17:01:35 #startmeeting keystone-office-hours 17:01:36 Meeting started Tue Jul 10 17:01:35 2018 UTC and is due to finish in 60 minutes. The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:01:37 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:01:40 The meeting name has been set to 'keystone_office_hours' 17:01:41 LOL 17:01:51 * lbragstad shrugs 17:09:54 ehm, is there some specific topic or can I (re)ask a question? 17:16:19 tosky: no - this is just office hours 17:18:05 tosky: the failure linked in the patch is just warning though - it looks like keystone isn't preventing nova from responding? 17:20:15 lbragstad: I may have swapped the working and the failing log 17:20:33 pass http://logs.openstack.org/02/579602/2/check/openstack-ansible-functional-ubuntu-xenial/a54186d/logs/openstack/openstack1/nova/nova-api-wsgi.log.txt.gz#_2018-07-03_00_14_49_783 17:20:39 fail http://logs.openstack.org/14/573514/3/check/openstack-ansible-functional-ubuntu-xenial/88d0dd9/logs/openstack/openstack1/nova/nova-api-wsgi.log.txt.gz#_2018-06-27_06_32_09_753 17:20:40 ? 17:21:40 yes, I swapped the label, sorry 17:21:55 keystonemiddleware doesn't actually throw an error there - http://git.openstack.org/cgit/openstack/keystonemiddleware/tree/keystonemiddleware/auth_token/__init__.py#n385 17:22:00 it's just a warning i believe 17:22:02 the working log shows the warning, and it works 17:22:22 the failing log (marked incorrectly as PASS) throws a 401 on that operation which was working before 17:29:41 so the question is: is that an error in nova? (which apparently can pass the tempest tests)? Should sahara change something there? 17:33:47 tosky: sounds related to https://bugs.launchpad.net/keystone/+bug/1779889 17:33:47 Launchpad bug 1779889 in OpenStack Identity (keystone) "Lack of documentation for validating expired tokens with service users" [Medium,Triaged] 17:34:01 can you confirm that the nova service is using a service token? 17:34:21 the irc log in that bug report goes into detail about how service tokens work 17:35:43 uh, I'm not sure about the nova configuraton, but I can check how it was setup 17:36:05 but shouldn't the bug be visible also with some other tests? 17:36:25 nova's configuration file will have a section in it for keystone_authtoken 17:36:52 so if a deployment tool is setting that up to use service tokens, but not setting up the service user properly, then you'll likely have a problem 17:39:38 apparently not: http://logs.openstack.org/86/569886/7/check/openstack-ansible-functional-centos-7/e34b95c/logs/etc/openstack/openstack1/nova/nova.conf.txt.gz 17:40:43 the change that introduced service_token_roles_required=true did not add anything else relevant to [keystone_authtoken]: https://review.openstack.org/#/c/578618/ 17:44:41 tosky: https://github.com/openstack/keystonemiddleware/blob/master/keystonemiddleware/auth_token/__init__.py#L554 17:45:05 so osa is setting https://github.com/openstack/keystonemiddleware/blob/master/keystonemiddleware/auth_token/_opts.py#L210-L215 to true 17:45:16 but https://github.com/openstack/keystonemiddleware/blob/master/keystonemiddleware/auth_token/_opts.py#L202-L209 is still the default of 'service' 17:45:28 so a "service token" is considered a token with a role named "service" in it 17:45:46 does osa have that role and does it use it with nova? 17:45:56 if not, that's probably causing the issue 17:46:29 I suspect it does not, but I will raise the question (aka: a bug) 17:46:45 it looks like the source of the issue 17:48:02 oooh, thanks for askin there 17:48:04 asking* 17:48:19 yep 18:54:16 gagehugo: didn't we have a bug open for https://review.openstack.org/#/c/576640/ ? 18:54:48 lbragstad did we? 18:55:03 i'm parsing the meeting logs and i thought we said something about it? 18:55:12 maybe i'm imagining things 18:58:07 http://eavesdrop.openstack.org/meetings/keystone/2018/keystone.2018-06-19-16.00.log.html#l-175 18:59:06 I didn't make one, I can though 18:59:38 no worries - it probably isn't necessary 18:59:47 i was just double checking 19:18:48 Hello! 19:19:16 I've configured keystone federation, with Keystone acting as an SP with an external IdP 19:19:58 Login works just fine, but if I logout and then try to login again, I'm not asked for my user/pass (as if the session was never destroyed) 19:20:42 Has anyone seen something like that? I'm unsure where to begin looking (keystone logs don't show any error 19:25:39 i have not personally experienced that 19:26:18 kmalloc: we should revisit https://review.openstack.org/#/c/555279/ 19:27:01 nicodemus_: that's normal, your idp stores a cookie saying you are logged in and there's no way for horizon to be aware of that so logging out of horizon doesn't affect it 19:27:21 * kmalloc looks 19:27:24 there might be an endpoint/button you can go to on your idp to log out of it directly 19:27:24 thanks cmurphy 19:27:27 or you can clear your cookies 19:30:08 it'll also time out eventually 19:44:30 cmurphy: so, if I logout from horizon that doesn't trigger a logout to the IdP? 19:45:01 I imagined the logout endpoints from the Mellon metadata would somehow handle the logout 19:46:11 nicodemus_: you're right that should be possible but I don't think we've hooked that up between horizon and keystone and saml 19:52:21 cmurphy: got it. So at least for now, I cloud say that login works fine but logout needs to be done outside of horizon 19:52:45 nicodemus_: yes 19:53:00 thanks a lot! 19:57:35 lbragstad: yeah we should revisit that cleanup 20:02:56 http://flask.pocoo.org/docs/1.0/quickstart/#unique-urls-redirection-behavior explains some of the stuff we had to fix in our implementation 20:03:12 in case anyone else is wondering about the 418 Teapot stuff in the flaskification review 20:03:17 reviews* 20:08:11 yeah, we had some weirdness 20:08:44 the 418 teapot stuff [yes we can change the error code] 20:09:44 Gage Hugo proposed openstack/keystone master: Add docs for case-insensitivity in keystone https://review.openstack.org/576640 20:10:06 we also had a number of cases where [even before flask] we referenced an incorrect url and got a 404 20:10:11 we expected a 404 in our tests 20:10:16 but it was the wrong kind of 404 20:11:28 it was "app level" 404 not "not found resource" 404 20:11:55 lbragstad: do you want me to move from 418 to something else, like 499 or something for testing? 20:12:47 it isn't hard to change that code out... but, *shrug* i like 418, it wont be used for anything serious 20:29:24 Gage Hugo proposed openstack/keystone master: Add docs for case-insensitivity in keystone https://review.openstack.org/576640 20:56:32 yeah - doesn't matter to me i don't thik 20:56:35 think* 20:56:40 i understand the reasoning for it now 21:17:08 #endmeeting