Thursday, 2024-10-31

opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Add note about requirements lower bounds  https://review.opendev.org/c/openstack/oslo.limit/+/93379500:50
opendevreviewTakashi Kajinami proposed openstack/oslo.policy master: Add note about requirements lower bounds  https://review.opendev.org/c/openstack/oslo.policy/+/93380000:52
*** __ministry is now known as Guest801401:35
opendevreviewTakashi Kajinami proposed openstack/keystone master: Remove pointer for keystone-tempest-plugin  https://review.opendev.org/c/openstack/keystone/+/93382803:16
tkajinamxek, could you please review (and hopefully add 2nd +2) to https://review.opendev.org/c/openstack/python-keystoneclient/+/930176 and the subsequent two changes ?03:19
opendevreviewMerged openstack/oslo.limit master: Add note about requirements lower bounds  https://review.opendev.org/c/openstack/oslo.limit/+/93379504:28
opendevreviewMerged openstack/oslo.policy master: Add note about requirements lower bounds  https://review.opendev.org/c/openstack/oslo.policy/+/93380004:54
opendevreviewTakashi Kajinami proposed openstack/keystone master: Add explicit dependency on Werkzeug  https://review.opendev.org/c/openstack/keystone/+/93383708:58
opendevreviewTakashi Kajinami proposed openstack/keystone master: Add explicit dependency on Werkzeug  https://review.opendev.org/c/openstack/keystone/+/93383708:58
jovialThe tokens that are created with a system scoped application credential (openstack application credential create --role admin --role member --role reader --os-system-scope=all will-testing) seem to be project scoped. Is that expected?10:45
joviali.e they have project_id set and not system:all10:47
jovialI'm obtaining the token with `openstack token issue`10:47
jovialusing application credential as created above10:48
gtemajovial - application credentials are by design (current and only) project scoped.10:57
jovialgtema, fair enough. So what is the different between the app cred created with `--os-system-scope=all` which has project_id = None and one created without which has the project id set?11:00
jovialThe output I see from the CLI: https://paste.opendev.org/show/bgiteCmjUQAlz8AqU4rS/11:03
gtemaHonestly no clue. Well, the code extracts project_id from the context which in your case would be empty. I just believe that appcreds without project can not be used properly since keystone refuses to accept scope when authenticating with appcreds11:06
jovialThanks, that clears things up. In practice they seem to work in the same way, but possibly select the "default" project for the user (if that is a thing).11:20
opendevreviewMerged openstack/oslo.limit master: Run pyupgrade to clean up Python 2 syntaxes  https://review.opendev.org/c/openstack/oslo.limit/+/93278712:48
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON schema to `service provider` and validation decorators to service provider resource.  https://review.opendev.org/c/openstack/keystone/+/93061016:21
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON Schema to `access rules`  https://review.opendev.org/c/openstack/keystone/+/92502016:35
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON Schema to `endpoints` and validation decorators to endpoints resource.  https://review.opendev.org/c/openstack/keystone/+/92785616:42
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON schema to `identity provider` and validation decorators to identity provider resource.  https://review.opendev.org/c/openstack/keystone/+/93063317:45

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!