*** itlinux has quit IRC | 00:02 | |
*** Emine has quit IRC | 00:04 | |
*** dave-mccowan has joined #openstack-keystone | 00:10 | |
*** dave-mccowan has quit IRC | 00:18 | |
*** Emine has joined #openstack-keystone | 00:34 | |
*** dmellado has joined #openstack-keystone | 00:53 | |
*** gyee has quit IRC | 01:18 | |
*** Dinesh_Bhor has joined #openstack-keystone | 01:48 | |
*** erus has quit IRC | 01:54 | |
*** Dinesh_Bhor has quit IRC | 01:55 | |
*** Emine has quit IRC | 02:00 | |
*** mhen has quit IRC | 02:22 | |
*** mhen has joined #openstack-keystone | 02:25 | |
*** erus has joined #openstack-keystone | 02:44 | |
*** Dinesh_Bhor has joined #openstack-keystone | 02:57 | |
*** Dinesh_Bhor has quit IRC | 03:10 | |
*** Dinesh_Bhor has joined #openstack-keystone | 03:18 | |
*** rcernin has quit IRC | 03:25 | |
*** rcernin has joined #openstack-keystone | 03:27 | |
*** rcernin has quit IRC | 03:28 | |
*** rcernin has joined #openstack-keystone | 03:28 | |
*** Dinesh_Bhor has quit IRC | 03:43 | |
*** Dinesh_Bhor has joined #openstack-keystone | 04:10 | |
*** kmalloc has quit IRC | 05:14 | |
*** itlinux has joined #openstack-keystone | 05:45 | |
*** gagehugo has quit IRC | 06:23 | |
*** mgagne_ has quit IRC | 06:35 | |
*** mgagne has joined #openstack-keystone | 06:39 | |
*** Dinesh_Bhor has quit IRC | 07:01 | |
*** Dinesh_Bhor has joined #openstack-keystone | 07:03 | |
*** imacdonn has quit IRC | 07:29 | |
*** imacdonn has joined #openstack-keystone | 07:29 | |
*** gagehugo has joined #openstack-keystone | 08:20 | |
*** Dinesh_Bhor has quit IRC | 08:21 | |
*** Dinesh_Bhor has joined #openstack-keystone | 08:27 | |
*** amoralej|off is now known as amoralej | 08:38 | |
*** Dinesh_Bhor has quit IRC | 09:05 | |
*** rcernin has quit IRC | 09:18 | |
*** Dinesh_Bhor has joined #openstack-keystone | 09:25 | |
*** xek has joined #openstack-keystone | 09:42 | |
*** Dinesh_Bhor has quit IRC | 10:02 | |
*** erus has quit IRC | 10:11 | |
*** gary_perkins has joined #openstack-keystone | 10:17 | |
*** yan0s has joined #openstack-keystone | 10:32 | |
*** Dinesh_Bhor has joined #openstack-keystone | 10:34 | |
*** Dinesh_Bhor has quit IRC | 10:36 | |
*** jmlowe has quit IRC | 11:37 | |
*** jmlowe has joined #openstack-keystone | 11:41 | |
*** ileixe has joined #openstack-keystone | 11:46 | |
ileixe | hi forks | 11:49 |
---|---|---|
*** raildo has joined #openstack-keystone | 12:01 | |
*** jrist has quit IRC | 13:12 | |
*** imus has joined #openstack-keystone | 13:17 | |
*** jrist has joined #openstack-keystone | 13:30 | |
*** yan0s has quit IRC | 13:35 | |
*** yan0s has joined #openstack-keystone | 13:50 | |
*** amoralej is now known as amoralej|lunch | 13:50 | |
*** ileixe_ has joined #openstack-keystone | 13:55 | |
*** ayoung has quit IRC | 13:56 | |
*** ileixe_ has quit IRC | 14:17 | |
*** yan0s has quit IRC | 14:18 | |
lbragstad | o/ | 14:22 |
cmurphy | \o | 14:22 |
*** yan0s has joined #openstack-keystone | 14:36 | |
*** amoralej|lunch is now known as amoralej | 14:43 | |
*** ileixe_ has joined #openstack-keystone | 14:58 | |
*** itlinux has quit IRC | 15:00 | |
*** wxy| has joined #openstack-keystone | 15:07 | |
*** mchlumsky has joined #openstack-keystone | 15:22 | |
lbragstad | pretty easy review if anyone wants to take a look https://review.openstack.org/#/c/624972/ | 15:24 |
cmurphy | ugh damn | 15:25 |
* lbragstad is a troll | 15:30 | |
lbragstad | i figured you'd be the one to bite, too | 15:30 |
cmurphy | it's that point in the afternoon where i can only handle easy tasks | 15:31 |
lbragstad | yeah... i hear ya | 15:32 |
lbragstad | i hit that yesterday | 15:32 |
lbragstad | afternoon | 15:32 |
*** mchlumsky has quit IRC | 15:34 | |
*** mchlumsky has joined #openstack-keystone | 15:47 | |
*** ileixe has quit IRC | 15:54 | |
*** ileixe_ is now known as ileixe | 15:54 | |
*** yan0s has quit IRC | 15:59 | |
*** itlinux has joined #openstack-keystone | 16:04 | |
*** itlinux_ has joined #openstack-keystone | 16:08 | |
*** itlinux has quit IRC | 16:12 | |
*** dave-mccowan has joined #openstack-keystone | 16:13 | |
*** dave-mccowan has quit IRC | 16:18 | |
*** spa-87 has joined #openstack-keystone | 16:26 | |
*** dave-mccowan has joined #openstack-keystone | 16:26 | |
*** jonher has quit IRC | 16:34 | |
*** jonher has joined #openstack-keystone | 16:35 | |
*** jonher has quit IRC | 16:36 | |
*** jonher has joined #openstack-keystone | 16:37 | |
*** jonher_ has joined #openstack-keystone | 16:40 | |
*** jonher has quit IRC | 16:43 | |
*** jonher_ is now known as jonher | 16:43 | |
ileixe | @lbragstad hello | 17:01 |
gagehugo | ileixe: restrict resources per project right? | 17:01 |
lbragstad | o/ | 17:01 |
ileixe | yes exactly | 17:02 |
ileixe | we can restrict per only one project and we need to grouping scheme | 17:02 |
*** wxy| has quit IRC | 17:03 | |
lbragstad | so - you want to tag a project with something and that only allows certain users to call that api in neutron? | 17:05 |
ileixe | yes. user in a project with tagging can only access the resource matching the tag | 17:05 |
ileixe | users in dev project only access to dev_network for example | 17:06 |
lbragstad | are networks in neutron not project-specific? | 17:06 |
ileixe | yes provider network | 17:06 |
ileixe | we have a giant provivder network | 17:06 |
ileixe | all users can acceess the network since it has shared tag | 17:07 |
ileixe | I'm not sure it's general architecture, but we are currenlty operating like that. | 17:07 |
lbragstad | ok - so you have a provider network that maps to some physical network space, which is shared across all projects... | 17:08 |
ileixe | yes exactly | 17:08 |
gagehugo | ah | 17:08 |
lbragstad | retracing steps here, but you have two of them, then? | 17:09 |
lbragstad | you have one for prod and one for dev | 17:10 |
ileixe | yes | 17:10 |
lbragstad | but you don't have prod or dev projects, instead you may have project foo which is tagged as 'dev' and project bar which is tagged as 'prod' | 17:10 |
ileixe | we have many projects | 17:11 |
ileixe | projects does not restricted to 'dev', 'prod' | 17:11 |
ileixe | conceptually belongs to 'dev', 'prod' though.. | 17:11 |
lbragstad | ok - but it sounds like you're using tags to control access to which provider network needs to be used for a given project? | 17:11 |
ileixe | yes | 17:12 |
gagehugo | so a dev & prod domain? | 17:12 |
ileixe | From my understanding | 17:12 |
ileixe | domain scope has seperate users right? | 17:12 |
lbragstad | yeah - i guess that would require neutron to treat provider networks as domain-specific resources | 17:12 |
ileixe | but I think we want global scope for users. | 17:13 |
ileixe | user can access dev resource, prod resource | 17:13 |
ileixe | project is container for ACL | 17:13 |
lbragstad | if you have production instances, those have to live in a 'prod' project though? | 17:14 |
lbragstad | or production volumes | 17:14 |
ileixe | yes | 17:15 |
lbragstad | so production resources are still scoped to a project | 17:15 |
ileixe | Um.. but in fact currenlty one project can access prod/dev at the same time | 17:16 |
ileixe | admin project for example.. | 17:16 |
ileixe | so my point is project can be tagged 'dev' or 'prod' or ['dev', 'prod'] | 17:17 |
lbragstad | you mean someone with a token scoped to the admin project can access prod and dev resources? | 17:17 |
ileixe | conceptually admin | 17:18 |
lbragstad | that kinda sounds like system scope | 17:18 |
lbragstad | not totally, but a little | 17:18 |
ileixe | yes I investigate that more | 17:19 |
ileixe | i will | 17:19 |
lbragstad | traditionally, keystone doesn't really allow you to view resources from multiple projects at once | 17:19 |
ileixe | yes, our architecture seems to be a little weird.. | 17:19 |
*** spa-87 has quit IRC | 17:20 | |
lbragstad | but - currently, tokens to the admin project can theoretically do that kind of thing (e.g., GET /v2/servers?all_tenants=True) | 17:20 |
ileixe | yes | 17:20 |
lbragstad | and i'm sure you're aware, tokens scoped to the admin project also allow you to manage things like hypervisors, services, endpoints, etc... | 17:21 |
lbragstad | system scope is an attempt to solve the second case | 17:21 |
lbragstad | where resources that are specific to the infrastructure of the deployment have a construct that protects them in the same way instances are accessible with project-scoped tokens | 17:22 |
ileixe | sounds good | 17:23 |
ileixe | Can I use the system-scope for our 'dev' 'prod' conecpt? | 17:23 |
lbragstad | for some things, maybe | 17:23 |
ileixe | Actually we mapped the 'dev'/'prod' things to nova aggregate also | 17:23 |
ileixe | I will be very happy to use general building block for the purpose | 17:24 |
lbragstad | do you expose resources tagged with ['dev', 'prod'] to end users/customers? | 17:24 |
ileixe | yes | 17:24 |
ileixe | it's mapped to nova availality zone | 17:25 |
ileixe | so end user can choose | 17:25 |
ileixe | (when they are in project with both tags) | 17:25 |
lbragstad | are they allowed to make writeable changes to those resources? | 17:25 |
ileixe | no | 17:25 |
lbragstad | ok | 17:25 |
ileixe | change is not allowed | 17:25 |
ileixe | it's for admin | 17:25 |
lbragstad | so you reserve that information for people managing the deployment - got it | 17:26 |
ileixe | yep | 17:26 |
lbragstad | s/information/functionality/ | 17:26 |
lbragstad | i'm not sure if you've stumbled across this information yet | 17:26 |
lbragstad | but we do have some documentation that details the concepts a little better than what i described | 17:26 |
lbragstad | https://docs.openstack.org/keystone/latest/admin/tokens.html | 17:26 |
lbragstad | http://specs.openstack.org/openstack/keystone-specs/specs/keystone/queens/system-scope.html (specification) | 17:27 |
lbragstad | http://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/policy-security-roadmap.html (conceptual overview of how all this should work together) | 17:27 |
ileixe | Thanks I will go though the specs | 17:27 |
lbragstad | http://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/policy-goals.html (more conceptual overview) | 17:27 |
lbragstad | sounds good - come back and ask questions if you have any | 17:28 |
ileixe | Thanks it's very precise time for me | 17:28 |
ileixe | And can I ask one more question for you..? | 17:28 |
ileixe | it's not about the issue we talked about thoguh | 17:28 |
lbragstad | sure | 17:29 |
ileixe | It's about configurable jsonschema | 17:29 |
ileixe | I found you was author of https://bugs.launchpad.net/keystone/+bug/1599546 | 17:29 |
openstack | Launchpad bug 1599546 in OpenStack Identity (keystone) "Make validation patterns configurable" [Low,Opinion] | 17:29 |
ileixe | and it's exactly what we want | 17:30 |
ileixe | Was it abandoded at all? | 17:30 |
lbragstad | do you want configurable jsonschema for all of keystone's API? | 17:30 |
ileixe | What we want to for now is | 17:30 |
ileixe | project | 17:30 |
ileixe | name | 17:30 |
lbragstad | mmm | 17:31 |
ileixe | but we also have | 17:31 |
ileixe | many general cases | 17:31 |
ileixe | for other project of course | 17:31 |
ileixe | e.g. instance name for nova | 17:31 |
lbragstad | so.. iirc that bug was specific to a couple special cases | 17:31 |
lbragstad | for example, we let operators configure password strength using a regex | 17:32 |
ileixe | um.. | 17:32 |
ileixe | but I think it's general enough for operator | 17:32 |
ileixe | they ask me a lot | 17:32 |
ileixe | to restrict the name of instance, name of project, all the other things.. | 17:32 |
lbragstad | the effort wasn't abandoned | 17:33 |
ileixe | imho , at least it worth to give the config.. | 17:33 |
ileixe | then can i purse on it? | 17:33 |
ileixe | I really want the feature. | 17:34 |
lbragstad | kmalloc (he's on vacation currently) might have ideas on how to achieve this with user options, too | 17:34 |
lbragstad | https://bugs.launchpad.net/keystone/+bug/1599546/comments/5 | 17:35 |
openstack | Launchpad bug 1599546 in OpenStack Identity (keystone) "Make validation patterns configurable" [Low,Opinion] | 17:35 |
ileixe | Okay then I will ask him later. | 17:35 |
ileixe | Many thanks lbragstad! | 17:36 |
lbragstad | ileixe no problem - thanks for swinging by | 17:36 |
ileixe | See you later :) | 17:36 |
lbragstad | o/ | 17:36 |
lbragstad | zzzeek o/ | 17:39 |
zzzeek | lbragstad: hey | 17:39 |
lbragstad | curious if you'd be able to take a peak as a sql-specific question we have on https://review.openstack.org/#/c/623928/3 | 17:39 |
lbragstad | er... https://review.openstack.org/#/c/623928/2 | 17:40 |
zzzeek | lbragstad: ok | 17:40 |
zzzeek | lbragstad: i think i answered what was asked | 17:43 |
zzzeek | you wanted to konw if the ORDER BY would have negative perf imapct | 17:43 |
zzzeek | i assume | 17:43 |
* lbragstad checks | 17:43 | |
lbragstad | so order_by sounds like a valid solution, pending we can recreate the issue | 17:43 |
zzzeek | lbragstad: if you are doing any kind of LIMIT on this query then ORDER BY is mandatory | 17:44 |
lbragstad | and if ``keystone.conf [identity] list_limit = 0`` then order_by is still negligible? | 17:49 |
*** jmlowe has quit IRC | 17:49 | |
lbragstad | that case apparently isn't affected according to https://bugs.launchpad.net/keystone/+bug/1807805 | 17:50 |
openstack | Launchpad bug 1807805 in OpenStack Identity (keystone) "User list returns "none" for some user names" [Undecided,In progress] - Assigned to Zhongcheng Lao (zlao) | 17:50 |
*** imus has quit IRC | 17:53 | |
*** ileixe has quit IRC | 17:54 | |
* bnemec suspects Lance will never ping him in a keystone meeting again | 18:00 | |
* bnemec hums Wrecking Ball :-) | 18:00 | |
nsmeds | strange error started occurring https://gist.github.com/nikosmeds/93859f274a7332bd3f4a076981140eee | 18:02 |
nsmeds | the same command without `--names` is successful | 18:02 |
nsmeds | and not seeing anything related in keystone logs | 18:03 |
nsmeds | recall updating `openstacksdk` last week, possibly introduced the issue | 18:05 |
*** jmlowe has joined #openstack-keystone | 18:06 | |
lbragstad | bnemec lol - not at all | 18:12 |
lbragstad | bnemec i'm going to step away for lunch quick, but if you want to keep going through the upgrade path re: policy let me know | 18:12 |
bnemec | lbragstad: Yeah, I haven't come up with anything great. Just the possibility of running the check twice, once with the or and once without. | 18:14 |
bnemec | Which I don't love. | 18:14 |
bnemec | It's complicated and potentially a significant amount of extra load. | 18:15 |
lbragstad | yeah | 18:15 |
lbragstad | we also had https://review.openstack.org/#/c/614195/ which uncovered some other use cases | 18:16 |
* lbragstad biab | 18:16 | |
*** itlinux_ has quit IRC | 18:21 | |
*** jmlowe has quit IRC | 18:21 | |
*** itlinux has joined #openstack-keystone | 18:21 | |
*** jmlowe has joined #openstack-keystone | 18:22 | |
*** jmlowe has quit IRC | 18:36 | |
*** jmlowe has joined #openstack-keystone | 18:43 | |
*** gyee has joined #openstack-keystone | 18:48 | |
*** jmlowe has quit IRC | 18:53 | |
*** jmlowe has joined #openstack-keystone | 19:21 | |
*** jmlowe has quit IRC | 19:53 | |
*** amoralej is now known as amoralej|off | 19:57 | |
*** jdennis has quit IRC | 20:01 | |
*** jmlowe has joined #openstack-keystone | 20:11 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add scope checks to common system role definitions https://review.openstack.org/626007 | 20:56 |
lbragstad | cmurphy don't feel you need to review it now - but I can start rebasing things on ^ (re: upgrade path from today's meeting) | 20:57 |
cmurphy | lbragstad: mmk will look tomorrow | 20:57 |
lbragstad | thanks | 20:58 |
openstackgerrit | Merged openstack/keystone master: Reorganize admin guide https://review.openstack.org/624972 | 21:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update endpoint policies for system reader https://review.openstack.org/619329 | 21:18 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add endpoint tests for system member role https://review.openstack.org/619330 | 21:18 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update endpoint policies for system admin https://review.openstack.org/619331 | 21:18 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with endpoints https://review.openstack.org/619332 | 21:18 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with endpoints https://review.openstack.org/619281 | 21:18 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove endpoint policies from policy.v3cloudsample.json https://review.openstack.org/619333 | 21:18 |
*** rcernin has joined #openstack-keystone | 21:22 | |
*** raildo has quit IRC | 21:36 | |
*** rcernin has quit IRC | 21:37 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add scope checks to common system role definitions https://review.openstack.org/626007 | 21:50 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update role policies for system admin https://review.openstack.org/622526 | 21:50 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with roles https://review.openstack.org/622527 | 21:50 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with roles https://review.openstack.org/622528 | 21:50 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove role policies from policy.v3cloudsample.json https://review.openstack.org/622529 | 21:50 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Reuse common system role definitions for roles API https://review.openstack.org/626023 | 21:50 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update endpoint policies for system reader https://review.openstack.org/619329 | 21:52 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add endpoint tests for system member role https://review.openstack.org/619330 | 21:52 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update endpoint policies for system admin https://review.openstack.org/619331 | 21:52 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with endpoints https://review.openstack.org/619332 | 21:52 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with endpoints https://review.openstack.org/619281 | 21:52 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove endpoint policies from policy.v3cloudsample.json https://review.openstack.org/619333 | 21:52 |
*** jdennis has joined #openstack-keystone | 21:52 | |
*** rcernin has joined #openstack-keystone | 22:04 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add region protection tests for system readers https://review.openstack.org/619085 | 22:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add region tests for system member role https://review.openstack.org/619086 | 22:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update region policies to use system admin https://review.openstack.org/619241 | 22:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with regions https://review.openstack.org/619242 | 22:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with regions https://review.openstack.org/619243 | 22:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove region policies from policy.v3cloudsample.json https://review.openstack.org/619244 | 22:04 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with registered limits https://review.openstack.org/621017 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with registered limits https://review.openstack.org/621018 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove registered limit policies from policy.v3cloudsample.json https://review.openstack.org/621019 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add limit protection tests https://review.openstack.org/621020 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add limit tests for system member role https://review.openstack.org/621021 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update limit policies for system admin https://review.openstack.org/621022 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with limits https://review.openstack.org/621023 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with limits https://review.openstack.org/621024 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove limit policies from policy.v3cloudsample.json https://review.openstack.org/621025 | 22:28 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Use common system role definitions for registered limits https://review.openstack.org/626028 | 22:29 |
*** rcernin has quit IRC | 22:37 | |
*** rcernin has joined #openstack-keystone | 22:41 | |
*** rcernin has quit IRC | 22:43 | |
*** rcernin has joined #openstack-keystone | 22:45 | |
*** itlinux has quit IRC | 22:56 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update protocol policies for system reader https://review.openstack.org/625352 | 23:10 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add protocol tests for system member role https://review.openstack.org/625353 | 23:10 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system admin role in protocol API https://review.openstack.org/625354 | 23:10 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with protocols https://review.openstack.org/625355 | 23:10 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with protocols https://review.openstack.org/625356 | 23:10 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove protocol policies from v3cloudsample.json https://review.openstack.org/625357 | 23:10 |
*** jdennis has quit IRC | 23:15 | |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update mapping policies for system reader https://review.openstack.org/619612 | 23:20 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add mapping tests for system member role https://review.openstack.org/619613 | 23:20 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update mapping policies for system admin https://review.openstack.org/619614 | 23:20 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with mappings https://review.openstack.org/619615 | 23:20 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with mappings https://review.openstack.org/619616 | 23:20 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove mapping policies from policy.v3cloudsample.json https://review.openstack.org/619617 | 23:20 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update idp policies for system reader https://review.openstack.org/619371 | 23:31 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add idp tests for system member role https://review.openstack.org/619372 | 23:31 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update idp policies for system admin https://review.openstack.org/619373 | 23:31 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with idps https://review.openstack.org/619374 | 23:31 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with idps https://review.openstack.org/619375 | 23:31 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove idp policies from policy.v3cloudsample.json https://review.openstack.org/619376 | 23:31 |
lbragstad | wxy-xiyuan because we're not deprecating the policies here - we're gonna see some failures i think https://review.openstack.org/#/c/626028/1 | 23:37 |
* lbragstad wanders off for a bit | 23:37 | |
*** dave-mccowan has quit IRC | 23:56 |
Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!