*** jamesmcarthur has quit IRC | 00:00 | |
*** jamesmcarthur has joined #openstack-keystone | 00:00 | |
*** jamesmcarthur has quit IRC | 00:02 | |
*** vishwanathj has joined #openstack-keystone | 00:20 | |
*** jamesmcarthur has joined #openstack-keystone | 00:32 | |
*** jmlowe has joined #openstack-keystone | 00:37 | |
*** ileixe has joined #openstack-keystone | 00:47 | |
*** jamesmcarthur has quit IRC | 01:01 | |
*** markvoelker has joined #openstack-keystone | 01:02 | |
*** markvoelker has quit IRC | 01:07 | |
*** markvoelker has joined #openstack-keystone | 02:03 | |
*** erus has quit IRC | 02:06 | |
*** markvoelker has quit IRC | 02:06 | |
*** erus has joined #openstack-keystone | 02:07 | |
*** Dinesh_Bhor has joined #openstack-keystone | 02:31 | |
*** erus has quit IRC | 02:31 | |
*** Dinesh_Bhor has quit IRC | 02:31 | |
*** erus has joined #openstack-keystone | 02:32 | |
*** vishwanathj has quit IRC | 02:35 | |
*** chason has quit IRC | 02:36 | |
*** chason has joined #openstack-keystone | 02:38 | |
*** Dinesh_Bhor has joined #openstack-keystone | 02:41 | |
*** vishwanathj has joined #openstack-keystone | 02:55 | |
*** jamesmcarthur has joined #openstack-keystone | 03:01 | |
*** jamesmcarthur has quit IRC | 03:05 | |
*** erus has quit IRC | 03:08 | |
*** erus has joined #openstack-keystone | 03:09 | |
*** jamesmcarthur has joined #openstack-keystone | 03:27 | |
*** jamesmcarthur has quit IRC | 03:41 | |
*** vishwanathj has quit IRC | 03:52 | |
*** jmlowe has quit IRC | 04:29 | |
*** lbragstad has quit IRC | 04:44 | |
*** lbragstad has joined #openstack-keystone | 04:54 | |
*** ChanServ sets mode: +o lbragstad | 04:54 | |
*** tkajinam_ has joined #openstack-keystone | 06:36 | |
*** tkajinam has quit IRC | 06:38 | |
*** markvoelker has joined #openstack-keystone | 06:48 | |
*** imus has joined #openstack-keystone | 07:06 | |
*** markvoelker has quit IRC | 07:21 | |
*** markvoelker has joined #openstack-keystone | 08:18 | |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Add manager support for app cred access rules https://review.openstack.org/628193 | 08:22 |
---|---|---|
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Add API changes for app cred access rules https://review.openstack.org/628168 | 08:22 |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Add access rules to token validation https://review.openstack.org/631993 | 08:22 |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: WIP: Add role check to access rules https://review.openstack.org/640034 | 08:22 |
*** pcaruana has joined #openstack-keystone | 08:25 | |
openstackgerrit | Islam Musleh proposed openstack/keystone master: Converting the API tests to use flask's test_client https://review.openstack.org/640692 | 08:27 |
openstackgerrit | Merged openstack/oslo.limit master: Add py36 and py37 tox envs https://review.openstack.org/639063 | 08:40 |
*** lbragstad has quit IRC | 08:46 | |
*** tkajinam_ has quit IRC | 08:48 | |
*** markvoelker has quit IRC | 08:50 | |
openstackgerrit | Merged openstack/oslo.policy master: Add py36 and py37 tox envs https://review.openstack.org/639060 | 08:53 |
*** awalende has joined #openstack-keystone | 08:53 | |
*** shyamb has joined #openstack-keystone | 09:00 | |
*** jaosorior has joined #openstack-keystone | 09:41 | |
*** jistr is now known as jistr|sick | 09:42 | |
*** markvoelker has joined #openstack-keystone | 09:47 | |
*** imus has quit IRC | 09:48 | |
*** erus has quit IRC | 10:16 | |
*** erus has joined #openstack-keystone | 10:17 | |
*** markvoelker has quit IRC | 10:21 | |
*** erus has quit IRC | 10:41 | |
*** erus has joined #openstack-keystone | 10:42 | |
openstackgerrit | Colleen Murphy proposed openstack/keystone master: Switch federation check jobs to opensuse https://review.openstack.org/640724 | 10:43 |
*** markvoelker has joined #openstack-keystone | 11:18 | |
*** ileixe has quit IRC | 11:19 | |
*** erus has quit IRC | 11:19 | |
*** erus has joined #openstack-keystone | 11:20 | |
*** shyamb has quit IRC | 11:30 | |
*** shyamb has joined #openstack-keystone | 11:30 | |
*** shyamb has quit IRC | 11:45 | |
*** markvoelker has quit IRC | 11:50 | |
*** erus has quit IRC | 11:50 | |
*** erus has joined #openstack-keystone | 11:51 | |
*** shyamb has joined #openstack-keystone | 12:02 | |
*** dave-mccowan has joined #openstack-keystone | 12:22 | |
*** erus has quit IRC | 12:34 | |
*** HD|Laptop has joined #openstack-keystone | 12:34 | |
HD|Laptop | hello all | 12:34 |
HD|Laptop | I am trying to get Octavia running, but keep hitting keystone problems | 12:34 |
HD|Laptop | a simple openstack loadbalancer create --name lb1 --vip-network-id xxx yields "Authentication cannot be scoped to multiple targets. Pick one of: project, domain, trust or unscoped" | 12:34 |
HD|Laptop | http://paste.debian.net/1071373/ => this is my config | 12:34 |
*** erus has joined #openstack-keystone | 12:34 | |
*** shyamb has quit IRC | 12:35 | |
cmurphy | HD|Laptop: in [service_auth] you should remove domain_name = default, as that implies you want to scope to a domain when you probably want to scope to the project named 'service' | 12:40 |
cmurphy | HD|Laptop: you should also change project_domain_name and user_domain_name to Default (capital D) | 12:40 |
*** markvoelker has joined #openstack-keystone | 12:48 | |
HD|Laptop | cmurphy: ah, okay. now it at least doesn't crash with keystone errors anymore, now it only fails to locate the amphora flavor in nova... | 12:48 |
HD|Laptop | thanks :) | 12:48 |
*** edmondsw has joined #openstack-keystone | 12:49 | |
cmurphy | np | 12:49 |
*** awalende has quit IRC | 12:56 | |
*** jistr|sick is now known as jistr|sick|mtg | 13:01 | |
*** awalende has joined #openstack-keystone | 13:05 | |
*** markvoelker has quit IRC | 13:21 | |
*** jamesmcarthur has joined #openstack-keystone | 13:24 | |
*** jamesmcarthur has quit IRC | 13:32 | |
*** jamesmcarthur has joined #openstack-keystone | 13:33 | |
*** jamesmcarthur has quit IRC | 13:38 | |
knikolla | o/ | 13:42 |
*** erus has quit IRC | 13:42 | |
cmurphy | \o | 13:43 |
*** erus has joined #openstack-keystone | 13:43 | |
*** lbragstad has joined #openstack-keystone | 13:49 | |
*** ChanServ sets mode: +o lbragstad | 13:49 | |
lbragstad | o/ | 13:52 |
*** jamesmcarthur has joined #openstack-keystone | 14:03 | |
*** jamesmcarthur has quit IRC | 14:06 | |
*** jamesmcarthur has joined #openstack-keystone | 14:06 | |
*** jmlowe has joined #openstack-keystone | 14:18 | |
*** markvoelker has joined #openstack-keystone | 14:18 | |
*** jamesmcarthur has quit IRC | 14:24 | |
*** pcaruana has quit IRC | 14:31 | |
*** erus has quit IRC | 14:32 | |
*** beekneemech is now known as bnemec | 14:33 | |
*** erus has joined #openstack-keystone | 14:33 | |
*** jamesmcarthur has joined #openstack-keystone | 14:38 | |
*** markvoelker has quit IRC | 14:50 | |
*** jistr|sick|mtg is now known as jistr|sick | 15:02 | |
lbragstad | just a heads up - https://review.openstack.org/#/c/622589/ is probably gonna be a pain with merge conflicts | 15:24 |
lbragstad | with all the other policy patches in flight | 15:24 |
*** pcaruana has joined #openstack-keystone | 15:25 | |
cmurphy | should we wait to merge that one until all the others are in? | 15:26 |
lbragstad | good question | 15:34 |
*** erus has quit IRC | 15:34 | |
*** erus has joined #openstack-keystone | 15:34 | |
lbragstad | i could start rebasing patches like https://review.openstack.org/#/c/619282/ | 15:35 |
lbragstad | and wip 622589 until we get through those? | 15:35 |
openstackgerrit | Lance Bragstad proposed openstack/keystone master: Remove service policies from policy.v3cloudsample.json https://review.openstack.org/619282 | 15:40 |
cmurphy | wfm | 15:40 |
*** markvoelker has joined #openstack-keystone | 15:48 | |
*** shyamb has joined #openstack-keystone | 16:11 | |
*** erus has quit IRC | 16:12 | |
*** erus has joined #openstack-keystone | 16:12 | |
gagehugo | o/ | 16:17 |
*** markvoelker has quit IRC | 16:21 | |
erus | o. | 16:26 |
erus | o/ | 16:26 |
*** gyee has joined #openstack-keystone | 16:32 | |
*** imacdonn_ has joined #openstack-keystone | 16:35 | |
*** imacdonn_ is now known as imacdonn | 16:35 | |
*** ayoung has joined #openstack-keystone | 16:49 | |
*** shyamb has quit IRC | 16:59 | |
lbragstad | so - for the unified limit policy/protection testing | 17:17 |
lbragstad | do we want domain users to be able to list all limits for the domain and projects within the domain they have authorization on? | 17:17 |
*** markvoelker has joined #openstack-keystone | 17:18 | |
*** erus has quit IRC | 17:18 | |
*** erus has joined #openstack-keystone | 17:19 | |
ayoung | no] | 17:19 |
ayoung | list all limits is one level up | 17:19 |
lbragstad | currently - if GET /v3/limits is called with a domain-scoped token, the response is filtered by that domain (instead of including all project limits within that domain) | 17:19 |
ayoung | knee jerk reaction there | 17:19 |
ayoung | its not the users limit, it is the domains, right? | 17:20 |
ayoung | hmmm | 17:20 |
lbragstad | yeah - project and domain limits | 17:20 |
ayoung | does not map neatly to unix concepts, does it | 17:20 |
ayoung | I retract...I think read only for a member would be appropriate, change for admins, no? | 17:21 |
lbragstad | well - only system administrators can create, modify, or delete limits for projects or domains | 17:21 |
ayoung | is this a question of how to filter, or what the user should access? | 17:21 |
*** awalende has quit IRC | 17:21 | |
lbragstad | but users with role assignments on a project or domain should be able to call GET /v3/limits and get a list of limits for things they have authorization on, no? | 17:22 |
*** awalende has joined #openstack-keystone | 17:22 | |
ayoung | yeah...I think so. I guess that not knowing that would prevent you from being able to make decent decisions | 17:23 |
ayoung | you could find out the same info by creating until you ran out of resources, then deleting. | 17:23 |
ayoung | better to tell you up front | 17:23 |
lbragstad | yeah - at the expense of u-x i would say | 17:23 |
lbragstad | but for the case of domain users | 17:24 |
lbragstad | if i call GET /v3/limits with a domain-scoped token | 17:24 |
ayoung | Domains should have the same rules as proejcts, just for different resources | 17:24 |
lbragstad | should the response contain all limits for the domain and all limits for projects of that domain? | 17:24 |
ayoung | hmmm | 17:25 |
lbragstad | or should it only contain limits for the domain relayed through token scope (sans projects of the domain)? | 17:25 |
*** rafaelweingartne has joined #openstack-keystone | 17:25 | |
ayoung | by defautl? I mean, you should be able to get all those things with difereent params, right? | 17:26 |
rafaelweingartne | Hello Keystone folks, do I need to enable somethign to use app credentials? | 17:26 |
lbragstad | rafaelweingartne no - they should be available by default | 17:26 |
rafaelweingartne | when I try to use them, I get: "Attempted to authenticate with an unsupported method. (HTTP 401)" | 17:26 |
*** awalende has quit IRC | 17:26 | |
ayoung | lbragstad, do they have to go in the token list of auth types? | 17:27 |
lbragstad | oh - maybe? | 17:27 |
lbragstad | lemme double check | 17:27 |
ayoung | 1 sec | 17:27 |
cmurphy | rafaelweingartne: add application_credential to [auth]/methods | 17:28 |
lbragstad | looks like they are by default | 17:28 |
lbragstad | https://git.openstack.org/cgit/openstack/keystone/tree/keystone/conf/auth.py#n21 | 17:28 |
lbragstad | https://git.openstack.org/cgit/openstack/keystone/tree/keystone/conf/constants.py#n20 | 17:28 |
ayoung | might not get that in an upgrade, tho | 17:28 |
lbragstad | right | 17:28 |
ayoung | or some deployment tool my strip it out | 17:28 |
lbragstad | i'd double check to make sure ``keystone.conf [auth] methods`` contains application_credentials | 17:28 |
ayoung | rafaelweingartne, how are you deploying? Is this an upgrade? And what Keystone release? | 17:28 |
rafaelweingartne | hmm | 17:29 |
rafaelweingartne | [auth] methods = external,password,token,mapped,openid | 17:29 |
rafaelweingartne | so that is the problem | 17:29 |
lbragstad | yeah | 17:29 |
rafaelweingartne | I am using kolla-ansible | 17:29 |
rafaelweingartne | but I have added a featuer to enable kolla-ansible to integrate Keystone with IdPs automatically, so we do not need to worry about all of the moving parts | 17:30 |
rafaelweingartne | and when I did that, I have overriden the default "auth" section | 17:31 |
rafaelweingartne | thanks for the help | 17:31 |
lbragstad | no problem | 17:31 |
rafaelweingartne | I now get, "Error authenticating with application credential: Application credentials cannot request a scope" | 17:32 |
rafaelweingartne | what does that mean? | 17:32 |
rafaelweingartne | I am issuing a simple "openstack user list" | 17:32 |
lbragstad | i'm pretty sure that means the project associated to your application credential mismatches the project you're attempting to authenticate a token for | 17:38 |
rafaelweingartne | hmm | 17:38 |
rafaelweingartne | but I am actually using the openrc generated in Horizon | 17:39 |
rafaelweingartne | let me check | 17:39 |
lbragstad | we have some good documentation on this - https://docs.openstack.org/keystone/latest/user/application_credentials.html | 17:39 |
lbragstad | that walks through the process, in case you haven't seen that yet | 17:39 |
cmurphy | you shouldn't have a project set at all | 17:40 |
cmurphy | the openrc file for app creds from horizon shouldn't include one | 17:40 |
*** erus has quit IRC | 17:41 | |
*** erus has joined #openstack-keystone | 17:41 | |
rafaelweingartne | yes, it does not have a project there | 17:42 |
rafaelweingartne | No, I have not read the docs. I was hoping for it to be as simple as downloading, loading the variables, and then executing the commands | 17:42 |
*** mvkr has quit IRC | 17:48 | |
*** markvoelker has quit IRC | 17:51 | |
cmurphy | well it should pretty much work out of the box, that error can only mean you have a stray project_name or project_id in your environment | 17:51 |
rafaelweingartne | you mean, a shell variable? | 17:55 |
rafaelweingartne | shouldn't the project be in the app credential when it is created via horizon? | 17:57 |
ayoung | yesh...unset OPENSTACK_PROJECT_ID and OPENSTACK_PROJECT_NAME in your shell env script | 17:57 |
ayoung | project is included when the app cred is made | 17:58 |
rafaelweingartne | I am listing all variables with "printenv | grep OS" and there is nothing else | 18:01 |
rafaelweingartne | there is somethign odd here then, because the project is not in the app credentials | 18:02 |
rafaelweingartne | it is showing as none | 18:02 |
rafaelweingartne | and there is no "OPEN" variable (printenv | grep OPEN) | 18:03 |
cmurphy | it's not OPENSTACK_PROJECT_ID/NAME it's OS_PROJECT_ID/OS_PROJECT_NAME | 18:08 |
cmurphy | env | grep OS_ would show it | 18:09 |
cmurphy | if it was there | 18:09 |
rafaelweingartne | env and "printenv | grep OS" is the dame | 18:10 |
rafaelweingartne | so, it is not there | 18:10 |
rafaelweingartne | the problem is something else I guess | 18:10 |
rafaelweingartne | I just change keystone to print the scope that is beign requested | 18:11 |
*** whoami-rajat has quit IRC | 18:24 | |
*** jamesmcarthur_ has joined #openstack-keystone | 18:32 | |
*** jamesmcarthur has quit IRC | 18:35 | |
*** jamesmcarthur_ has quit IRC | 18:41 | |
kmalloc | o/ | 18:48 |
*** markvoelker has joined #openstack-keystone | 18:48 | |
*** jamesmcarthur has joined #openstack-keystone | 18:53 | |
*** pcaruana has quit IRC | 18:56 | |
*** whoami-rajat has joined #openstack-keystone | 18:58 | |
*** jamesmcarthur has quit IRC | 18:59 | |
*** jamesmcarthur has joined #openstack-keystone | 18:59 | |
*** jamesmcarthur has quit IRC | 19:04 | |
lbragstad | i think the oslo.policy matching checks just broke my brain | 19:13 |
kmalloc | lbragstad: hahaha | 19:16 |
kmalloc | lbragstad: that is somewhat brutal code. | 19:16 |
lbragstad | so - i have this code https://pasted.tech/pastes/3635c09add2eeab3400f0c75700c819c799027eb | 19:17 |
lbragstad | and that policy check lets a domain user from domain A fetch limits out of a domain they have no authorization on | 19:18 |
lbragstad | can you guess why? | 19:18 |
kmalloc | sec. | 19:18 |
kmalloc | because you are a null on project_id and the limit doesn't have a project id? | 19:19 |
kmalloc | so none = none | 19:19 |
lbragstad | fwiw - the test case is calling GET /v3/limits/(limit_id) with a domain scoped token | 19:19 |
kmalloc | ?> | 19:19 |
lbragstad | https://pasted.tech/pastes/85a698668b89f76b0a7b07ab8ccb325deba427ac | 19:20 |
*** erus has quit IRC | 19:20 | |
lbragstad | yeah | 19:20 |
kmalloc | hehe | 19:20 |
kmalloc | maaaaybe have i worked in the policy checks :P | 19:20 |
kmalloc | i mean..... it doesn't surprise me at all | 19:20 |
* lbragstad blames kmalloc | 19:20 | |
kmalloc | the OR needs to also check if domain is set | 19:20 |
*** erus has joined #openstack-keystone | 19:20 | |
kmalloc | which, we don't have a policy DSL check for | 19:20 |
lbragstad | hmmm | 19:21 |
kmalloc | we need the KEY_EXISTS() check | 19:21 |
*** markvoelker has quit IRC | 19:21 | |
kmalloc | so we can do (project_id):%(....project_id) AND KEY_NOT_EXISTS(domain_id) | 19:21 |
kmalloc | this is exactly one of the cases I was looking at for the expanded policy DSL checks. | 19:21 |
lbragstad | oh - we do have a check for that i think? | 19:21 |
kmalloc | no we don't | 19:21 |
kmalloc | the way policy works: before the ':' is an explicit lookup in the dict, and the part after the ':' is a literal string | 19:22 |
*** jamesmcarthur has joined #openstack-keystone | 19:22 | |
lbragstad | right | 19:22 |
kmalloc | but there is no way to say "check if key exists in target dict" | 19:22 |
* lbragstad is grasping at straws | 19:23 | |
kmalloc | because the pre-':' section is always a None or a value | 19:23 |
kmalloc | and there is no way to represent 'None' because you are a literal string. | 19:23 |
lbragstad | mmm | 19:23 |
kmalloc | not the None singleton | 19:23 |
*** rafaelweingartne has quit IRC | 19:23 | |
*** awalende has joined #openstack-keystone | 19:23 | |
kmalloc | so.. we need a way to say KEY_IN_TARGET_DICT but not care what the key is | 19:23 |
*** openstackgerrit has quit IRC | 19:23 | |
lbragstad | i wonder if we could pass something that isn't None? | 19:24 |
kmalloc | not unless you explicitly populate the target dict | 19:24 |
lbragstad | right | 19:24 |
kmalloc | and it is very fragile | 19:24 |
kmalloc | i'd rather fix olso.policy | 19:24 |
kmalloc | honesly | 19:24 |
lbragstad | i should have found this a week or two ago | 19:24 |
* kmalloc has talked with you about this a few times this cycle | 19:24 | |
lbragstad | this - specifically? | 19:25 |
lbragstad | this is the first time i've hit this issue working with policy | 19:25 |
kmalloc | not this specific case | 19:25 |
kmalloc | but similar cases | 19:25 |
kmalloc | i was talking about a very similar case when we talked policy DSL expansion | 19:25 |
lbragstad | we won't get another oslo.policy release for stein | 19:25 |
kmalloc | you could do the dirty hack and populate a "IS_PROJECT_SCOPE" in the target dict | 19:26 |
kmalloc | and a "IS_DOMAIN_SCOPE" and "IS_SYSTEM_SCOPE" | 19:26 |
kmalloc | as appropriate, and then check for that | 19:26 |
kmalloc | in the rule | 19:26 |
lbragstad | another option might be to break up the get_limit implementation | 19:27 |
lbragstad | and enforce policies for get_domain_limit or get_project_limit | 19:27 |
kmalloc | true | 19:27 |
lbragstad | which might result in a less complicated check_str | 19:27 |
kmalloc | *shrug* | 19:28 |
*** awalende has quit IRC | 19:28 | |
lbragstad | hmm | 19:28 |
lbragstad | i'll continue to noodle on it | 19:28 |
lbragstad | i thought i was going to lose my mind with how many times i thought i set domain_id:%(target.limit.domain_id)s wrong | 19:29 |
kmalloc | nope. | 19:29 |
kmalloc | sorry man. | 19:29 |
kmalloc | :( | 19:29 |
lbragstad | turns out None *is* equal to None | 19:29 |
kmalloc | funny that :P | 19:31 |
* lbragstad takes lunch | 19:32 | |
*** blake has joined #openstack-keystone | 19:46 | |
erus | hi kmalloc o/ | 20:03 |
kmalloc | erus: allo | 20:04 |
*** jmlowe has quit IRC | 20:08 | |
*** markvoelker has joined #openstack-keystone | 20:18 | |
*** jamesmcarthur has quit IRC | 20:19 | |
*** jamesmcarthur has joined #openstack-keystone | 20:19 | |
*** erus has quit IRC | 20:19 | |
*** erus has joined #openstack-keystone | 20:20 | |
lbragstad | trivial review: https://review.openstack.org/#/c/619282/ | 20:27 |
cmurphy | every. time. | 20:27 |
lbragstad | i'm a troll | 20:28 |
lbragstad | i commend the enthusiasm though! | 20:29 |
cmurphy | :) | 20:29 |
*** BlackDex has quit IRC | 20:39 | |
*** jmlowe has joined #openstack-keystone | 20:46 | |
*** BlackDex has joined #openstack-keystone | 20:48 | |
*** markvoelker has quit IRC | 20:51 | |
*** jamesmcarthur has quit IRC | 20:58 | |
*** jamesmcarthur has joined #openstack-keystone | 20:59 | |
*** jamesmcarthur has quit IRC | 20:59 | |
*** jamesmcarthur has joined #openstack-keystone | 20:59 | |
*** whoami-rajat has quit IRC | 21:04 | |
*** jamesmcarthur has quit IRC | 21:06 | |
*** mvkr has joined #openstack-keystone | 21:29 | |
*** blake has quit IRC | 21:32 | |
*** jamesmcarthur has joined #openstack-keystone | 21:37 | |
*** markvoelker has joined #openstack-keystone | 21:49 | |
*** zzzeek has quit IRC | 21:54 | |
*** zzzeek has joined #openstack-keystone | 21:54 | |
*** jamesmcarthur has quit IRC | 21:57 | |
*** jamesmcarthur has joined #openstack-keystone | 21:58 | |
*** dave-mccowan has quit IRC | 22:09 | |
*** jamesmcarthur has quit IRC | 22:12 | |
*** jamesmcarthur has joined #openstack-keystone | 22:13 | |
*** eglute has joined #openstack-keystone | 22:18 | |
*** markvoelker has quit IRC | 22:21 | |
lbragstad | stepping out for a bit - i'll be on later | 22:22 |
*** tkajinam has joined #openstack-keystone | 22:56 | |
*** jamesmcarthur has quit IRC | 22:57 | |
*** jamesmcarthur has joined #openstack-keystone | 22:58 | |
*** jamesmcarthur has quit IRC | 23:00 | |
*** erus has quit IRC | 23:00 | |
*** erus has joined #openstack-keystone | 23:01 | |
*** markvoelker has joined #openstack-keystone | 23:18 | |
*** erus has quit IRC | 23:26 | |
*** erus has joined #openstack-keystone | 23:27 | |
*** dklyle has quit IRC | 23:39 | |
*** openstackgerrit has joined #openstack-keystone | 23:50 | |
openstackgerrit | Merged openstack/keystone master: Remove service policies from policy.v3cloudsample.json https://review.openstack.org/619282 | 23:50 |
*** markvoelker has quit IRC | 23:51 | |
kmalloc | lbragstad, gagehugo, ayoung, knikolla: a change we should get landed, looks clean and ready: https://review.openstack.org/#/c/640724/ | 23:56 |
Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!