*** jamielennox is now known as jamielennox|away | 00:04 | |
*** jamielennox|away is now known as jamielennox | 00:04 | |
*** diazjf has quit IRC | 00:05 | |
*** gyee has quit IRC | 00:08 | |
*** gyee has joined #openstack-barbican | 00:08 | |
*** mixos has joined #openstack-barbican | 00:12 | |
*** elo1 has quit IRC | 00:16 | |
*** dimtruck is now known as zz_dimtruck | 00:26 | |
*** gyee has quit IRC | 00:34 | |
*** gyee has joined #openstack-barbican | 00:34 | |
*** sigmavirus24 is now known as sigmavirus24_awa | 00:45 | |
*** Kevin_Zheng has joined #openstack-barbican | 01:03 | |
*** elo1 has joined #openstack-barbican | 02:27 | |
*** elo11 has joined #openstack-barbican | 02:29 | |
*** alee has quit IRC | 02:30 | |
*** elo1 has quit IRC | 02:32 | |
*** alee has joined #openstack-barbican | 02:37 | |
*** woodster_ has quit IRC | 02:48 | |
*** ozialien10 has quit IRC | 03:18 | |
*** ozialien10 has joined #openstack-barbican | 03:19 | |
*** edtubill has joined #openstack-barbican | 03:29 | |
*** zz_dimtruck is now known as dimtruck | 03:31 | |
*** edtubill has quit IRC | 04:00 | |
*** chlong has joined #openstack-barbican | 04:04 | |
*** edtubill has joined #openstack-barbican | 04:08 | |
*** mixos has quit IRC | 04:12 | |
*** mixos has joined #openstack-barbican | 04:12 | |
*** elo11 has quit IRC | 04:16 | |
*** elo1 has joined #openstack-barbican | 04:16 | |
*** dimtruck is now known as zz_dimtruck | 04:18 | |
*** mixos has quit IRC | 04:18 | |
*** elo11 has joined #openstack-barbican | 04:26 | |
*** elo1 has quit IRC | 04:26 | |
*** elo1 has joined #openstack-barbican | 04:31 | |
*** elo11 has quit IRC | 04:32 | |
*** zz_dimtruck is now known as dimtruck | 04:43 | |
*** elo11 has joined #openstack-barbican | 04:50 | |
*** elo1 has quit IRC | 04:52 | |
*** chlong has quit IRC | 05:17 | |
*** elo1 has joined #openstack-barbican | 05:24 | |
*** elo11 has quit IRC | 05:26 | |
*** chlong has joined #openstack-barbican | 05:31 | |
*** dimtruck is now known as zz_dimtruck | 05:35 | |
*** elo11 has joined #openstack-barbican | 05:37 | |
*** elo1 has quit IRC | 05:37 | |
openstackgerrit | Merged openstack/python-barbicanclient: Update mailmap for Douglas Mendizábal https://review.openstack.org/318346 | 05:38 |
---|---|---|
*** elo1 has joined #openstack-barbican | 05:41 | |
*** elo11 has quit IRC | 05:41 | |
*** elo11 has joined #openstack-barbican | 05:44 | |
*** elo1 has quit IRC | 05:45 | |
*** edtubill has quit IRC | 05:54 | |
*** gyee has quit IRC | 05:56 | |
*** elo1 has joined #openstack-barbican | 05:56 | |
*** fawadkhaliq has joined #openstack-barbican | 05:57 | |
*** elo11 has quit IRC | 05:57 | |
*** chlong has quit IRC | 06:05 | |
*** elo11 has joined #openstack-barbican | 06:14 | |
*** elo1 has quit IRC | 06:16 | |
*** elo1 has joined #openstack-barbican | 06:16 | |
*** elo11 has quit IRC | 06:19 | |
*** chlong has joined #openstack-barbican | 06:22 | |
*** elo11 has joined #openstack-barbican | 06:24 | |
*** elo1 has quit IRC | 06:26 | |
*** elo1 has joined #openstack-barbican | 06:37 | |
*** elo11 has quit IRC | 06:40 | |
*** chlong has quit IRC | 06:54 | |
*** andreas_s has joined #openstack-barbican | 06:58 | |
*** jaosorior has quit IRC | 06:59 | |
*** jaosorior has joined #openstack-barbican | 07:00 | |
*** fawadkhaliq has quit IRC | 07:39 | |
*** fawadkhaliq has joined #openstack-barbican | 07:39 | |
*** jamielennox is now known as jamielennox|away | 08:05 | |
*** elo1 has quit IRC | 08:15 | |
*** ozialien10 has quit IRC | 08:27 | |
*** ozialien10 has joined #openstack-barbican | 08:27 | |
*** fawadkhaliq has quit IRC | 09:24 | |
*** fawadkhaliq has joined #openstack-barbican | 09:24 | |
*** jamielennox|away is now known as jamielennox | 11:03 | |
*** fawadkhaliq has quit IRC | 11:30 | |
*** elo1 has joined #openstack-barbican | 12:17 | |
*** elo1 has quit IRC | 12:22 | |
*** alee has quit IRC | 12:25 | |
*** rellerreller has joined #openstack-barbican | 12:48 | |
*** dave-mccowan has joined #openstack-barbican | 13:12 | |
*** alee has joined #openstack-barbican | 13:33 | |
openstackgerrit | OpenStack Proposal Bot proposed openstack/python-barbicanclient: Updated from global requirements https://review.openstack.org/303151 | 13:36 |
*** jmckind has joined #openstack-barbican | 13:48 | |
*** spotz_zzz is now known as spotz | 13:50 | |
*** woodster_ has joined #openstack-barbican | 14:02 | |
*** jhfeng has joined #openstack-barbican | 14:11 | |
*** spotz is now known as spotz_zzz | 14:11 | |
*** edtubill has joined #openstack-barbican | 14:13 | |
*** jmckind_ has joined #openstack-barbican | 14:14 | |
*** jmckind has quit IRC | 14:17 | |
*** edtubill has quit IRC | 14:17 | |
*** fawadkhaliq has joined #openstack-barbican | 14:29 | |
*** fawadkhaliq has quit IRC | 14:33 | |
*** randallburt has joined #openstack-barbican | 14:38 | |
*** randallburt1 has joined #openstack-barbican | 14:39 | |
*** randallburt has quit IRC | 14:42 | |
*** sigmavirus24_awa is now known as sigmavirus24 | 14:48 | |
*** edtubill has joined #openstack-barbican | 14:53 | |
*** spotz_zzz is now known as spotz | 14:53 | |
*** mixos has joined #openstack-barbican | 14:54 | |
*** jmckind has joined #openstack-barbican | 14:57 | |
*** silos has joined #openstack-barbican | 14:59 | |
*** jaosorior has quit IRC | 14:59 | |
*** jaosorior has joined #openstack-barbican | 15:00 | |
*** jmckind_ has quit IRC | 15:00 | |
*** jaosorior has quit IRC | 15:03 | |
*** diazjf has joined #openstack-barbican | 15:03 | |
*** jaosorior has joined #openstack-barbican | 15:03 | |
*** diazjf1 has joined #openstack-barbican | 15:07 | |
openstackgerrit | Merged openstack/python-barbicanclient: Updated from global requirements https://review.openstack.org/303151 | 15:07 |
*** jaosorior has quit IRC | 15:10 | |
*** diazjf has quit IRC | 15:10 | |
*** zz_dimtruck is now known as dimtruck | 15:12 | |
*** fawadkhaliq has joined #openstack-barbican | 15:24 | |
*** andreas_s has quit IRC | 15:29 | |
*** kfarr has joined #openstack-barbican | 15:37 | |
*** stupidni` is now known as stupidnic | 15:46 | |
*** jmckind_ has joined #openstack-barbican | 15:47 | |
*** jmckind has quit IRC | 15:50 | |
*** jmckind has joined #openstack-barbican | 16:02 | |
*** jmckind_ has quit IRC | 16:05 | |
*** fawadkhaliq has quit IRC | 16:11 | |
*** agrebennikov has joined #openstack-barbican | 16:25 | |
*** dargolf has joined #openstack-barbican | 16:32 | |
*** jmckind_ has joined #openstack-barbican | 16:39 | |
*** jmckind has quit IRC | 16:43 | |
*** fawadkhaliq has joined #openstack-barbican | 16:46 | |
*** edtubill has quit IRC | 16:48 | |
*** tkelsey has joined #openstack-barbican | 16:49 | |
diazjf1 | hello everyone, I made an etherpad for the midcycle which I will be updating just add your name if you would be able to attend so I can get a count -> https://etherpad.openstack.org/p/barbican-security-midcycle-N I will discuss in 15 mins and check with the security team in #openstack-meeting-alt | 16:49 |
diazjf1 | redrobot ^ | 16:49 |
kfarr | hey diazjf1 redrobot, is the location and date for sure? | 16:51 |
redrobot | kfarr no not yet | 16:51 |
diazjf1 | kfarr, redrobot, I think the date should be fine. I'm working on getting some rooms. | 16:51 |
redrobot | kfarr I was thinking SA or Austin since most devs are in those two cities | 16:53 |
kfarr | redrobot, makes sense! | 16:53 |
redrobot | kfarr I was thinking right before feature freeze, but I wouldn't mind pushing that back a few weeks | 16:54 |
redrobot | kfarr I guess it depends on when diazjf1 can get space... or when we can get space either here at the castle, or Austin Rackspace or SA Geekdom | 16:54 |
kfarr | redrobot, when you say push back, do you mean push it earlier in August or later? | 16:55 |
diazjf1 | redrobot, I'll most likely be able to get space, but I was hoping to get a budget for food and activities ;) | 16:55 |
redrobot | kfarr earlier | 16:57 |
redrobot | kfarr I wouldn't want to do it any later than the week before m-3 | 16:57 |
diazjf1 | alee, when do you get back to the states? | 17:00 |
alee | diazjf1, august 1 | 17:00 |
*** edtubill has joined #openstack-barbican | 17:00 | |
diazjf1 | alee, cool so anytime in August works for you then? | 17:01 |
alee | diazjf1, yeah - though I'd like a day or too after I get back. | 17:03 |
diazjf1 | alee, haha sure | 17:03 |
*** silos has quit IRC | 17:10 | |
agrebennikov | hi barbican devs, I have a policy question. It turns out that by default policy I cannot use any standalone user for extracting and decrypting the secrets if the user is not an admin of the project the secret is tied to | 17:11 |
agrebennikov | doesn it make any sense? | 17:12 |
*** jmckind has joined #openstack-barbican | 17:12 | |
agrebennikov | redrobot, can you please help me with that? | 17:12 |
redrobot | agrebennikov you should be able to retrieve secrets if you have the "admin" "creator" or "observer" role on the project that owns the secret | 17:13 |
redrobot | agrebennikov see http://docs.openstack.org/developer/barbican/admin-guide-cloud/access_control.html | 17:13 |
*** jmckind_ has quit IRC | 17:14 | |
agrebennikov | redrobot, "secret_project_admin": "rule:admin and rule:secret_project_match" | 17:14 |
agrebennikov | and "secret_project_match": "project:%(target.secret.project_id)s" | 17:14 |
agrebennikov | which in my understanding means I have to call to barbican retrieving the secret with that project_id | 17:15 |
agrebennikov | right? | 17:15 |
redrobot | agrebennikov this is the rule for decypting https://github.com/openstack/barbican/blob/master/etc/barbican/policy.json#L30 | 17:15 |
agrebennikov | exactly | 17:16 |
redrobot | agrebennikov which includes https://github.com/openstack/barbican/blob/master/etc/barbican/policy.json#L22 | 17:16 |
redrobot | agrebennikov so, all roles except for audit | 17:16 |
redrobot | agrebennikov which includes "creator" and "observer" | 17:16 |
agrebennikov | right, but it still includes rule:secret_project_match | 17:17 |
redrobot | agrebennikov yes, you need to have a role in the project that owns the secret | 17:17 |
redrobot | agrebennikov all secrets are scoped to the project, not the user | 17:17 |
redrobot | agrebennikov if you want to grant access to a user that is not in your project, you might want to look at the ACL api | 17:18 |
redrobot | agrebennikov http://developer.openstack.org/api-guide/key-manager/acls.html | 17:18 |
agrebennikov | redrobot, ok, but even if I grant the role and make a call from another project... for some reason it didn't work saying it is forbidden.... so I thought "secret_project_match": "project:%(target.secret.project_id)s" means that I have to provide the token scoped for the project of the secret | 17:20 |
agrebennikov | let me give you the usecase | 17:20 |
agrebennikov | I have a user creating the secrets and containers | 17:20 |
redrobot | agrebennikov decrypt includes "or rule:secret_acl_read" | 17:20 |
redrobot | agrebennikov so ACL does not require a scoped token | 17:21 |
redrobot | it shouldn't anyway | 17:21 |
agrebennikov | redrobot, hm... let me take a look at that chain | 17:21 |
redrobot | though I wouldn't be surprised if you found an interesting new bug :) | 17:21 |
agrebennikov | redrobot, emm... "secret_acl_read": "'read':%(target.secret.read)s" | 17:22 |
agrebennikov | this is confusing | 17:22 |
agrebennikov | what does it mean? | 17:22 |
redrobot | agrebennikov target is the entity you're trying to access | 17:23 |
openstackgerrit | Merged openstack/barbican: Code cleanup https://review.openstack.org/310557 | 17:23 |
redrobot | agrebennikov I __think__ | 17:23 |
agrebennikov | this is right | 17:24 |
agrebennikov | but I mean the enrire rule | 17:26 |
*** rellerreller has quit IRC | 17:26 | |
redrobot | agrebennikov it's supposed to check whether you've been granted read access to the secret via the ACL API | 17:26 |
agrebennikov | redrobot, ok, but then how it creates the default acls for secrets and containers? | 17:28 |
*** spotz is now known as spotz_zzz | 17:30 | |
*** rellerreller has joined #openstack-barbican | 17:32 | |
*** fawadkhaliq has quit IRC | 17:33 | |
*** spotz_zzz is now known as spotz | 17:34 | |
agrebennikov | redrobot, so here is the issue I have: | 17:41 |
agrebennikov | { | 17:41 |
agrebennikov | "read": { | 17:41 |
agrebennikov | "project-access": true | 17:41 |
agrebennikov | } | 17:41 |
agrebennikov | } | 17:41 |
agrebennikov | this is current acl for the secret | 17:41 |
agrebennikov | my other user has admin role in the project the secret is created in | 17:42 |
agrebennikov | I issue the token for that user in Another project | 17:42 |
agrebennikov | and trying to read the acl | 17:42 |
agrebennikov | { | 17:42 |
agrebennikov | "code": 403, | 17:42 |
agrebennikov | "description": "SecretACL(s) retrieval attempt not allowed - please review your user/project privileges", | 17:42 |
agrebennikov | "title": "Forbidden" | 17:42 |
agrebennikov | } | 17:42 |
agrebennikov | which means I have to provide the token scoped for the projcet of the secret always? | 17:43 |
agrebennikov | seems right - if I issue the token in the right project - it allows me to read acls | 17:50 |
agrebennikov | I don't believe it is expected behaviour | 17:50 |
*** jmckind has quit IRC | 17:51 | |
*** tkelsey has quit IRC | 17:59 | |
*** dargolf1 has joined #openstack-barbican | 18:13 | |
*** silos has joined #openstack-barbican | 18:17 | |
*** dargolf has quit IRC | 18:17 | |
*** dargolf1 has quit IRC | 18:18 | |
*** tkelsey has joined #openstack-barbican | 18:26 | |
*** Daviey has quit IRC | 18:26 | |
*** Daviey has joined #openstack-barbican | 18:26 | |
*** dargolf has joined #openstack-barbican | 18:30 | |
*** tkelsey has quit IRC | 18:30 | |
openstackgerrit | OpenStack Proposal Bot proposed openstack/barbican: Updated from global requirements https://review.openstack.org/316930 | 18:31 |
*** dargolf has quit IRC | 18:34 | |
openstackgerrit | OpenStack Proposal Bot proposed openstack/barbican: Updated from global requirements https://review.openstack.org/316930 | 18:41 |
*** dargolf has joined #openstack-barbican | 18:50 | |
*** dimtruck is now known as zz_dimtruck | 18:51 | |
*** jmckind has joined #openstack-barbican | 18:52 | |
*** dargolf has quit IRC | 18:55 | |
*** silos has quit IRC | 19:05 | |
*** jmckind_ has joined #openstack-barbican | 19:06 | |
*** silos has joined #openstack-barbican | 19:06 | |
*** jmckind has quit IRC | 19:09 | |
*** dargolf has joined #openstack-barbican | 19:11 | |
redrobot | agrebennikov sorry, had to go put out a fire | 19:17 |
*** dargolf has quit IRC | 19:17 | |
agrebennikov | redrobot, sure, no problem) | 19:17 |
redrobot | agrebennikov project-access: true means the secret is viewable by all users in the project that own it (as long as they have a role on that project) | 19:18 |
redrobot | agrebennikov but that still doesn't give access to a user not on the project | 19:18 |
agrebennikov | redrobot, no, hang on | 19:18 |
redrobot | you have to POST to the ACL API to grant read access to a user with no roles on the project first | 19:18 |
agrebennikov | what I'm saying - it the user authorizes against Another project right now (even if it has a role in the proper project) - it gives Forbidden | 19:19 |
redrobot | agrebennikov yes, that is expected behavior | 19:19 |
agrebennikov | but | 19:19 |
agrebennikov | the user Has the role)) | 19:19 |
jhfeng | :q | 19:19 |
redrobot | agrebennikov so, access is granted on the (role, project) tuple | 19:20 |
agrebennikov | right | 19:20 |
redrobot | agrebennikov and we take that tuple from the token that is being presented by the user | 19:20 |
redrobot | agrebennikov afaik, the scoped token only includes the project its scoped to | 19:21 |
agrebennikov | correct | 19:21 |
redrobot | agrebennikov so you would always have to have a scoped token to the same project that owns the secret to retrieve it | 19:21 |
agrebennikov | that is what I was saying before | 19:21 |
agrebennikov | you Alwaus have to get the token in the secret's project | 19:22 |
agrebennikov | now my usecase | 19:22 |
redrobot | agrebennikov yes, sorry, I didn't quite understand your use case earlier | 19:22 |
agrebennikov | there is a user which uses contrail for creating load balancers with ssl | 19:22 |
agrebennikov | user stores its cert and the key in barbican | 19:23 |
agrebennikov | user issues the command to contrail to create a balancer, specifying the url to the container with the cert and the key | 19:23 |
agrebennikov | contrail (like all other services) has service user/password/tenant predefined in config | 19:24 |
openstackgerrit | Kaitlin Farr proposed openstack/barbican: Fix doc warnings https://review.openstack.org/318892 | 19:24 |
agrebennikov | and it uses that info in order to retreive the cert and the key | 19:24 |
agrebennikov | so contrail will never use proper tenant | 19:24 |
agrebennikov | and consequently it will never get the secret | 19:25 |
agrebennikov | redrobot, that's it)) | 19:25 |
redrobot | agrebennikov I see... is this the octavia use case? | 19:25 |
agrebennikov | nope | 19:25 |
agrebennikov | it is native contrail balancer | 19:25 |
redrobot | agrebennikov so, the use case sounds similar to octavia's use case to me. except that octavia does not store the secret for the user... | 19:27 |
*** dargolf has joined #openstack-barbican | 19:27 | |
rm_work | Yeah, it's pretty close to identical | 19:27 |
rm_work | redrobot: the user stores the secrets in the contrail case too it seems | 19:27 |
rm_work | so, identical | 19:27 |
rm_work | that's what ACLs are for :) | 19:28 |
redrobot | rm_work seems like contrail stores the secret for the user | 19:28 |
rm_work | [14:23:18] <agrebennikov>user stores its cert and the key in barbican | 19:28 |
rm_work | unless you're reading up on the docs or something | 19:28 |
redrobot | rm_work ah yes, reading comprehension FTL | 19:29 |
redrobot | agrebennikov yeah, pretty much the same use case as octavia | 19:29 |
rm_work | agrebennikov: you need to publish the service account id that you configure in contrail, the user then adds the service user as a valid user on the secret and container's ACLs | 19:29 |
redrobot | agrebennikov the step you're missing is that the user needs to grant contrail-user an ACL to be able to retrieve the secret | 19:29 |
rm_work | it's one additional step for the user | 19:29 |
rm_work | well, minimum of 3 calls :/ | 19:29 |
rm_work | ACLs for each of 3-5 objects | 19:30 |
*** dargolf has quit IRC | 19:32 | |
redrobot | although I think someone at the Summit told me it could be done with trusts now | 19:32 |
* redrobot needs to brush up on new Keystone features | 19:32 | |
*** silos has quit IRC | 19:34 | |
*** silos has joined #openstack-barbican | 19:35 | |
agrebennikov | redrobot, and rm_work sorry, didn't get the full picture yet... so you are saying: 1. user stores the secret1 (cert); 2. user stores the secret2 (key); 3. user creates the container with both secrets | 19:42 |
*** jmckind_ has quit IRC | 19:42 | |
agrebennikov | 4. user changes acl for secret1 | 19:42 |
agrebennikov | 5. user changes acl for secret2 | 19:42 |
agrebennikov | 6. user changes acl for container | 19:42 |
agrebennikov | and Only after all that secrets will be available for contrail user? | 19:43 |
rm_work | yes | 19:43 |
rm_work | that's the Octavia workflow | 19:43 |
rm_work | it's not ... ideal | 19:43 |
agrebennikov | rm_work, I'd say in a bit different words... but I'll not)) | 19:44 |
agrebennikov | rm_work, actually there is an alternative workflow I can suggest.... but it is not that easy to implement using automation | 19:45 |
agrebennikov | in policy | 19:45 |
agrebennikov | I can create a rule superuser: "user:<ID>" | 19:45 |
agrebennikov | and then extend container_acl_read and secret_acl_read with "or rule:superuser" | 19:46 |
agrebennikov | does it make sense? | 19:46 |
agrebennikov | unfortunately it doesn't allow me to specify the name in there, ID only | 19:47 |
*** rellerreller has quit IRC | 20:00 | |
*** gyee has joined #openstack-barbican | 20:02 | |
*** dargolf has joined #openstack-barbican | 20:03 | |
*** alee has quit IRC | 20:27 | |
openstackgerrit | Kaitlin Farr proposed openstack/barbican: Python 3: replace the whitelist with a blacklist https://review.openstack.org/312513 | 20:33 |
openstackgerrit | Kaitlin Farr proposed openstack/barbican: Port translations to Python 3 https://review.openstack.org/312514 | 20:33 |
diazjf1 | kfarr, thanks for rebasing :) | 20:36 |
kfarr | diazjf1 sure, I think Victor must be busy | 20:37 |
rm_work | agrebennikov: yeah we don't want to create a god account that can read all secrets :/ | 20:38 |
diazjf1 | kfarr, yeah! I'll +2 those right away. thanks again :) | 20:41 |
kfarr | diazjf1, I think we still need another person | 20:41 |
kfarr | just cuz I don't want to +2 something I've committed | 20:41 |
diazjf1 | kfarr ^ I'll wait for the gate then ping redrobot. | 20:42 |
*** elo1 has joined #openstack-barbican | 20:55 | |
*** zz_dimtruck is now known as dimtruck | 20:57 | |
*** elo11 has joined #openstack-barbican | 20:57 | |
*** elo12 has joined #openstack-barbican | 21:00 | |
*** elo1 has quit IRC | 21:00 | |
*** elo11 has quit IRC | 21:02 | |
*** jhfeng has quit IRC | 21:08 | |
*** elo12 has quit IRC | 21:11 | |
*** elo1 has joined #openstack-barbican | 21:12 | |
*** elo11 has joined #openstack-barbican | 21:15 | |
*** elo1 has quit IRC | 21:17 | |
*** elo1 has joined #openstack-barbican | 21:20 | |
*** elo11 has quit IRC | 21:21 | |
openstackgerrit | Kaitlin Farr proposed openstack/barbican: Python 3: replace the whitelist with a blacklist https://review.openstack.org/312513 | 21:22 |
openstackgerrit | Kaitlin Farr proposed openstack/barbican: Port translations to Python 3 https://review.openstack.org/312514 | 21:22 |
*** elo11 has joined #openstack-barbican | 21:25 | |
*** elo1 has quit IRC | 21:27 | |
*** elo1 has joined #openstack-barbican | 21:30 | |
*** elo11 has quit IRC | 21:31 | |
*** edtubill has quit IRC | 21:33 | |
*** elo11 has joined #openstack-barbican | 21:33 | |
*** elo1 has quit IRC | 21:34 | |
*** elo11 has quit IRC | 21:48 | |
*** elo1 has joined #openstack-barbican | 21:48 | |
*** kfarr has quit IRC | 21:52 | |
*** silos has quit IRC | 22:03 | |
*** elo11 has joined #openstack-barbican | 22:07 | |
*** elo1 has quit IRC | 22:09 | |
openstackgerrit | Merged openstack/barbican: Added KMIP Secret Store to Devstack https://review.openstack.org/307434 | 22:09 |
*** elo1 has joined #openstack-barbican | 22:15 | |
*** elo11 has quit IRC | 22:17 | |
*** sigmavirus24 is now known as sigmavirus24_awa | 22:20 | |
*** randallburt1 has quit IRC | 22:23 | |
*** elo1 has quit IRC | 22:25 | |
*** mixos has quit IRC | 22:28 | |
*** spotz is now known as spotz_zzz | 22:33 | |
*** alee has joined #openstack-barbican | 22:34 | |
*** dargolf has quit IRC | 22:40 | |
*** diazjf1 has quit IRC | 22:54 | |
*** elo1 has joined #openstack-barbican | 23:00 | |
*** dimtruck is now known as zz_dimtruck | 23:01 | |
*** elo11 has joined #openstack-barbican | 23:20 | |
*** elo1 has quit IRC | 23:22 | |
*** elo11 has quit IRC | 23:27 | |
*** zz_dimtruck is now known as dimtruck | 23:31 | |
*** dimtruck is now known as zz_dimtruck | 23:41 | |
*** jamielennox is now known as jamielennox|away | 23:49 | |
*** zz_dimtruck is now known as dimtruck | 23:51 | |
*** mixos has joined #openstack-barbican | 23:52 |
Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!