I added comments essentially echoing your thoughts just after you posted15:50
kmalloc:)15:52
kmallocjdennis: whelp, i think we're on the same page. that's easy :)15:53
lbragstadif anyone is looking to do some reviews16:20
lbragstadhttps://review.openstack.org/#/c/605539/ is the start of several linear series of reviews16:20
lbragstadto incorporate default roles into APIs, implement system scope, and start removing the policy.v3cloudsample.json file16:20
lbragstadhttps://review.openstack.org/#/c/603319/ also fixes a bug16:22
kmalloclbragstad: <whine>but i just did reviews last week</whine> -- i'll add them to my list :)16:26
lbragstadcool - thanks16:26
kmalloclbragstad: probably will have some comments/score for them before lunch16:26
lbragstadi should have the entire catalog api squared away by EOD16:26
lbragstadincorporating default roles, system-scope, and removing obsolete policies from policy.v3cloudsample.json16:27
kmalloccool.16:43
kmallocand like i said i should be able to generate an architecture diagram for next week so that should help for forward looking planning16:44
*** shrasool has joined #openstack-keystone16:48
*** pcaruana has quit IRC16:50
*** xek_ has joined #openstack-keystone16:54
*** xek has quit IRC16:57
*** Emine has quit IRC17:05
*** pvradu has quit IRC17:08
*** erus has joined #openstack-keystone17:13
*** xek_ is now known as xek17:18
tobias-urdini've been talking about ip restricting users before, is this a super bad idea?17:19
tobias-urdinhttp://paste.openstack.org/show/735912/17:19
*** prashkre has joined #openstack-keystone17:21
prashkrelbragstad: Hi. Have you got a chance to look at https://bugs.launchpad.net/keystone/+bug/1800077?17:22
openstackLaunchpad bug 1800077 in OpenStack Identity (keystone) "LDAP Referrals were returned and ignored" [Undecided,New]17:22
prashkrelbragstad: If not, could you please take a look?17:22
*** prashkre has quit IRC17:30
*** shrasool has quit IRC17:30
*** prashkre has joined #openstack-keystone17:31
*** jaosorior has quit IRC17:41
lbragstadprashkre just wrapping something up now, and then i can take a look17:50
lbragstadtobias-urdin that use case came up again last week17:50
lbragstadspecifically if it would be possible to restrict users access to projects based on IP addresses17:51
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for project users interacting with endpoints  https://review.openstack.org/61928117:51
openstackgerritLance Bragstad proposed openstack/keystone master: Update endpoint policies for system reader  https://review.openstack.org/61932917:51
openstackgerritLance Bragstad proposed openstack/keystone master: Update endpoint policies for system member  https://review.openstack.org/61933017:51
openstackgerritLance Bragstad proposed openstack/keystone master: Update endpoint  policies for system admin  https://review.openstack.org/61933117:51
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with endpoints  https://review.openstack.org/61933217:51
openstackgerritLance Bragstad proposed openstack/keystone master: Remove endpoint policies from policy.v3cloudsample.json  https://review.openstack.org/61933317:51
prashkrelbragstad: sure. will be waiting for you update.17:53
lbragstadprashkre in that bug report17:54
lbragstadare you just expecting an update to the log message?17:55
lbragstadit looks like the code is only expecting to deal with a single referral and not multiple17:55
lbragstadprashkre is ^ the direction you're looking for18:01
openstackgerritLance Bragstad proposed openstack/keystone master: Disambiguate between multiple referrals and config  https://review.openstack.org/61933618:01
lbragstader... ^18:01
prashkrelbragstad: I think your changes should be fine.18:07
prashkrelooks good to me.18:07
kmalloctobias-urdin: i thinkw e want to do this in the user-options functionality18:07
kmallocbased upon waht we talked abouty in berlin18:07
lbragstador do we want to implement it in project options?18:11
lbragstadi guess it boils down to setting it on the project or the user...18:11
lbragstadgagehugo did https://review.openstack.org/#/c/616286/ make it to stable/rocky?18:12
ayoung$ openstack endpoint list18:12
ayoungYou are not authorized to perform the requested action: identity:list_endpoints. (HTTP 403) (Request-ID: req-ba6d4ab2-aad5-40ec-bb30-730e9eb6332d)18:12
ayoungGah18:12
ayoung"We'll give you all this info if you know where to look in the token data, but if you ask for it explicitly, we say 'NO' and slam the door."18:13
ayoungWe are not very nice18:13
lbragstadgagehugo nevermind... i don't know how timestamps work18:16
ayounglbragstad, the word of the day is Disambiguate.  I did not even know that word existed.  Thank you.18:21
*** prashkre has quit IRC18:31
tobias-urdinlbragstad: kmalloc what i'm after is protecting all service and admin users which is a insane security risk since they have the admin role, i guess that one will have to do for now18:32
cmurphytobias-urdin: lbragstad kmalloc i opened a placeholder bug for this https://bugs.launchpad.net/keystone/+bug/180404218:32
openstackLaunchpad bug 1804042 in OpenStack Identity (keystone) "RFE: Add ability to restrict auth by forwarded IP" [Undecided,New]18:32
cmurphyayoung: it's openstack catalog show18:33
tobias-urdincmurphy: thanks18:35
cmurphytobias-urdin: if you want to write the spec there's still time ;)18:37
lbragstadayoung :)18:48
*** shrasool has joined #openstack-keystone18:49
*** amoralej is now known as amoralej|off18:56
*** xek has quit IRC19:00
kmalloccmurphy: NICE19:05
kmalloclbragstad: i'd like to do it as project options and user options19:05
kmallocboth19:05
kmalloctobias-urdin: ^19:05
*** xek has joined #openstack-keystone19:08
lbragstadack19:12
ayoungcmurphy, um, yeah, but quick, without looking, what do you put in there to show swift?19:32
ayoungthe tools may be there, but they don't reflect how we've talked about this for years.  endpoint list could do the same thing, or service list, and get the data from the token19:33
ayoungand if someone wants to do it using curl, as the API is supposed to be the first class citizen, it does not work19:34
ayoungand, by the way, the command is: openstack catalog show object-store19:34
ayoungwhich I was only able to figure out by parsing the token output19:35
ayoungI think that for catalog API calls, we should allow the member role to make those calls, but to implicitly add in the catalog filters for the token if they are not an admin.  I'm not sure how to write that up.19:36
*** dklyle has quit IRC19:38
*** mvkr has quit IRC19:40
*** nsmeds has joined #openstack-keystone19:41
*** raildo has quit IRC19:43
*** raildo has joined #openstack-keystone19:43
*** dklyle has joined #openstack-keystone19:46
*** shrasool has quit IRC20:06
openstackgerritLance Bragstad proposed openstack/keystone master: Disambiguate between multiple referrals and config  https://review.openstack.org/61933620:17
jdenniskmalloc: ping, https://github.com/openstack/oslo.policy/blob/f79650325f459e12bbac8f6967dcfabece1de7a4/oslo_policy/policy.py#L82420:31
jdenniskmalloc: but it's really oslo_context.context._DeprecatedPolicyValues20:32
kmallocYeah20:32
jdenniskmalloc: should the isintance test for both classes?20:32
kmallocHmm20:32
kmallocDunno20:33
kmalloclbragstad: ^20:33
kmallocI am not sure about that choice atm20:33
kmallocI have to think on it. Lance might have more context to base an answer on immediately20:33
jdenniskmalloc: yeah, it's opaque to me atm as well20:33
kmallocExactly20:33
*** raildo has quit IRC20:35
*** mvkr has joined #openstack-keystone20:35
jdennislbragstad:  '_DeprecatedPolicyValues' object has no attribute 'to_policy_values'20:39
lbragstad_DeprecatedPolicyValues is kinda weird20:43
lbragstadi had to grok it for a while before i thought i understood it20:43
jdennislbragstad: I think I have a solution, give me a moment to test it20:44
lbragstadjdennis well - to answer your question, we recently made a change to oslo.policy so that we overload creds to be two different types20:45
lbragstadit can either be a Context object or a dictionary20:45
lbragstadas much as i'm not a fan of overloading stuff, we did it so that it was easier for services to just pass their context objects into the enforcer as opposed to constructing a dictionary from scratch20:46
lbragstad(example - https://review.openstack.org/#/c/605539/ )20:47
nsmedsHey guys, question of the curious. I'm looking to create a custom role, and any of the users in this role can create new domains and then have full admin powers within the domains they create (create/edit/delete projects, neutron resources, nova resources, cinder resources).20:48
jdennislbragstad: heres the problem, strutils.mask_dict_password() only will accept a dict object, we expect creds to be a dict but sometimes it's a MutableMapping (apparently) so my fix is in the test for MutableMapping to convert it to a dict,20:48
nsmedsIn the middle of reading anything related I can get my hands on - but if anyone has suggestions to point me in the right direction they'd be much appreciated.20:48
jdennislbragstad: but the real fix is that strutils.mask_dict_password() should accept a MutableMapping because a dict is a MutableMapping20:49
lbragstadjdennis correct https://github.com/openstack/oslo.policy/blob/f79650325f459e12bbac8f6967dcfabece1de7a4/oslo_policy/policy.py#L825 should return a dict though20:49
lbragstadoh - wait...20:49
lbragstadah - yeah.. i see what you mean20:50
jdennislbragstad: I changed the sense of the test here: https://github.com/openstack/oslo.policy/blob/f79650325f459e12bbac8f6967dcfabece1de7a4/oslo_policy/policy.py#L83220:50
lbragstadwe can operate on it like a dict because its an instance of MutableMapping20:50
jdennisand did the conversion to dict inside that test20:51
lbragstadsure - that makes sense after reading the comment i apparently wrote, too20:52
lbragstadthat seems like it will be safe, i don't think anything is expecting to use `creds` after enforcement20:53
lbragstadso converting it to another type is probably fine?20:53
lbragstad(i know oslo.policy doesn't had it back to the service after enforcement)20:53
lbragstadhand it*20:53
jdennislbragstad: yeah, I think the early code is responsible for assuring by the time you begin to use creds it's a dict20:54
lbragstadnsmeds we're currently in the middle of that work and we are tracking status in bugs20:54
lbragstadjdennis  ++ yeah i agree.. the work to overload creds with something more standardized came later20:55
lbragstadnsmeds for example - https://bugs.launchpad.net/keystone/+bug/179437620:55
openstackLaunchpad bug 1794376 in OpenStack Identity (keystone) "Domains API should account for system-scope and default roles" [High,In progress] - Assigned to Lance Bragstad (lbragstad)20:55
lbragstadnsmeds we're tracking the rest of the work with https://bugs.launchpad.net/keystone/+bugs?field.tag=policy20:58
nsmedslbragstad: appreciate the reply. I'll go read through the open issues now to try and better understand current state of things21:00
lbragstadnsmeds sounds good - ping if you have more questions21:00
*** shrasool has joined #openstack-keystone21:04
lbragstadnsmeds some of the patches to do what you're looking for are actually up for review here - https://review.openstack.org/#/c/605485/1021:17
openstackgerritMerged openstack/keystone master: Region update extra support  https://review.openstack.org/51772621:20
*** erus has quit IRC21:20
tobias-urdinkmalloc: that would be preferable to have on both21:26
*** xek has quit IRC21:40
lbragstadour federated identity provider api is a bit weird21:56
lbragstadwe implement it with a PUT21:56
lbragstadand return a 20121:56
nsmedslbragstad: so you're working on creating separate roles: admin, member, reader - scoped either at system or domain level22:01
lbragstadnsmeds yep22:01
nsmedsbut this means (as far as I can tell) that to make new domains, you'd need to be system admin22:02
*** shrasool has quit IRC22:02
lbragstadby default yes22:02
nsmedsah fair - you're improving the defaults22:03
lbragstadnsmeds that's not to say you couldn't implement a new role22:03
nsmedsmy goal of having 1 role which allows new domains created, then admin control within domains that user created22:03
nsmedsyep, I'll be making something custom22:03
nsmedsgotcha22:03
*** shrasool has joined #openstack-keystone22:04
lbragstadnsmeds mind explaining the use case a bit more?22:04
lbragstadi'm just curious is all22:04
nsmedssure. There's a team in company developing a product on openstack, they basically need "admin" permissions but we want to avoid giving them access to modify existing domains/resources in those domains22:08
nsmedsand part of their product will require being able to create new domains and have full control within those domains22:08
nsmeds(word of warning: joined only a few months ago and still getting familiar with Openstaack, so this is my basic understanding)22:08
*** rcernin has joined #openstack-keystone22:09
lbragstadaha22:10
lbragstadintersting22:10
lbragstadso the whole requirement for creating a new domain is kinda like signing up new users who interface with the product?22:10
nsmedsyep, new user signs up and gets a new openstack domain22:11
nsmedswe'll need to fine-tune the rbac stuff more as this develops, but for now giving the team a "admin-but-not-admin" role which we can add their users to would be super helpful22:12
nsmedsso that's what I'm working on now22:12
lbragstadgothca22:14
lbragstadwill customers be able to create new domains outside of the one they get at sign up?22:15
nsmedstbh, not sure22:16
*** shrasool has quit IRC22:17
lbragstadcool22:17
lbragstadwell - one thing we're also working that might help is application credentials22:17
lbragstadfor example22:18
lbragstadyou could give an instance of your product an application credential with the system admin role, but tighting it down to only be able to call the POST /v3/domains API if you wanted22:18
lbragstadso you end up minimizing damage done if the product is compromised (not saying it would), just coding defensively22:19
lbragstadthat's something we're trying to get done for Stein http://specs.openstack.org/openstack/keystone-specs/specs/keystone/stein/capabilities-app-creds.html22:19
nsmedsok gotcha =) saved lots of links you've shared, much appreciated.22:24
nsmedssomewhat related: what a user creates a domain, they gain "owner" role for anything inside that domain yes?22:25
nsmedsi'd like to get some short-term solution working for them right now, which I understand means I'm editing the policy file - and picturing this https://pastebin.com/QtdzYBFS22:28
nsmedsdoes that make sense? and I edit the policies for any actions they require22:29
*** Dinesh_Bhor has joined #openstack-keystone22:30
openstackgerritLance Bragstad proposed openstack/keystone master: Pass context objects to policy enforcement  https://review.openstack.org/60553922:30
openstackgerritLance Bragstad proposed openstack/keystone master: Update idp policies for system reader  https://review.openstack.org/61937122:30
openstackgerritLance Bragstad proposed openstack/keystone master: Update idp policies for system member  https://review.openstack.org/61937222:30
openstackgerritLance Bragstad proposed openstack/keystone master: Update idp policies for system admin  https://review.openstack.org/61937322:30
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with idps  https://review.openstack.org/61937422:30
openstackgerritLance Bragstad proposed openstack/keystone master: Add tests for project users interacting with idps  https://review.openstack.org/61937522:30
openstackgerritLance Bragstad proposed openstack/keystone master: Remove idp policies from policy.v3cloudsample.json  https://review.openstack.org/61937622:30
lbragstadnsmeds yeah - that's kinda the girst22:31
lbragstadgist*22:31
lbragstadyou'd have to create some special role22:31
lbragstadand then explicitly override any policies (in policy files) that the user would expect to use22:31
nsmedsyep - understood. thanks a bunch =)22:34
lbragstadno problem22:34
*** imacdonn has quit IRC22:42
*** imacdonn has joined #openstack-keystone22:42
*** prashkre has joined #openstack-keystone22:56
*** Dinesh_Bhor has quit IRC23:20
openstackgerritJohn Dennis proposed openstack/oslo.policy master: Fully log RBAC enforcement data  https://review.openstack.org/61926023:22
*** rm_work has quit IRC23:33
*** rm_work has joined #openstack-keystone23:33
*** lbragstad is now known as lbragstad_turkey23:46
jdennisgobble gobble23:51
*** lbragstad_turkey has quit IRC23:56

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!