*** dave-mccowan has quit IRC | 00:23 | |
*** sapd1_ has joined #openstack-keystone | 00:36 | |
*** sapd1_ has quit IRC | 00:44 | |
*** erus has quit IRC | 00:50 | |
*** erus has joined #openstack-keystone | 01:00 | |
*** Nel1x has quit IRC | 01:02 | |
*** sapd1_ has joined #openstack-keystone | 01:07 | |
*** sapd1_ has quit IRC | 01:19 | |
*** markvoelker has quit IRC | 01:21 | |
*** markvoelker has joined #openstack-keystone | 01:22 | |
*** markvoelker has quit IRC | 01:26 | |
*** sapd1_ has joined #openstack-keystone | 01:50 | |
*** lbragstad has quit IRC | 02:13 | |
*** Dinesh_Bhor has joined #openstack-keystone | 02:15 | |
*** lbragstad has joined #openstack-keystone | 02:16 | |
*** ChanServ sets mode: +o lbragstad | 02:16 | |
*** Dinesh_Bhor has quit IRC | 02:17 | |
*** erus has quit IRC | 02:28 | |
*** itlinux has quit IRC | 02:29 | |
*** mhen has quit IRC | 02:32 | |
*** mhen has joined #openstack-keystone | 02:34 | |
*** Dinesh_Bhor has joined #openstack-keystone | 02:35 | |
*** erus has joined #openstack-keystone | 02:43 | |
openstackgerrit | wangxiyuan proposed openstack/keystone master: Add domain level support for strict-two-level-model https://review.openstack.org/623153 | 02:44 |
---|---|---|
*** wxy-xiyuan has joined #openstack-keystone | 02:54 | |
*** lbragstad has quit IRC | 03:38 | |
*** Dinesh_Bhor has quit IRC | 03:46 | |
*** erus has quit IRC | 03:49 | |
*** erus has joined #openstack-keystone | 03:55 | |
*** Dinesh_Bhor has joined #openstack-keystone | 03:55 | |
openstackgerrit | wangxiyuan proposed openstack/keystone master: Update project depth check https://review.openstack.org/623984 | 03:56 |
*** zzzeek has quit IRC | 04:41 | |
*** zzzeek has joined #openstack-keystone | 04:41 | |
*** sapd1_ has quit IRC | 05:05 | |
*** sapd1_ has joined #openstack-keystone | 05:18 | |
*** sapd1_ has quit IRC | 05:23 | |
*** sapd1_ has joined #openstack-keystone | 06:03 | |
*** sapd1_ has quit IRC | 06:48 | |
*** sapd__ has joined #openstack-keystone | 06:48 | |
*** sapd__ has quit IRC | 06:55 | |
*** alexchadin has joined #openstack-keystone | 07:16 | |
*** nehaalhat_ has joined #openstack-keystone | 07:20 | |
*** rcernin has quit IRC | 07:23 | |
*** nehaalhat_ has quit IRC | 07:25 | |
*** Dinesh_Bhor has quit IRC | 07:57 | |
*** trident has quit IRC | 08:10 | |
*** amoralej|off is now known as amoralej | 08:11 | |
*** trident has joined #openstack-keystone | 08:13 | |
*** xek has joined #openstack-keystone | 08:18 | |
*** imacdonn has quit IRC | 08:22 | |
*** imacdonn has joined #openstack-keystone | 08:22 | |
*** nehaalhat has joined #openstack-keystone | 08:27 | |
*** ShilpaSD has joined #openstack-keystone | 08:30 | |
*** nehaalhat has quit IRC | 08:31 | |
openstackgerrit | wangxiyuan proposed openstack/keystone master: Release note for domain level limit https://review.openstack.org/624019 | 08:32 |
*** nehaalhat_ has joined #openstack-keystone | 08:34 | |
*** nehaalhat_ has quit IRC | 08:38 | |
*** nehaalhat has joined #openstack-keystone | 08:46 | |
nehaalhat | ShilpaSD: Hi | 08:47 |
*** Dinesh_Bhor has joined #openstack-keystone | 09:00 | |
*** Dinesh_Bhor has quit IRC | 09:09 | |
*** shrasool has joined #openstack-keystone | 09:25 | |
*** Dinesh_Bhor has joined #openstack-keystone | 09:46 | |
*** Dinesh_Bhor has quit IRC | 09:47 | |
*** sapd1_ has joined #openstack-keystone | 09:54 | |
*** sapd1_ has quit IRC | 10:06 | |
*** sapd1_ has joined #openstack-keystone | 10:52 | |
*** sapd1_ has quit IRC | 10:58 | |
*** sapd1_ has joined #openstack-keystone | 11:39 | |
*** sapd1_ has quit IRC | 11:43 | |
*** raildo has joined #openstack-keystone | 12:05 | |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Consolidate tokenless X.509 docs https://review.openstack.org/624072 | 12:41 |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Move "Public ID Generators" to relevant docs https://review.openstack.org/624076 | 12:55 |
*** jistr is now known as jistr|medchk | 12:57 | |
*** dave-mccowan has joined #openstack-keystone | 13:13 | |
*** amoralej is now known as amoralej|lunch | 13:23 | |
*** nehaalhat has quit IRC | 13:28 | |
*** sapd1_ has joined #openstack-keystone | 13:32 | |
*** sapd1_ has quit IRC | 13:36 | |
*** erus has quit IRC | 13:40 | |
*** erus has joined #openstack-keystone | 13:41 | |
*** jmlowe has quit IRC | 13:45 | |
*** aojea_ has joined #openstack-keystone | 13:48 | |
*** jistr|medchk is now known as jistr | 13:56 | |
*** imus has joined #openstack-keystone | 13:57 | |
*** aojea_ has quit IRC | 14:06 | |
*** lbragstad has joined #openstack-keystone | 14:17 | |
*** ChanServ sets mode: +o lbragstad | 14:17 | |
*** openstackstatus has joined #openstack-keystone | 14:17 | |
*** ChanServ sets mode: +v openstackstatus | 14:17 | |
*** amoralej|lunch is now known as amoralej | 14:19 | |
*** jmlowe has joined #openstack-keystone | 14:24 | |
*** jmlowe has quit IRC | 14:24 | |
*** jmlowe has joined #openstack-keystone | 14:25 | |
*** jmlowe has quit IRC | 14:30 | |
*** shrasool has quit IRC | 14:34 | |
*** jmlowe has joined #openstack-keystone | 14:35 | |
*** alexchadin has quit IRC | 14:42 | |
*** aojea_ has joined #openstack-keystone | 14:43 | |
*** aojea_ has quit IRC | 14:48 | |
*** sapd1_ has joined #openstack-keystone | 14:51 | |
*** gagehugo has joined #openstack-keystone | 14:53 | |
*** mvkr has quit IRC | 14:55 | |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Move SSL recommendation to installation guide https://review.openstack.org/624100 | 14:57 |
gagehugo | o/ | 15:20 |
*** mvkr has joined #openstack-keystone | 15:25 | |
lbragstad | hola | 15:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Use auth_context in issue_token exclusively https://review.openstack.org/582635 | 15:43 |
*** itlinux has joined #openstack-keystone | 15:44 | |
*** jmlowe has quit IRC | 15:46 | |
*** itlinux has quit IRC | 15:46 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Use request_body_json function https://review.openstack.org/612492 | 15:53 |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Move supported clients section to user guide https://review.openstack.org/624115 | 15:53 |
*** jmlowe has joined #openstack-keystone | 16:24 | |
*** jmlowe has quit IRC | 16:34 | |
*** openstackgerrit has quit IRC | 16:35 | |
*** gyee has joined #openstack-keystone | 16:47 | |
*** itlinux has joined #openstack-keystone | 16:56 | |
*** raildo has quit IRC | 16:57 | |
*** jmlowe has joined #openstack-keystone | 18:12 | |
*** raildo has joined #openstack-keystone | 18:17 | |
*** sapd1_ has quit IRC | 18:24 | |
*** vishwanathj has joined #openstack-keystone | 18:28 | |
vishwanathj | Hi, What is the default lifespan for a keystone token? Is there a way to change the default lifespan to say 8 hours? Also, is there a setting that needs to be changes on other services such as nova, neutron and heat that needs to be updated for the token lifespan to be enhanced? Thanks in advance for all your help | 18:32 |
*** ayoung has joined #openstack-keystone | 18:32 | |
ayoung | kmalloc, cache backend dogpile (Pike era) would be replaced with oslo.cache by now (Queens and later) right? | 18:38 |
*** amoralej is now known as amoralej|off | 18:41 | |
lbragstad | vishwanathj token expiration is configurable https://docs.openstack.org/keystone/latest/configuration/config-options.html#token.expiration | 18:43 |
vishwanathj | lbragstad appreciate the response | 18:45 |
*** raildo has quit IRC | 18:45 | |
vishwanathj | lbragstad what setting on nova, neutron, glance and heat do I need to change to increase the token expiration time | 18:46 |
*** openstackgerrit has joined #openstack-keystone | 18:46 | |
openstackgerrit | Morgan Fainberg proposed openstack/keystone-specs master: Add resource-options-for-all specification https://review.openstack.org/624162 | 18:46 |
kmalloc | ayoung: yes it should be | 18:47 |
kmalloc | lbragstad: ^ | 18:47 |
kmalloc | lbragstad: should be an easy spec to accept. | 18:47 |
lbragstad | vishwanathj token expiration is only controllable via keystone | 18:47 |
openstackgerrit | Morgan Fainberg proposed openstack/keystone-specs master: Add resource-options-for-all specification https://review.openstack.org/624162 | 18:48 |
kmalloc | gagehugo: got the nvidia driver working. its annoying but it stoped the crashing | 18:49 |
gagehugo | kmalloc: nice | 18:50 |
gagehugo | it's not the greatest, but it works a lot better than it used to :/ | 18:50 |
kmalloc | gagehugo: it was still annoying and xiccd isn't starting when i login. but that is a totally unrelated issue wrt display calibration | 18:50 |
kmalloc | gagehugo: now i just wait for my 3rd monitor to arrive and i'll have everything setup properly | 18:51 |
*** sapd1_ has joined #openstack-keystone | 18:51 | |
kmalloc | gagehugo: 3x 2160p monitors in portrait mode is nice for development | 18:51 |
gagehugo | oh my | 18:51 |
kmalloc | gagehugo: got a good deal on the dell u2718q monitors :) | 18:52 |
gagehugo | those thin bezels look nice | 18:53 |
kmalloc | gagehugo: yeah and they're almost the same size top and bottom | 18:54 |
kmalloc | gagehugo: so it works really well in portrait | 18:54 |
gagehugo | we just have 22" 1080p ones here in the office :( | 18:54 |
kmalloc | gagehugo: my biggest issue is finding wallpaper that is 3840p in size :P | 18:55 |
gagehugo | heh | 18:55 |
gagehugo | at that point I'd just throw something together in paint.net | 18:55 |
*** sapd1_ has quit IRC | 18:55 | |
kmalloc | gagehugo: :) | 18:56 |
kmalloc | gagehugo: the best part is 3x2160p in portrait is still 16:9 ratio :) | 18:56 |
gagehugo | oh, true | 18:56 |
gagehugo | that makes it easier | 18:56 |
kmalloc | yup | 18:57 |
* kmalloc did the maths | 18:57 | |
kmalloc | :P | 18:57 |
kmalloc | lbragstad: i... i thought of a rather glaring hole in application credentials (cc cmurphy) | 18:57 |
gagehugo | uh oh | 18:58 |
*** sapd1_ has joined #openstack-keystone | 18:58 | |
kmalloc | lbragstad, cmurphy: when we have MFA rules enabled, app-creds may not work. do we want to explicitly allow them like we do token type auth? | 18:58 |
kmalloc | basically today if someone enables MFA rules, it could exempt application creds from working at all. | 18:58 |
kmalloc | gagehugo: feel free to weigh in as well | 18:58 |
lbragstad | how do you mean? | 19:00 |
kmalloc | lbragstad: token auth type is always allowed | 19:01 |
kmalloc | explicitly, even with MFA rules enabled | 19:01 |
kmalloc | do we want to force the MFA rules to explicitly deliniate app creds as a type? | 19:01 |
kmalloc | which does allow for TOTP/HOTP + app cred | 19:02 |
kmalloc | or do we want to treat app creds like tokens, implicitly valid/allowed | 19:02 |
lbragstad | hmm | 19:09 |
*** mvkr has quit IRC | 19:09 | |
gagehugo | allowing TOTP/HOTP + app cred sounds reasonable | 19:09 |
gagehugo | I think | 19:09 |
kmalloc | i'm generally leaning towards app creds not needing / allowing MFA. | 19:17 |
kmalloc | adriant: ^ cc | 19:17 |
kmalloc | lbragstad: also. omg... vacation...soon | 19:17 |
gagehugo | the use case for app cred + MFA sounds weird though if it's something automated | 19:17 |
gagehugo | hmm | 19:18 |
kmalloc | yeah | 19:18 |
kmalloc | i think the correct answer is app creds are implicitly allowed like token is when it comes to MFA Rules. | 19:18 |
kmalloc | I also am thinking that we need to have a way of blocking users from creating app creds for specific scopes (e.g. a project has a resource option that prohibits app creds) | 19:19 |
aning_ | Are there any waya ro revoke all existing fernet tokens? | 19:19 |
kmalloc | aning_: you can do an explicit delete on the token id (not recommended) at /v3/auth/tokens | 19:19 |
kmalloc | aning_: you can also do some things such as change the user's password. | 19:20 |
lbragstad | aning_ you can just rotate all your fernet keys | 19:20 |
kmalloc | ^ that too | 19:20 |
aning_ | right, rotate keys will revoke all at once shot | 19:21 |
lbragstad | aning_ any previously issued token will be unusable since the keys used to encrypt it will be gone | 19:21 |
aning_ | Yep, got it. | 19:21 |
kmalloc | oh i miss-read all tokens | 19:21 |
kmalloc | hah | 19:21 |
kmalloc | yeah rotating keys is the only real option | 19:22 |
aning_ | kmalloc: but your answers are good too +1 | 19:22 |
lbragstad | aning_ just be prepared for a possible uptick in traffic | 19:22 |
lbragstad | if clients automatically reauth if they get a 401 (which they will) | 19:22 |
aning_ | got it. | 19:22 |
aning_ | thx | 19:23 |
kmalloc | lbragstad: working on digging into shadow users ... it's really kindof all over. i am feeling like replacing it is going to be about as much work as completing it atm :( | 19:23 |
lbragstad | np | 19:23 |
lbragstad | kmalloc are you keeping notes of any of that analysis? | 19:26 |
*** aojea has joined #openstack-keystone | 19:27 | |
kmalloc | lbragstad: not a lot of notes atm. i'm just tying to understand it before making a recommendation | 19:30 |
kmalloc | lbragstad: like right now... it's somewhere around 1/2 implemented in random places and not implemented but rferenced elsewhere | 19:31 |
kmalloc | it's very much all over the place. | 19:31 |
kmalloc | legitimately my notes are something like "what the heck is going on here... wait wut?!" | 19:31 |
*** aojea has quit IRC | 19:33 | |
*** aojea_ has joined #openstack-keystone | 19:33 | |
*** ayoung has quit IRC | 19:34 | |
kmalloc | lbragstad, gagehugo, cmurphy, knikolla: could you quickly weigh in on this RFE: https://bugs.launchpad.net/keystone/+bug/1802136 | 19:38 |
openstack | Launchpad bug 1802136 in OpenStack Identity (keystone) "RFE: Keystone SQL backend (and `user_create` API) should support prehashed passwords" [Undecided,New] | 19:38 |
kmalloc | i've gone back and forth with the submitter and i'm not opposed based upon the answers, but I still am hesitant | 19:39 |
kmalloc | it is so prone to errors when using. | 19:39 |
gagehugo | I looked at that before, that's very weird | 19:39 |
knikolla | reading | 19:40 |
kmalloc | my comments cover most everything needed, i think, to evaluate it | 19:40 |
kmalloc | i hesitate becasue it is likely the prehashed password wont conform (metadata or ident) in the way passlib would handle it | 19:41 |
kmalloc | maybe as a condition to accepting that, have keystone-manage be used instead | 19:41 |
kmalloc | rather than via the API itself. | 19:41 |
kmalloc | also: https://bugs.launchpad.net/keystone/+bug/1807697 -- that is another one i'm not really sure about. want a second voice on it. | 19:42 |
openstack | Launchpad bug 1807697 in OpenStack Identity (keystone) "[RFE] Token returns Project's extra properties" [Undecided,New] | 19:42 |
knikolla | i'm hesitant as it feels like there should be a better way to solve the problem then injecting hashes of passwords | 19:47 |
knikolla | this is curing the symptom | 19:47 |
kmalloc | knikolla: the request is not unreasonable | 19:47 |
kmalloc | supporting non-plaintext passwords for users via the API. | 19:48 |
kmalloc | but.... | 19:48 |
kmalloc | i see this feature simply generating a lot of "well i put the hash in, it didn't accept it...or i can't login" | 19:48 |
kmalloc | because we lean on passlib's $ident$metadata$hash form | 19:48 |
kmalloc | and that is just as likely to be mis-done when someone "tries" to do it outside of passlib | 19:49 |
knikolla | but it becomes part of the api and something that we must support. | 19:51 |
*** xek has quit IRC | 19:52 | |
*** xek has joined #openstack-keystone | 19:52 | |
gagehugo | how would keystone still be pci-dss compliant if we allow pre-hashed passwords? | 19:53 |
*** aojea_ has quit IRC | 19:54 | |
kmalloc | would need to be disabled in some cases | 19:56 |
kmalloc | but we also exempt pci-dss checking when admins set the password | 19:56 |
gagehugo | you would have to have something keep track of the hashing algorithm between app X and keystone as well I assume | 19:59 |
lbragstad | so - https://bugs.launchpad.net/keystone/+bug/1802136 would require plaintext passwords in sql? | 20:00 |
openstack | Launchpad bug 1802136 in OpenStack Identity (keystone) "RFE: Keystone SQL backend (and `user_create` API) should support prehashed passwords" [Undecided,New] | 20:00 |
lbragstad | i don't get the "stored in scripts" bit | 20:00 |
gagehugo | I assume they have a script to auto-gen their admins and don't want to put the plaintext passwords in them | 20:01 |
kmalloc | gagehugo: we only ever support passlib hashing algos | 20:01 |
gagehugo | and feel "safer" with the passwords hashed | 20:01 |
kmalloc | gagehugo: and for new passwords we support bcrypt or scrypt | 20:01 |
gagehugo | but the end result of those getting compromised is the same | 20:01 |
kmalloc | for older ones we support sha256 (pbkdf) | 20:01 |
gagehugo | if someone gets a hold of the script, you're going to change the passwords, hashed or not | 20:02 |
kmalloc | lbragstad: no. it would require someone to hash the password and submit it to the API | 20:02 |
kmalloc | as requested | 20:02 |
kmalloc | the RFE is to allow something-not-keystone to hash the password | 20:02 |
lbragstad | so - keystone would blindly trust that what ever is passed to it has been hashed? or we have to attempt to validate the hash is actually a hash? | 20:03 |
kmalloc | and submit "hashed_password" vs "password" to the user_Create api | 20:03 |
*** shrasool has joined #openstack-keystone | 20:03 | |
kmalloc | the way we would do it is: check that ident and metadata is sane | 20:03 |
gagehugo | lbragstad: that is kinda what I'm thinking, having to maintain that sounds terrible imo | 20:03 |
kmalloc | and then blindly trust the hash | 20:03 |
kmalloc | ident is easy to check | 20:03 |
kmalloc | we check it on every auth anyway | 20:03 |
kmalloc | metadata is harder...but doable | 20:03 |
kmalloc | hash we can't ever know if anything about the password conforms to our rules beyond that | 20:04 |
kmalloc | just that it is claimed to be a hash. | 20:04 |
lbragstad | right | 20:04 |
kmalloc | i don't like it | 20:04 |
kmalloc | but... i can see why this RFE exists. | 20:04 |
lbragstad | i need to think about it | 20:04 |
*** aojea has joined #openstack-keystone | 20:04 | |
gagehugo | I don't think it really buys any real security | 20:04 |
kmalloc | personally, i'd rather support an "external validate" of password and/or vault storage of passwords | 20:04 |
gagehugo | (vault) storage of passwords :p | 20:05 |
knikolla | rather than pushing the hash password to keystone, i'd rather keystone delegate the password to an external system | 20:05 |
kmalloc | vault->hashicorp valut | 20:05 |
lbragstad | my knee jerk reaction is to be really skeptical of accepting *anything* of that kind of importance without knowing keystone executed the code to perform the hash | 20:05 |
*** raildo has joined #openstack-keystone | 20:05 | |
kmalloc | lbragstad: my reaction is "we did support this for ldap because $reasons$" | 20:05 |
kmalloc | and i get what people want | 20:05 |
kmalloc | i don't think it buys much of anything. | 20:06 |
kmalloc | but folks don't want CMS to have to house plaintext passwords | 20:06 |
kmalloc | that said, i think you just attack the other side then | 20:07 |
knikolla | could they deploy an ldap for admin users and manage them there? | 20:07 |
kmalloc | the consuming script/user is as much a target as keystone as a service for CMS to configure is. | 20:07 |
lbragstad | they could | 20:07 |
knikolla | also ansible and other CMS-es have plugins into vault, etc. | 20:08 |
knikolla | you don't really need to store the plaintext on CMS. | 20:08 |
kmalloc | yah | 20:08 |
kmalloc | ok sounds to be like "not in line with the project direction" | 20:08 |
gagehugo | could use barbican refs if it's automated | 20:08 |
kmalloc | gagehugo: not really, but that is a separate concerns | 20:09 |
gagehugo | it's not the best approach | 20:09 |
kmalloc | because passwords are needed to get data from barbican | 20:09 |
gagehugo | yeah | 20:09 |
kmalloc | barbican can't ever be in the auth path | 20:09 |
kmalloc | barbican can hold secrets for non-auth stuff. | 20:09 |
knikolla | but a password is needed anyway to access the api to store the hashed password. | 20:09 |
knikolla | they need a way to validate the api call | 20:09 |
kmalloc | yeah so... | 20:09 |
* kmalloc goes with marking this as not accepted. | 20:10 | |
kmalloc | and recommending using tools like vault integration with CMS etc. | 20:10 |
knikolla | ++ | 20:10 |
kmalloc | since this doesn't meaninfully reduce the surface area of attack | 20:10 |
gagehugo | ++ | 20:12 |
gagehugo | the token project extras sounds like they want to do custom policy? | 20:13 |
kmalloc | you can see my last update | 20:15 |
kmalloc | and marked the bug as invalid | 20:16 |
kmalloc | lbragstad, gagehugo, knikolla: anyone have issues with me marking https://bugs.launchpad.net/keystone/+bug/1807697 as invalid? i don't like the extras stuff and don't want to bloat more responses with it | 20:16 |
openstack | Launchpad bug 1807697 in OpenStack Identity (keystone) "[RFE] Token returns Project's extra properties" [Undecided,New] | 20:16 |
*** mvkr has joined #openstack-keystone | 20:16 | |
gagehugo | kmalloc: nope | 20:17 |
gagehugo | kmalloc: do we offically say anywhere that we do not support extras? | 20:17 |
kmalloc | i hope not | 20:17 |
gagehugo | support == implement new features | 20:17 |
kmalloc | i think we have stripped most of that crap from our docs | 20:17 |
kmalloc | or have said "Yo, don't do this" | 20:18 |
gagehugo | ok | 20:18 |
kmalloc | i'd rather have a "vendor data" key that deployers can put whatever they want in | 20:18 |
kmalloc | and that None explicitly clears | 20:18 |
*** shrasool has quit IRC | 20:18 | |
kmalloc | heck, we could use resource-options for that. | 20:18 |
kmalloc | just have a vendor-data r-o | 20:18 |
knikolla | extra agree with not using extras | 20:18 |
*** jmlowe has quit IRC | 20:26 | |
*** ayoung has joined #openstack-keystone | 20:30 | |
*** jmlowe has joined #openstack-keystone | 20:32 | |
*** jmlowe has quit IRC | 20:33 | |
*** aojea has quit IRC | 20:42 | |
*** aojea has joined #openstack-keystone | 20:44 | |
*** jmlowe has joined #openstack-keystone | 20:58 | |
gagehugo | kmalloc: did anything change with this: https://review.openstack.org/#/c/616304/ | 21:00 |
kmalloc | gagehugo: nothing yet. going to propose/work with it to land in dogpile directly | 21:08 |
gagehugo | ok, I saw you had a PR merge | 21:10 |
*** sapd1_ has quit IRC | 21:21 | |
*** sapd1_ has joined #openstack-keystone | 21:24 | |
*** aojea has quit IRC | 21:28 | |
*** aojea_ has joined #openstack-keystone | 21:28 | |
kmalloc | gagehugo: ah. maybe it did merge | 21:28 |
kmalloc | i hadn't gotten around to it. | 21:36 |
kmalloc | lots going on | 21:37 |
*** sapd1_ has quit IRC | 21:58 | |
*** sapd1_ has joined #openstack-keystone | 22:03 | |
*** imus has quit IRC | 22:05 | |
*** sapd1_ has quit IRC | 22:07 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Bump oslo.policy and oslo.context versions https://review.openstack.org/623248 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system reader role for projects https://review.openstack.org/624215 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system member role project test coverage https://review.openstack.org/624216 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system admin role in project API https://review.openstack.org/624217 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement domain reader functionality for projects https://review.openstack.org/624218 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement domain member functionality for projects https://review.openstack.org/624219 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement domain admin functionality for projects https://review.openstack.org/624220 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add explicit testing for project users and the project API https://review.openstack.org/624221 | 22:23 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove project policies from policy.v3cloudsample.json https://review.openstack.org/624222 | 22:23 |
*** aojea_ has quit IRC | 22:33 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system reader role in domains API https://review.openstack.org/623334 | 22:36 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system member role domain test coverage https://review.openstack.org/605849 | 22:36 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system admin role in domains API https://review.openstack.org/605850 | 22:36 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Allow domain users to access the GET domain API https://review.openstack.org/605851 | 22:36 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Allow project users to retrieve domains https://review.openstack.org/605871 | 22:36 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove domain policies from policy.v3cloudsample.json https://review.openstack.org/605876 | 22:36 |
lbragstad | gagehugo i had to clean up one release note ^ | 22:36 |
lbragstad | cc rodrigods ^ | 22:36 |
*** itlinux has quit IRC | 22:43 | |
*** rcernin has joined #openstack-keystone | 22:59 | |
gagehugo | kmalloc: gotcha, no rush was just curious | 23:00 |
gagehugo | lbragstad: ack | 23:00 |
*** dave-mccowan has quit IRC | 23:19 | |
*** raildo has quit IRC | 23:46 | |
*** itlinux has joined #openstack-keystone | 23:49 |
Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!