| *** eRus is now known as erus | 00:02 | |
| *** erus is now known as eRus | 00:04 | |
| *** eRus is now known as erus | 00:04 | |
| *** erus is now known as erus_ | 00:13 | |
| *** erus_ has quit IRC | 00:29 | |
| *** erus_ has joined #openstack-keystone | 00:42 | |
| *** ileixe has joined #openstack-keystone | 00:43 | |
| *** erus_ has quit IRC | 00:49 | |
| *** erus1 has joined #openstack-keystone | 00:49 | |
| *** erus1 is now known as erus_ | 00:49 | |
| *** erus1 has joined #openstack-keystone | 00:50 | |
| *** erus1 is now known as erus_ | 00:50 | |
| *** erus_ has quit IRC | 01:06 | |
| *** itlinux has joined #openstack-keystone | 01:08 | |
| *** erus has joined #openstack-keystone | 01:14 | |
| *** ileixe has quit IRC | 02:01 | |
| *** ileixe has joined #openstack-keystone | 02:02 | |
| *** ileixe has quit IRC | 02:04 | |
| *** ileixe has joined #openstack-keystone | 02:04 | |
| *** ileixe has quit IRC | 02:58 | |
| *** mhen has quit IRC | 02:59 | |
| *** ileixe has joined #openstack-keystone | 02:59 | |
| *** mhen has joined #openstack-keystone | 03:02 | |
| *** whoami-rajat has joined #openstack-keystone | 03:16 | |
| *** spsurya has joined #openstack-keystone | 04:22 | |
| *** wxy-xiyuan has quit IRC | 04:24 | |
| *** bzhao__ has quit IRC | 04:26 | |
| *** dims has quit IRC | 04:47 | |
| *** dims has joined #openstack-keystone | 04:48 | |
| *** erus has quit IRC | 04:54 | |
| *** erus has joined #openstack-keystone | 04:56 | |
| *** dims has quit IRC | 04:56 | |
| *** dims has joined #openstack-keystone | 04:56 | |
| *** erus has quit IRC | 05:02 | |
| *** erus has joined #openstack-keystone | 05:08 | |
| *** spsurya has quit IRC | 05:10 | |
| *** spsurya has joined #openstack-keystone | 05:13 | |
| *** erus has quit IRC | 05:14 | |
| *** erus has joined #openstack-keystone | 05:23 | |
| *** erus has quit IRC | 05:29 | |
| *** shyamb has joined #openstack-keystone | 05:37 | |
| *** erus has joined #openstack-keystone | 05:38 | |
| *** shyamb has quit IRC | 05:43 | |
| *** erus has quit IRC | 05:44 | |
| *** shyamb has joined #openstack-keystone | 05:51 | |
| *** erus has joined #openstack-keystone | 05:53 | |
| *** erus has quit IRC | 06:00 | |
| *** erus has joined #openstack-keystone | 06:08 | |
| *** erus has quit IRC | 06:14 | |
| *** erus has joined #openstack-keystone | 06:23 | |
| *** gyee has quit IRC | 06:24 | |
| *** erus has quit IRC | 06:29 | |
| *** erus has joined #openstack-keystone | 06:38 | |
| *** erus has quit IRC | 06:44 | |
| *** shyamb has quit IRC | 06:50 | |
| *** erus has joined #openstack-keystone | 06:53 | |
| *** bzhao__ has joined #openstack-keystone | 06:58 | |
| *** rcernin has quit IRC | 06:58 | |
| *** erus has quit IRC | 06:59 | |
| *** shyamb has joined #openstack-keystone | 07:03 | |
| *** shyamb has quit IRC | 07:05 | |
| *** shyamb has joined #openstack-keystone | 07:06 | |
| *** erus has joined #openstack-keystone | 07:08 | |
| *** erus has quit IRC | 07:14 | |
| *** erus has joined #openstack-keystone | 07:23 | |
| *** shyamb has quit IRC | 07:25 | |
| *** erus has quit IRC | 07:30 | |
| *** wxy-xiyuan has joined #openstack-keystone | 07:32 | |
| *** shyamb has joined #openstack-keystone | 07:32 | |
| *** erus has joined #openstack-keystone | 07:38 | |
| *** pcaruana has joined #openstack-keystone | 07:42 | |
| *** erus has quit IRC | 07:44 | |
| *** shyamb has quit IRC | 07:46 | |
| *** sapd1_ has quit IRC | 07:50 | |
| *** sapd1_ has joined #openstack-keystone | 07:50 | |
| *** erus has joined #openstack-keystone | 07:53 | |
| *** erus has quit IRC | 07:59 | |
| *** erus has joined #openstack-keystone | 08:08 | |
| *** erus has quit IRC | 08:14 | |
| *** erus has joined #openstack-keystone | 08:23 | |
| *** xek has joined #openstack-keystone | 08:24 | |
| *** yan0s has joined #openstack-keystone | 08:25 | |
| *** erus has quit IRC | 08:30 | |
| *** erus has joined #openstack-keystone | 08:38 | |
| yan0s | Hi all, I'm having some trouble setting up federated keystone with shibboleth | 08:41 |
|---|---|---|
| yan0s | in keystone.log I get the following: | 08:41 |
| yan0s | (keystone.federation.utils): 2019-01-08 08:37:59,144 DEBUG identity_values: [] | 08:42 |
| yan0s | (keystone.federation.utils): 2019-01-08 08:37:59,144 WARNING Could not map any federated user properties to identity values. Check debug logs or the mapping used for additional details. | 08:43 |
| yan0s | and in horizon GUI: | 08:43 |
| yan0s | {"error": {"message": "The request you have made requires authentication.", "code": 401, "title": "Unauthorized"}} | 08:43 |
| yan0s | for starters there should be a user in shibboleth and a corresponding user in OpenStack. Is that correct? | 08:44 |
| *** erus has quit IRC | 08:44 | |
| yan0s | and somehow mapping rules should match them | 08:45 |
| *** evrardjp_ has joined #openstack-keystone | 08:48 | |
| *** evrardjp__ has joined #openstack-keystone | 08:49 | |
| *** evrardjp has quit IRC | 08:51 | |
| *** evrardjp_ has quit IRC | 08:52 | |
| *** erus has joined #openstack-keystone | 08:53 | |
| *** evrardjp__ has quit IRC | 08:53 | |
| cmurphy | yan0s: there doesn't have to already be a corresponding user in openstack, it can create a special "shadow" user if there is no local user to map to | 08:54 |
| cmurphy | yan0s: have you already seen https://docs.openstack.org/keystone/latest/admin/federation/mapping_combinations.html#mapping-rules ? | 08:54 |
| *** shyamb has joined #openstack-keystone | 08:56 | |
| *** erus has quit IRC | 09:00 | |
| yan0s | cmurphy: Thanks! This is my rule: https://pastebin.com/D0NjXq5Z | 09:00 |
| cmurphy | yan0s: is your IdP sending an attribute called "username"? | 09:01 |
| yan0s | I have tried with and without existing user in OpenStack and it fails | 09:01 |
| yan0s | yes | 09:01 |
| yan0s | also in /etc/shibboleth/attribute-map.xml I have added this line | 09:02 |
| yan0s | <Attribute name="username" id="username"/> | 09:02 |
| *** evrardjp has joined #openstack-keystone | 09:03 | |
| cmurphy | yan0s: the debug logs should show the saml assertion values and several more lines about how it is rendering the mapping | 09:03 |
| yan0s | is that enough? | 09:03 |
| cmurphy | yan0s: if you're sure that the IdP is sending "username" then that should be fine | 09:03 |
| cmurphy | you might need to turn on insecure_debug to get more detailed logs about the assertion and the mapping | 09:03 |
| *** erus has joined #openstack-keystone | 09:08 | |
| yan0s | here is the full logs for a failed login: https://pastebin.com/zHTN7HWi | 09:10 |
| yan0s | do you know how can I read the idp attributes sent in keystone? | 09:11 |
| *** erus has quit IRC | 09:14 | |
| cmurphy | yan0s: it is not sending "username" | 09:17 |
| cmurphy | yan0s: you can look in /var/log/shibboleth/shibd_warn.log or shibd.log and look for messages about unmapped attributes on your SP | 09:18 |
| cmurphy | you can also check the IdP documentation, if you're using simplesamlphp then it looks like these are some attributes you can use https://simplesamlphp.org/docs/stable/simplesamlphp-sp#section_5 | 09:18 |
| openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Optimize fernet token and receipts in cli.py https://review.openstack.org/627364 | 09:19 |
| *** erus has joined #openstack-keystone | 09:23 | |
| *** erus has quit IRC | 09:29 | |
| yan0s | thanks this is very helpful | 09:33 |
| yan0s | how do you know it is not sending "username"? | 09:33 |
| cmurphy | yan0s: because I don't see it in the "assertion data" log | 09:34 |
| openstackgerrit | Colleen Murphy proposed openstack/keystone master: Remove duplicated TOC in configuration guide https://review.openstack.org/629115 | 09:37 |
| *** erus has joined #openstack-keystone | 09:38 | |
| *** ileixe has left #openstack-keystone | 09:42 | |
| *** erus has quit IRC | 09:44 | |
| *** erus has joined #openstack-keystone | 09:53 | |
| *** erus has quit IRC | 10:00 | |
| *** shyamb has quit IRC | 10:00 | |
| *** shyamb has joined #openstack-keystone | 10:05 | |
| *** erus has joined #openstack-keystone | 10:08 | |
| *** shyamb has quit IRC | 10:33 | |
| *** erus has quit IRC | 11:23 | |
| *** erus has joined #openstack-keystone | 11:23 | |
| *** erus has quit IRC | 11:29 | |
| *** erus has joined #openstack-keystone | 11:36 | |
| *** shyamb has joined #openstack-keystone | 11:48 | |
| *** shyamb has quit IRC | 12:30 | |
| *** shyamb has joined #openstack-keystone | 12:42 | |
| openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Update doc for token_setup and token_rotate https://review.openstack.org/629168 | 12:46 |
| openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Update doc for token_setup and token_rotate https://review.openstack.org/629168 | 12:47 |
| openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Update doc for token_setup and token_rotate https://review.openstack.org/629168 | 12:48 |
| *** sayalilunkad has quit IRC | 12:51 | |
| *** vishakha has joined #openstack-keystone | 12:51 | |
| *** raildo has joined #openstack-keystone | 12:51 | |
| *** sayalilunkad has joined #openstack-keystone | 12:51 | |
| *** rcherrueau has joined #openstack-keystone | 12:52 | |
| *** szaher has joined #openstack-keystone | 13:08 | |
| *** yan0s has quit IRC | 13:09 | |
| *** erus has quit IRC | 13:13 | |
| *** erus has joined #openstack-keystone | 13:13 | |
| *** yan0s has joined #openstack-keystone | 13:24 | |
| *** erus_ has joined #openstack-keystone | 13:30 | |
| *** zigo has joined #openstack-keystone | 13:30 | |
| *** rcherrueau has quit IRC | 13:40 | |
| *** trident has quit IRC | 13:41 | |
| *** trident has joined #openstack-keystone | 13:42 | |
| *** jhesketh has quit IRC | 13:45 | |
| *** szaher has quit IRC | 13:47 | |
| *** jhesketh has joined #openstack-keystone | 13:47 | |
| *** szaher has joined #openstack-keystone | 13:52 | |
| *** trident has quit IRC | 14:03 | |
| *** trident has joined #openstack-keystone | 14:03 | |
| erus_ | hello | 14:07 |
| *** yan0s has quit IRC | 14:09 | |
| *** yan0s has joined #openstack-keystone | 14:10 | |
| lbragstad | o/ | 14:10 |
| cmurphy | \o | 14:10 |
| erus_ | how are you today? | 14:14 |
| erus_ | :D | 14:14 |
| erus_ | here is really hot today! | 14:15 |
| lbragstad | i'm well :) | 14:16 |
| erus_ | great! | 14:16 |
| erus_ | i'm a little frustrated xD i can't figure out what's wrong with my idp configuration. Right now i have this error | 14:17 |
| erus_ | ERROR Shibboleth.SSO.SAML2 [2]: failed to decrypt assertion: Unable to resolve any key decryption keys. | 14:18 |
| erus_ | that is from shibboleth logs | 14:18 |
| erus_ | and in apache logs says | 14:18 |
| erus_ | 2019-01-08 11:14:23.047400 A valid authentication statement was not found in the incoming message. | 14:19 |
| erus_ | I ran out of ideas xD | 14:19 |
| cmurphy | erus_: it seems like maybe you didn't configure the IdP's metadata correctly | 14:20 |
| cmurphy | erus_: what do you have for MetadataProvider in shibboleth2.xml? | 14:20 |
| erus_ | <MetadataProvider type="XML" url="https://samltest.id/saml/idp" backingFile="samltest-metadata.xml"/> | 14:21 |
| cmurphy | erus_: did you restart the shibd daemon after you edited shibboleth2.xml? | 14:22 |
| erus_ | yep | 14:23 |
| knikolla | o/ | 14:23 |
| erus_ | hello knikolla :) | 14:23 |
| knikolla | Hi everyone, hope you had great holidays :) | 14:23 |
| knikolla | hi erus | 14:23 |
| erus_ | yay o/ | 14:23 |
| erus_ | how are you doing? | 14:24 |
| cmurphy | erus_: did you check the logs on samltest.id to see if anything strange was happening on that side? | 14:24 |
| knikolla | erus_: I'm good, thank you for asking :) what about you? | 14:26 |
| erus_ | Looking up message encoder based on binding URI: urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST | 14:28 |
| erus_ | I'm fine, we are in summer and it's really hot :( | 14:29 |
| *** shyamb has quit IRC | 14:29 | |
| erus_ | and trying to have things working with samltest as idp :D | 14:30 |
| erus_ | and have this one too cmurphy No SAMLBindingContext or binding URI available, error must be handled locally | 14:30 |
| cmurphy | maybe knikolla has an idea | 14:31 |
| knikolla | does this happen during authentication? | 14:34 |
| erus_ | yep | 14:35 |
| erus_ | when i try to authenticate it goes to the redirecction, i enter the credentials and then it says opensaml::FatalProfileException | 14:36 |
| erus_ | redirection* | 14:37 |
| knikolla | This error is on the SP side or IdP side? | 14:37 |
| erus_ | in shibboleth logs says: ERROR Shibboleth.SSO.SAML2 [2]: failed to decrypt assertion: Unable to resolve any key decryption keys. | 14:37 |
| *** abhi89 has joined #openstack-keystone | 14:37 | |
| openstackgerrit | Merged openstack/oslo.policy master: Fix sample config value when set_defaults is used https://review.openstack.org/623292 | 14:39 |
| erus_ | i think is on the SP side | 14:39 |
| abhi89 | Hi All.. I am having a fernet token with me & now I want to extract username & project out of this.. even session..any leads on which methods I can choose from keystone code? or any sample code already available.. need help! | 14:40 |
| lbragstad | abhi89 can you call the GET /v3/auth/tokens API with that token? | 14:41 |
| lbragstad | the response body should contain all that information | 14:41 |
| abhi89 | lbragstad: thanks! | 14:42 |
| erus_ | opensaml::FatalProfileException at (http://192.168.122.11/Shibboleth.sso/SAML2/POST) | 14:44 |
| erus_ | A valid authentication statement was not found in the incoming message. | 14:44 |
| knikolla | erus_: did you register the SP metadata with samltest.id? | 14:44 |
| *** erus_ has quit IRC | 14:49 | |
| *** wxy| has joined #openstack-keystone | 14:54 | |
| erus | Did you mean if i uploaded it? | 14:59 |
| cmurphy | yes | 15:00 |
| openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Add openstack_groups to assertion https://review.openstack.org/588211 | 15:05 |
| *** itlinux has quit IRC | 15:21 | |
| *** markvoelker has joined #openstack-keystone | 15:23 | |
| *** markvoelker has quit IRC | 15:26 | |
| *** markvoelker has joined #openstack-keystone | 15:27 | |
| *** markvoelker has quit IRC | 15:27 | |
| erus | Yes i uploaded it | 15:34 |
| knikolla | erus: can I have a look at it? | 15:34 |
| erus | Yay give me a minute I'm in the subway :) | 15:35 |
| openstackgerrit | Merged openstack/keystone master: Consolidate WebSSO guide into SP instructions https://review.openstack.org/627976 | 15:41 |
| *** szaher has quit IRC | 16:08 | |
| *** szaher has joined #openstack-keystone | 16:09 | |
| *** pcaruana has quit IRC | 16:20 | |
| *** itlinux has joined #openstack-keystone | 16:20 | |
| openstackgerrit | Vishakha Agarwal proposed openstack/keystone master: Optimize fernet token and receipts in cli.py https://review.openstack.org/627364 | 16:22 |
| *** gyee has joined #openstack-keystone | 16:38 | |
| *** imacdonn has quit IRC | 16:50 | |
| *** imacdonn has joined #openstack-keystone | 16:51 | |
| *** wxy| has quit IRC | 17:00 | |
| *** yan0s has quit IRC | 17:20 | |
| *** erus_ has joined #openstack-keystone | 17:24 | |
| gyee | lbragstad, cmurphy, https://bugs.launchpad.net/keystone/+bug/1810983. Looks like we'll need to make the fix directly to stable/rocky and backport to stable/queens. | 17:35 |
| openstack | Launchpad bug 1810983 in OpenStack Identity (keystone) "domain admin unable to fetch domain" [Undecided,New] | 17:35 |
| lbragstad | gyee https://launchpad.net/bugs/1794864 | 17:39 |
| openstack | Launchpad bug 1794864 in OpenStack Identity (keystone) "Calling GET /v3/domains/{domain_id} with a project-scoped or domain-scoped token fails" [Medium,In progress] - Assigned to Lance Bragstad (lbragstad) | 17:39 |
| lbragstad | looks similar to that | 17:39 |
| lbragstad | https://review.openstack.org/#/c/605851/8 and https://review.openstack.org/#/c/605871/8 | 17:40 |
| gyee | oh | 17:41 |
| gyee | lbragstad, that won't fix it in stable/rocky | 17:42 |
| gyee | problem is in stable/rocky token was never in the auth_context | 17:42 |
| gyee | we add it back in there in this patch https://review.openstack.org/#/c/605539/24/keystone/common/context.py | 17:42 |
| lbragstad | i don't think we'll be able to pass context objects on stable branches since oslo.policy won't know how to understand them | 17:44 |
| gyee | used to work in stable/pike | 17:45 |
| lbragstad | passing a RequestContext object to enforce()? | 17:45 |
| gyee | https://github.com/openstack/keystone/blob/stable/pike/keystone/common/authorization.py#L68 | 17:46 |
| gyee | we pass the TokenModel | 17:46 |
| lbragstad | ah... yeah | 17:47 |
| lbragstad | that's a subclass of dict | 17:47 |
| gyee | so we can use things like token.project.id or token.project.domain.id | 17:47 |
| gyee | we switched over to oslo_context around stable/queens time frame and the TokenModel was left out of the auth_context | 17:48 |
| *** erus has quit IRC | 17:49 | |
| lbragstad | we do put a the token in the context still https://review.openstack.org/#/c/605539/24/keystone/server/flask/request_processing/middleware/auth_context.py | 17:50 |
| lbragstad | https://review.openstack.org/#/c/605539/24/keystone/common/context.py@65 | 17:50 |
| gyee | yes, in master branch only | 17:51 |
| gyee | we need it in stable/rocky and stable/queens also | 17:51 |
| gyee | master branch is OK, stable/rocky and queens are broken | 17:52 |
| *** erus has joined #openstack-keystone | 17:52 | |
| lbragstad | so - sometime in queens we stopped passing the tokenmodel? | 17:53 |
| gyee | yes | 17:53 |
| lbragstad | https://review.openstack.org/#/c/577567/ | 17:53 |
| lbragstad | that was only six weeks ago though | 17:54 |
| gyee | in stable/pike, we pass the tokenmodel here https://github.com/openstack/keystone/blob/stable/pike/keystone/common/authorization.py#L68 | 17:54 |
| lbragstad | so that can't be it | 17:54 |
| gyee | but in stable/queens, we removed that code in favor on oslo_context.to_policy_values() | 17:54 |
| lbragstad | ah | 17:54 |
| lbragstad | can we rewrite those policies to use the to_policy_values() instead? | 17:54 |
| gyee | yes, that's one solution | 17:55 |
| gyee | so instead of 'token.project.domain.id:%(target.domain.id)s', we could do this 'domain_id:%(target.domain.id)s' | 17:56 |
| lbragstad | i think i'd rather do that instead of using the v3 token contract in the syntax of policy check strings | 17:56 |
| lbragstad | right - i think so | 17:56 |
| gyee | but if there are any customer policies out there, people will continue to scream :-) | 17:56 |
| gyee | I would've imagined there are custom policies out there | 17:57 |
| lbragstad | probably | 17:57 |
| gyee | so this is essentially a backward compatibility issue | 17:57 |
| gyee | remember, openstack upgrades are rather slow. Not everybody is running off master branch in production :-) | 17:58 |
| lbragstad | right - but we also worked on deprecation tooling for this kind of thing, too | 17:58 |
| gyee | in the particular, I think its worth preserving backward compatibility since we've formally deprecated that syntax | 17:59 |
| gyee | I mean in this particular case | 17:59 |
| gyee | man I can't type and think at the same time :-) | 17:59 |
| openstackgerrit | Merged openstack/keystone master: Remove duplicated TOC in configuration guide https://review.openstack.org/629115 | 18:02 |
| lbragstad | so you think the backported fix needs to incorporate token.project.domain.id back? | 18:03 |
| lbragstad | or token.domain.id | 18:03 |
| gyee | yes | 18:04 |
| lbragstad | ok - i was going to propose marking https://bugs.launchpad.net/keystone/+bug/1810983 as a duplicate of https://bugs.launchpad.net/keystone/+bug/1794864 but if that's the solution we're going for i'd rather keep them separate | 18:04 |
| openstack | Launchpad bug 1810983 in OpenStack Identity (keystone) "domain admin unable to fetch domain" [Undecided,New] | 18:04 |
| openstack | Launchpad bug 1794864 in OpenStack Identity (keystone) "Calling GET /v3/domains/{domain_id} with a project-scoped or domain-scoped token fails" [Medium,In progress] - Assigned to Lance Bragstad (lbragstad) | 18:04 |
| gyee | I think we just need to backport this one https://review.openstack.org/#/c/605539/24/keystone/common/context.py | 18:04 |
| lbragstad | just that file though... not everything else | 18:05 |
| lbragstad | since the oslo.policy versions of the stable branches won't understand context objects | 18:05 |
| lbragstad | gyee updated - https://bugs.launchpad.net/keystone/+bug/1810983 | 18:09 |
| openstack | Launchpad bug 1810983 in OpenStack Identity (keystone) rocky "domain admin unable to fetch domain" [Medium,Triaged] | 18:09 |
| *** whoami-rajat has quit IRC | 18:12 | |
| *** erus_ has quit IRC | 18:16 | |
| *** erus_ has joined #openstack-keystone | 18:17 | |
| *** erus_ has quit IRC | 18:18 | |
| *** erus_ has joined #openstack-keystone | 18:19 | |
| *** erus_ has quit IRC | 18:20 | |
| gyee | lbragstad, sounds good, just that file should work | 18:21 |
| *** erus_ has joined #openstack-keystone | 18:21 | |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Allow domain users to access the registered limits API https://review.openstack.org/621017 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with registered limits https://review.openstack.org/621018 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove registered limit policies from policy.v3cloudsample.json https://review.openstack.org/621019 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add limit protection tests https://review.openstack.org/621020 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add limit tests for system member role https://review.openstack.org/621021 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update limit policies for system admin https://review.openstack.org/621022 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with limits https://review.openstack.org/621023 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with limits https://review.openstack.org/621024 | 18:24 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove limit policies from policy.v3cloudsample.json https://review.openstack.org/621025 | 18:24 |
| *** erus_ has quit IRC | 18:28 | |
| *** erus_ has joined #openstack-keystone | 18:29 | |
| *** erus_ has quit IRC | 18:30 | |
| *** erus_ has joined #openstack-keystone | 18:33 | |
| *** erus_ has quit IRC | 18:34 | |
| *** erus_ has joined #openstack-keystone | 18:36 | |
| *** erus_ has quit IRC | 18:38 | |
| *** erus_ has joined #openstack-keystone | 18:39 | |
| *** erus_ has quit IRC | 18:41 | |
| *** erus_ has joined #openstack-keystone | 18:42 | |
| *** lbragsta_ has joined #openstack-keystone | 18:52 | |
| *** ChanServ sets mode: +o lbragsta_ | 18:52 | |
| *** lbragstad has quit IRC | 18:52 | |
| *** lbragsta_ is now known as lbragstad | 18:55 | |
| *** erus_ has quit IRC | 19:00 | |
| *** erus_ has joined #openstack-keystone | 19:01 | |
| *** erus_ has quit IRC | 19:03 | |
| *** erus_ has joined #openstack-keystone | 19:06 | |
| *** erus_ has quit IRC | 19:10 | |
| *** erus_ has joined #openstack-keystone | 19:11 | |
| *** erus_ has quit IRC | 19:13 | |
| *** erus_ has joined #openstack-keystone | 19:13 | |
| *** erus_ has joined #openstack-keystone | 19:15 | |
| *** vishakha has quit IRC | 19:16 | |
| *** erus_ has quit IRC | 19:16 | |
| *** erus_ has joined #openstack-keystone | 19:18 | |
| lbragstad | wxy-xiyuan http://lists.openstack.org/pipermail/openstack-discuss/2019-January/001518.html our action item from last week | 19:21 |
| *** erus_ has quit IRC | 19:21 | |
| *** erus_ has joined #openstack-keystone | 19:22 | |
| *** erus_ has quit IRC | 19:23 | |
| *** erus_ has joined #openstack-keystone | 19:27 | |
| *** erus_ has quit IRC | 19:28 | |
| lbragstad | cmurphy i assume your +2 here means you're good with the wording of https://review.openstack.org/#/c/624217/4/releasenotes/notes/bug-1805403-c003627a64768716.yaml | 19:28 |
| lbragstad | if that's the case, i'll start respinning the other patches to match that wording | 19:28 |
| *** erus_ has joined #openstack-keystone | 19:29 | |
| cmurphy | lbragstad: yeah I think it's fine, I'm not sure how to make it less of a wall of text while still making sure people get all the information they need | 19:29 |
| *** erus_ has quit IRC | 19:29 | |
| lbragstad | right - i had the same problem | 19:29 |
| lbragstad | clearly | 19:30 |
| *** erus_ has joined #openstack-keystone | 19:30 | |
| *** erus_ has quit IRC | 19:31 | |
| *** erus_ has joined #openstack-keystone | 19:31 | |
| *** erus_ has quit IRC | 19:33 | |
| *** erus_ has joined #openstack-keystone | 19:36 | |
| *** erus_ has quit IRC | 19:37 | |
| *** erus_ has joined #openstack-keystone | 19:38 | |
| *** erus_ has quit IRC | 19:45 | |
| *** erus_ has joined #openstack-keystone | 19:46 | |
| *** erus_ has quit IRC | 19:49 | |
| *** erus_ has joined #openstack-keystone | 19:49 | |
| *** erus_ has quit IRC | 19:50 | |
| *** erus_ has joined #openstack-keystone | 19:51 | |
| *** erus_ has quit IRC | 19:52 | |
| mnaser | lbragstad: did you end up taking a decision wrt role names in openstack? | 19:53 |
| mnaser | i'm looking at creating a role of a user that can access swift.. and i'd like it to be reusable | 19:53 |
| mnaser | aka we don't have to tell everyone to change all their stuff to continue to work :) | 19:53 |
| lbragstad | we did | 19:53 |
| *** erus_ has joined #openstack-keystone | 19:53 | |
| lbragstad | keystone-manage bootstrap creates three roles for you out of the box | 19:53 |
| lbragstad | admin, member, and reader | 19:53 |
| mnaser | lbragstad: right, but what about service-specific roles, like say i want an account that have swift access only for example | 19:54 |
| mnaser | so a user can create an application credential for example which has that role included | 19:54 |
| lbragstad | oh - gotcha | 19:57 |
| lbragstad | so you mean being able to grant someone a role on the swift service? | 19:57 |
| *** erus_ has quit IRC | 19:57 | |
| *** erus_ has joined #openstack-keystone | 19:58 | |
| mnaser | yes, lbragstad | 19:58 |
| cmurphy | we don't have that yet | 19:58 |
| *** erus_ has quit IRC | 19:59 | |
| lbragstad | yeah - so being able to do that doesn't exist yet, but with the work cmurphy is doing, you should be able to make app creds specific to swift APIs | 19:59 |
| mnaser | so skillz_dat_swiftz as a role for now to a user is really the best way to go about it? | 19:59 |
| *** erus_ has joined #openstack-keystone | 19:59 | |
| lbragstad | yeah - that would work | 20:00 |
| lbragstad | if your solution isn't user specific, you could leverage the application credential whitelist stuff | 20:00 |
| lbragstad | http://specs.openstack.org/openstack/keystone-specs/specs/keystone/stein/capabilities-app-creds.html | 20:00 |
| cmurphy | well that would be use specific | 20:01 |
| cmurphy | it would be up to the user creating the application credential to restrict it | 20:01 |
| *** erus_ has quit IRC | 20:01 | |
| cmurphy | user* specific | 20:01 |
| *** gary_perkins has quit IRC | 20:01 | |
| mnaser | oh yeah that's fine | 20:02 |
| mnaser | that's so neat | 20:02 |
| *** erus_ has joined #openstack-keystone | 20:02 | |
| lbragstad | yeah - i guess it depends on how much you'd trust your users | 20:02 |
| lbragstad | because they'd need the role to scope things down | 20:02 |
| mnaser | so for now, it would be best to just add a 'swift' role | 20:02 |
| mnaser | and then when we have stein | 20:02 |
| mnaser | we can have them switch over to using that | 20:02 |
| mnaser | and then get rid of swift role | 20:02 |
| mordred | yeah. that facet of the appcreds is awesoe | 20:03 |
| *** erus_ has quit IRC | 20:03 | |
| mordred | awesome | 20:03 |
| lbragstad | well - if your swift capabilities require the 'member' role | 20:03 |
| *** abhi89 has quit IRC | 20:03 | |
| lbragstad | and you trust that to your users | 20:03 |
| lbragstad | but the 'member' role also allows them to do things you do' | 20:03 |
| mnaser | yeah that's what we're tryin to avoid | 20:03 |
| lbragstad | you don't necessarily want them to do* | 20:03 |
| lbragstad | then you'll need to be cautious | 20:03 |
| mnaser | we want to restrict to only swift | 20:03 |
| lbragstad | since users will need the 'member' role to access swift | 20:04 |
| mnaser | yeah | 20:04 |
| lbragstad | in order to create app cred whitelists | 20:04 |
| lbragstad | but if you use a 'swift' role and implies the 'member' role, and modify the policies accordingly, you should be good | 20:04 |
| mnaser | lbragstad: thats the plan, for now | 20:04 |
| *** erus_ has joined #openstack-keystone | 20:05 | |
| lbragstad | ok - sweet | 20:05 |
| *** erus_ has quit IRC | 20:05 | |
| mnaser | i'll be ready to break the new appcred work :) | 20:06 |
| lbragstad | eventually - it would be neat to be able to do ``openstack role add --user mnaser --service compute admin`` | 20:06 |
| mnaser | oooh that would be so neat | 20:06 |
| lbragstad | or ``openstack role add --user bob --service swift reader`` | 20:06 |
| *** gary_perkins has joined #openstack-keystone | 20:06 | |
| *** erus_ has joined #openstack-keystone | 20:06 | |
| mnaser | not enough minerals to get that | 20:06 |
| mnaser | :( | 20:06 |
| lbragstad | inoright? | 20:06 |
| *** erus_ has quit IRC | 20:07 | |
| mnaser | man | 20:07 |
| lbragstad | e:you_must_construct_additional_pylons | 20:07 |
| mnaser | implied roles are so sweet | 20:07 |
| *** erus_ has joined #openstack-keystone | 20:07 | |
| *** erus_ has quit IRC | 20:08 | |
| lbragstad | in case you're not aware yet - the admin, member, and reader roles have an implied relationship | 20:09 |
| lbragstad | we had to do that by default | 20:09 |
| *** erus_ has joined #openstack-keystone | 20:09 | |
| *** erus_ has quit IRC | 20:10 | |
| mnaser | lbragstad: that's even cooler | 20:10 |
| *** erus_ has joined #openstack-keystone | 20:11 | |
| *** erus_ has quit IRC | 20:12 | |
| *** erus_ has joined #openstack-keystone | 20:13 | |
| lbragstad | yep - grabbing lunch quick | 20:13 |
| *** jmlowe has quit IRC | 20:30 | |
| *** jmlowe has joined #openstack-keystone | 20:32 | |
| lbragstad | back | 20:34 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update protocol policies for system reader https://review.openstack.org/625352 | 20:40 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add protocol tests for system member role https://review.openstack.org/625353 | 20:40 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Implement system admin role in protocol API https://review.openstack.org/625354 | 20:40 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with protocols https://review.openstack.org/625355 | 20:40 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with protocols https://review.openstack.org/625356 | 20:41 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove protocol policies from v3cloudsample.json https://review.openstack.org/625357 | 20:41 |
| *** spsurya has quit IRC | 20:41 | |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Reuse common system role definitions for roles API https://review.openstack.org/626023 | 20:49 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update role policies for system admin https://review.openstack.org/622526 | 20:49 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with roles https://review.openstack.org/622527 | 20:49 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with roles https://review.openstack.org/622528 | 20:49 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove role policies from policy.v3cloudsample.json https://review.openstack.org/622529 | 20:49 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add region protection tests for system readers https://review.openstack.org/619085 | 20:55 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add region tests for system member role https://review.openstack.org/619086 | 20:55 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update region policies to use system admin https://review.openstack.org/619241 | 20:55 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with regions https://review.openstack.org/619242 | 20:55 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with regions https://review.openstack.org/619243 | 20:55 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove region policies from policy.v3cloudsample.json https://review.openstack.org/619244 | 20:55 |
| *** xek has quit IRC | 21:02 | |
| *** xek has joined #openstack-keystone | 21:02 | |
| *** raildo has quit IRC | 21:25 | |
| *** erus_ has quit IRC | 21:29 | |
| *** erus has quit IRC | 21:33 | |
| *** erus has joined #openstack-keystone | 21:35 | |
| *** aojea_ has joined #openstack-keystone | 21:42 | |
| *** aojea_ has quit IRC | 21:43 | |
| *** aojea__ has joined #openstack-keystone | 21:43 | |
| *** aojea__ has quit IRC | 21:54 | |
| *** aojea_ has joined #openstack-keystone | 21:56 | |
| *** erus has quit IRC | 22:02 | |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update idp policies for system reader https://review.openstack.org/619371 | 22:16 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add idp tests for system member role https://review.openstack.org/619372 | 22:16 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update idp policies for system admin https://review.openstack.org/619373 | 22:16 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with idps https://review.openstack.org/619374 | 22:16 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with idps https://review.openstack.org/619375 | 22:16 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove idp policies from policy.v3cloudsample.json https://review.openstack.org/619376 | 22:16 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update mapping policies for system reader https://review.openstack.org/619612 | 22:27 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add mapping tests for system member role https://review.openstack.org/619613 | 22:27 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update mapping policies for system admin https://review.openstack.org/619614 | 22:27 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with mappings https://review.openstack.org/619615 | 22:27 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with mappings https://review.openstack.org/619616 | 22:27 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove mapping policies from policy.v3cloudsample.json https://review.openstack.org/619617 | 22:27 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update endpoint policies for system reader https://review.openstack.org/619329 | 22:33 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add endpoint tests for system member role https://review.openstack.org/619330 | 22:33 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Update endpoint policies for system admin https://review.openstack.org/619331 | 22:33 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for domain users interacting with endpoints https://review.openstack.org/619332 | 22:33 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Add tests for project users interacting with endpoints https://review.openstack.org/619281 | 22:33 |
| openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove endpoint policies from policy.v3cloudsample.json https://review.openstack.org/619333 | 22:33 |
| *** erus_ has joined #openstack-keystone | 22:41 | |
| *** itlinux has quit IRC | 22:48 | |
| *** rcernin has joined #openstack-keystone | 22:53 | |
| *** erus has joined #openstack-keystone | 23:13 | |
| *** aojea_ has quit IRC | 23:29 | |
Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!