Monday, 2014-04-14

openstackgerritBrant Knudson proposed a change to openstack/keystone: Escape values in LDAP search filters  https://review.openstack.org/8714200:12
*** shakamunyi has joined #openstack-keystone00:31
morganfainbergjamielennox, https://review.openstack.org/#/c/84070/1/doc/source/using-sessions.rst i apologize in advance a lot of suggestions to make it more assertive that "this is the way it works00:32
morganfainberg"00:32
morganfainbergvs "should be" "will be" etc00:32
jamielennoxmorganfainberg: that's ok - i know i do that00:32
morganfainbergjamielennox, i didn't point them all out, but in general a more assertive tone is better for documentation00:33
morganfainbergjamielennox, i pointed a bunch out and provided some suggestions.00:33
morganfainbergjamielennox, the other point is not sure if >>> is RST friendly or if there is a ..code::python or similar construct that should be used00:34
openstackgerritBrant Knudson proposed a change to openstack/keystone: Allow any attributes in mapping  https://review.openstack.org/8104000:34
openstackgerritBrant Knudson proposed a change to openstack/keystone: Include extra attributes in list results  https://review.openstack.org/8104100:34
openstackgerritBrant Knudson proposed a change to openstack/keystone: Enhance tests for user extra attribute mapping  https://review.openstack.org/8104600:34
*** shakamunyi has quit IRC00:37
openstackgerritA change was merged to openstack/python-keystoneclient: Ensure JSON headers in Auth Requests  https://review.openstack.org/8520900:39
openstackgerritBrant Knudson proposed a change to openstack/keystone: Stronger assertion for test_user_extra_attribute_mapping  https://review.openstack.org/8714500:46
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Convert auth_token to use session  https://review.openstack.org/7490800:55
*** wchrisj has joined #openstack-keystone00:56
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: Deprecate admin_token option in auth_token  https://review.openstack.org/8709100:59
openstackgerritBrant Knudson proposed a change to openstack/python-keystoneclient: Update docs for auth_token middleware config options  https://review.openstack.org/7387501:06
*** RockKuo_ has joined #openstack-keystone01:11
bknudsonhttp://sphinx-doc.org/domains.html#cross-referencing-python-objects01:12
bknudsonoops, wrong link...01:12
openstackgerritBrant Knudson proposed a change to openstack/keystone: Fix catalog Driver signatures  https://review.openstack.org/7744401:16
*** stevemar has joined #openstack-keystone01:24
openstackgerritBrant Knudson proposed a change to openstack/keystone: Don't re-raise instance  https://review.openstack.org/8714901:25
*** wchrisj has quit IRC01:32
openstackgerritBrant Knudson proposed a change to openstack/keystone: More efficient DN list for LDAP role delete  https://review.openstack.org/8715101:36
*** diegows has quit IRC01:38
openstackgerritPriti Desai proposed a change to openstack/keystone: Adding one more check on project_id  https://review.openstack.org/8519901:40
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Revamp discovery  https://review.openstack.org/8114601:44
jamielennoxmorganfainberg: re: the token generation stuff - i would prefer that people didn't use the generic kwargs01:55
jamielennoxbut don't we have the case where you can add whatever you like to the service catalog on the server side?01:55
jamielennoxi'm not sure how else to allow that case01:55
jamielennoxalso i think the v2 does that as well01:55
openstackgerritA change was merged to openstack/python-keystoneclient: Updated from global requirements  https://review.openstack.org/8583302:05
*** dstanek has quit IRC02:14
*** dstanek has joined #openstack-keystone02:22
morganfainbergjamielennox, i think we shouldn't support generic crap in the token in v3 at least02:31
morganfainbergjamielennox, crap=things we didn't specifically put there02:31
jamielennoxmorganfainberg: yea, i'm changing that02:31
morganfainbergjamielennox, cool02:32
jamielennoxpart of the new approach - don't add anything unecessary until someone complains that it's missing02:32
morganfainbergjamielennox, ++++++++++02:32
morganfainbergjamielennox, absolutely02:32
jamielennoxharder to do that you'd think02:32
morganfainbergand even then... i'll argue against extra stuff in tokens02:32
morganfainberg:)02:32
morganfainbergit's slow going through all the reviews, but getting back to it.02:32
morganfainbergi think i'm down to ~12 left in my "will do today" for client02:33
jamielennoxmorganfainberg: it's not the token's fault - it's things that are added on the server side like when catalog endpoints are created02:33
morganfainbergjamielennox, thats the next thing i'm going to be working on, unifying token underlying format02:33
morganfainbergjamielennox, it's a requirement to move to ephemeral tokens02:33
morganfainbergjamielennox, and then allow for a transform to V202:33
jamielennoxmorganfainberg: don't do a transform02:34
jamielennoxcreate an underlying model which has everything02:34
morganfainbergjamielennox, for end consumption needs to transform02:34
jamielennoxthen go from that to v2 or v3 as a view layer02:34
morganfainbergjamielennox, yeah it'll be for emitting on a v2 interface not internal02:34
jamielennoxdon't start by assuming we want v3 to be the goal02:34
morganfainbergjamielennox, the goal is single type of token data, the rest if all up to emitting at the controller basically02:35
morganfainbergjamielennox, didn't say v3 format -> v2, i said unified data to v2 :P02:36
morganfainbergsorry wasn't clear that v3 would be the same02:36
morganfainberg;)02:36
morganfainbergand.. of course there will need to be the inverse02:36
morganfainbergonce i'm done with v2/v3 i'm planning on making token format independant of api version02:36
jamielennoxmorganfainberg: i'm not sure - i would like to see a proper model / view seperation in keystone and token would just be another in that line02:37
jamielennoxyou should never need to convert from v2->v3 or back02:37
morganfainbergjamielennox, we still need to smash down to json at some point02:37
morganfainbergjamielennox, it's not v3 -> v202:38
morganfainbergit's underlying data -> version02:38
jamielennoxsure - but that doesn't need to look like v302:38
jamielennoxi'd say it shouldn't02:38
morganfainbergand the inverse02:38
morganfainbergit wont :P02:38
jamielennox(eh - last bit debatable)02:38
morganfainbergif you _wanted_ to make v2 -> v3 you would do v2 -> unified model -> v302:38
morganfainbergthat has to be allowed, but it wont be v2 json / dict -> v302:39
morganfainbergand i expect that to only occur until v2 API dies.02:39
jamielennoxi think we're more or less talkig the same thing02:39
morganfainbergyep02:39
morganfainbergwe are02:39
morganfainbergit's something that needs to occur though soon if we want ephemeral tokens in Juno02:39
morganfainbergalong with that will be the "ensure no extra data ends up in the token" test02:40
jamielennoxmorganfainberg: ok, i'm keen02:40
morganfainbergso we don't get token creep without knowing it... or by accident02:40
morganfainberg:)02:40
*** zhiyan_ is now known as zhiyan02:41
*** stevemar has quit IRC02:47
openstackgerritMatt Fischer proposed a change to openstack/keystone: Make the LDAP debug option a configurable setting  https://review.openstack.org/8706802:54
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Create a V3 Token Generator  https://review.openstack.org/7887802:56
*** mberlin has joined #openstack-keystone02:59
*** mberlin1 has quit IRC03:00
morganfainbergjamielennox, you still here?03:06
jamielennoxmorganfainberg: yea03:06
morganfainberglooking at https://review.openstack.org/#/c/74908/8/keystoneclient/middleware/auth_token.py03:06
morganfainbergjamielennox, you removed the retry logic, it looks like we will just fail outright now ?03:06
morganfainbergjamielennox, is this something embeded in the new session object (I didn't see it) but figured i'd ask03:06
jamielennoxi removed retry logic on authentication - everything else should be ok03:07
morganfainbergjamielennox, so if the admin_token is expired the session will request a new one?03:07
morganfainbergjamielennox, e.g. uuid tokens03:07
jamielennoxyes03:08
morganfainberghmm.03:08
jamielennoxor revocation list fetching03:08
morganfainbergaye03:08
morganfainbergfigured those two would be the same03:08
morganfainberghmm. i guess i just don't see the code for it. no accounting for my blindness though03:09
morganfainbergjamielennox, oh i see i only chased part way through the session object03:09
jamielennoxretry logic is handled within the plugins03:10
jamielennoxwhen you do a get_token if it's expired it will fetch a new one firs t03:10
morganfainbergso, how does it know your token is expired (sorry, just figured it's quicker to ask)03:11
morganfainbergerm, it's token03:11
morganfainbergare you storing the whole token? more to the point what occurs if the admin token was revoked.03:11
morganfainbergdoes it know to re-request then?03:11
jamielennoxthe auth plugin knows the token it got when it authenticated03:12
jamielennoxwhich includes an expiry03:12
morganfainbergthe whole data blob03:12
morganfainbergok03:12
morganfainbergand if the admin token ends up revoked?03:12
jamielennoxso it's hanging on to the auth data as well as the header blob03:12
morganfainberglets just assume someone did something dumb.03:12
morganfainbergand changed the role or some such of the service user.03:13
morganfainbergand the token got revoked.03:13
morganfainbergs/revoked/invalidated (whatever you want to call uuid version of this)03:13
jamielennoxmmm03:14
morganfainbergbecause auth_token does need to be resilent about this (and the retry logic takes care of this)03:15
jamielennoxthat's a hard logic to make generic on the auth plugin side03:15
morganfainbergjamielennox, this might be a case where you still need a retry in auth_token03:15
morganfainbergsometimes it happens.03:15
morganfainbergand i'm ok with us keeping the retry for this case. it's an edge case, but we need to be resilient and not just fail03:16
jamielennoxit's also not something i know how to clear from outside an auth plugin03:16
jamielennoxthere isn't (currently) a generic reset03:17
morganfainbergjamielennox, you see where this could be an issue for auth_token though, right?03:18
morganfainbergjamielennox, feel free to tell me i'm the crazy one and over thinking it03:18
morganfainbergjamielennox, but i _think_ this is a legitimate issue we need to address.03:18
jamielennoxmorganfainberg: i see it03:20
jamielennoxmy question with this (and in general) is is auth_token a special case?03:20
jamielennoxwhy should auth_token have handling logic different to what all the other clients will consume03:20
morganfainbergjamielennox, hm...03:20
morganfainbergvalid point03:21
morganfainbergi'd say i think it's something we need to support across the board03:21
jamielennoxand therefore do i need to allow for the auth plugins to do generic re-authing on auth failure03:21
morganfainbergphrased that way03:21
morganfainbergi'm going to -1 that review with a comment about this.03:21
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Don't use generic kwargs in v2 Token Generation  https://review.openstack.org/8715603:21
morganfainberghow it gets handled can follow up from there.03:21
jamielennoxironically this one has already been +Aed it failed the merge job03:21
morganfainbergglad i started reviewing it then!03:22
morganfainberg:P03:22
morganfainbergsorry it's taken me this long to get some time to review client stuffs03:22
jamielennoxthat's alright - i also remember being surprised when i saw it going for merge03:22
jamielennoxparticularly with auth_token we need to be fairly careful and this is a big change03:23
jamielennoxmorganfainberg: the above link is based on not using **kwargs in token generation but for v203:23
morganfainbergjamielennox, k will look.03:23
morganfainbergjamielennox, -1 and brief comment on this convo looking at the above link now.03:25
jamielennoxthe token gen or the auth_token?03:25
morganfainbergauth_token one03:25
jamielennoxyea, not sure how to fix that generally03:25
jamielennoxit could be just a retry_auth flag to request()03:26
morganfainbergi think that is a clean option03:26
jamielennoxthere are a lot of flags on request03:26
morganfainbergi mean... as clean as it gets03:26
jamielennox:)03:26
morganfainbergit lets the caller decide if automatic retry is correct03:26
jamielennoxyea, for example from CLI that's not something i'd want03:27
jamielennoxthough i'm not sure how you set that up for clients03:27
morganfainbergthough i almost would say it's up to the implementor to do retries if the token is bad... just have a way to say "ok go retry this w/o your current token" -- but that has bad developer experience / non-dry03:27
jamielennoxyea, it's a lot of scattered retry logic and the sort of thing i'm trying to get rid of03:28
jamielennoxi guess it's a session attribute and not a request() flag03:28
morganfainbergsadly for security reasons we can't say "oh this token is revoked"03:28
morganfainbergif we could this would be easier03:28
morganfainbergwe could just retry then, but that leaks info that we shouldn't leak - we can only really say 40103:28
jamielennoxso that you create a session that just says always retry auth03:29
jamielennoxthen a CLI wouldn't set that on the session, but auth_token would03:29
morganfainbergso, here is the real question, is there _ever_ a reason not to retry auth?03:29
morganfainbergif you have the info and you get a 401 (assume cli not included)03:29
morganfainbergmaybe the answer is make it default to true and let people opt out of retry03:30
morganfainbergcli can opt out of it explicitly03:30
jamielennoxi guess it depends on what you are doing03:30
morganfainbergwhich behavior would you expect consuming the library03:30
jamielennoxand somewhat the type of auth you have03:30
morganfainberghmm. maybe let the plugin define the default / supportability?03:31
jamielennoxit *might* be something where the plugin can provide hints,  but i'm not sure if the logic can reside there03:31
morganfainbergif you have a username/password then reauth is available and expected03:31
morganfainbergif you have something else it may not be03:31
jamielennoxeg token03:32
morganfainberghm.03:32
morganfainbergwell anyway something to think about before we do this conversion03:32
morganfainbergthe v2 one looks a lot better w/o kwargs03:32
jamielennoxcurrently wondering how to not end up with circular calls to re-auth because the plugins use the session as well03:32
morganfainbergsession can be smart and only let a single retry ever occur03:33
morganfainbergsorry, 1 retry, thats what you get03:33
jamielennoxno - that excludes really long running sessions03:33
morganfainberg1 retry + window?03:33
jamielennoxyea, not sure03:33
morganfainbergsay 1 retry in a 300 second (clock skew window) period03:34
jamielennoxi can figure that out though, hopefully it becomes more apparent when actually doing code03:34
* morganfainberg nods.03:34
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Allow passing a req.Session object to old client  https://review.openstack.org/8225803:39
jamielennoxalright, going for some food03:42
*** derek_c has joined #openstack-keystone03:43
*** ukalifon has joined #openstack-keystone03:52
*** stevemar has joined #openstack-keystone03:58
*** stevemar has quit IRC04:02
*** zhiyan is now known as zhiyan_04:07
*** derek_c has quit IRC04:20
*** ukalifon has quit IRC04:29
*** ukalifon has joined #openstack-keystone04:46
*** chandan_kumar has joined #openstack-keystone04:52
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Remove _factory methods from auth plugins  https://review.openstack.org/8198504:52
*** derek_c has joined #openstack-keystone04:57
*** ukalifon has quit IRC05:20
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add new error for invalid auth response  https://review.openstack.org/8521305:38
*** zhiyan_ is now known as zhiyan05:43
openstackgerritJenkins proposed a change to openstack/keystone: Imported Translations from Transifex  https://review.openstack.org/8395506:01
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add new error for invalid auth response  https://review.openstack.org/8521306:30
*** jaosorior has joined #openstack-keystone06:39
openstackgerritSergey Nikitin proposed a change to openstack/keystone: Removed unused code  https://review.openstack.org/8598406:56
*** marekd|away is now known as marekd06:58
*** andreaf has joined #openstack-keystone07:08
*** jamielennox is now known as jamielennox|away07:18
marekdmorganfainberg: o/, still here?07:25
openstackgerritMarek Denis proposed a change to openstack/python-keystoneclient: Add CRUD operations for Federation Mapping Rules.  https://review.openstack.org/8374207:33
*** morganfainberg is now known as morganfainberg_Z08:00
*** leseb has joined #openstack-keystone08:01
*** florentflament has joined #openstack-keystone08:44
*** zhiyan is now known as zhiyan_09:30
openstackgerritSergey Nikitin proposed a change to openstack/keystone: Some methods in ldap were moved to superclass  https://review.openstack.org/8625010:29
*** david-lyle has joined #openstack-keystone10:46
*** chandan_kumar has quit IRC10:55
openstackgerritSergey Nikitin proposed a change to openstack/keystone: Code which gets elements of tree in ldap moved to a common method  https://review.openstack.org/8630210:58
*** chandan_kumar has joined #openstack-keystone11:08
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Sync test_migrations  https://review.openstack.org/8061811:16
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Redundant unique constraint  https://review.openstack.org/8444711:16
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Corresponding `nullable` value.  https://review.openstack.org/8444611:16
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Compatible server default value in the models.  https://review.openstack.org/8444511:16
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Explicit foreign key indexes.  https://review.openstack.org/8444411:16
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Make it possible to use multiprocess file locks  https://review.openstack.org/8444811:16
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Comparision of database models and migrations.  https://review.openstack.org/8063011:16
*** chandan_kumar has quit IRC11:16
*** topol has joined #openstack-keystone11:22
*** chandan_kumar has joined #openstack-keystone11:30
openstackgerritSergey Nikitin proposed a change to openstack/keystone: Code which gets and deletes elements of tree was moved to one method  https://review.openstack.org/8657811:34
*** david-lyle has quit IRC11:41
*** RockKuo_ has quit IRC11:46
*** tomoiaga has joined #openstack-keystone12:15
*** bada has quit IRC12:25
*** zhiyan_ is now known as zhiyan12:27
*** tzumainn has joined #openstack-keystone12:32
tzumainnhi guys!  quick question if anyone knows - why can you not update the tenantId through the cli user-update command?12:32
*** zhiyan is now known as zhiyan_12:36
*** zhiyan_ is now known as zhiyan12:36
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Sync test_migrations  https://review.openstack.org/8061812:47
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Redundant unique constraint  https://review.openstack.org/8444712:47
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Corresponding `nullable` value.  https://review.openstack.org/8444612:47
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Make it possible to use multiprocess file locks  https://review.openstack.org/8444812:47
openstackgerritIlya Pekelny proposed a change to openstack/keystone: Comparision of database models and migrations.  https://review.openstack.org/8063012:48
*** erecio has joined #openstack-keystone12:51
*** erecio has quit IRC12:52
*** erecio has joined #openstack-keystone12:53
*** erecio has quit IRC12:53
*** bknudson has quit IRC13:06
openstackgerritPablo Fernando Cargnelutti proposed a change to openstack/keystone: Extracting get group roles for project logic to drivers.  https://review.openstack.org/8602513:10
*** diegows has joined #openstack-keystone13:12
*** erecio has joined #openstack-keystone13:18
openstackgerritSergey Nikitin proposed a change to openstack/keystone: Code which gets and deletes elements of tree was moved to one method  https://review.openstack.org/8657813:26
*** jagee has joined #openstack-keystone13:41
*** diegows has quit IRC13:43
*** kun_huang has joined #openstack-keystone13:54
*** wchrisj has joined #openstack-keystone13:58
*** stevemar has joined #openstack-keystone14:00
*** ayoung has joined #openstack-keystone14:08
*** rwsu has joined #openstack-keystone14:09
openstackgerritIlya Pekelny proposed a change to openstack/keystone: oslo.db implementation  https://review.openstack.org/7721014:09
*** stevemar has quit IRC14:10
*** wchrisj has quit IRC14:31
*** tzumainn has quit IRC14:32
*** wchrisj has joined #openstack-keystone14:32
*** tzumainn has joined #openstack-keystone14:32
*** dims has quit IRC14:35
*** bknudson has joined #openstack-keystone14:41
*** dims has joined #openstack-keystone14:42
*** erecio has quit IRC14:44
*** stevemar has joined #openstack-keystone14:50
*** zhiyan is now known as zhiyan_14:54
*** thedodd has joined #openstack-keystone14:59
openstackgerritPablo Fernando Cargnelutti proposed a change to openstack/keystone: Extracting get group roles for project logic to drivers.  https://review.openstack.org/8602514:59
ayoungbknudson, is the change to always use sha256 going to break someone passing the MD5 hash as the token ID?14:59
*** diegows has joined #openstack-keystone15:00
bknudsonayoung: if clients don't know that the server is configured for sha256 and it uses md5 to hash the token then it's not going to validate.15:01
bknudsonso I think the answer is yes.15:01
ayoungbknudson, I think that breaks Horizon15:01
ayoungask in #openmstack-horizon before that gets committed, please15:01
bknudsonhorizon will have to be enhanced to support sha25615:01
bknudsonor other token hashing algorithms15:01
ayoungbknudson, make sure they are aware15:02
ayoungthe other clients I am less worried about,  but if we are going to go and break everyone, we need to shout loud and clear that we are doing so15:03
bknudsonayoung: makes sense... I asked on -horizon.15:04
ayoung++15:04
bknudsonI'll probably wind up opening a wishlist bug or just associate the one we've got with horizon15:04
*** doddstack has joined #openstack-keystone15:06
*** richm has joined #openstack-keystone15:07
*** thedodd has quit IRC15:08
*** stevemar has quit IRC15:09
*** chandan_kumar has quit IRC15:11
*** dims has quit IRC15:13
*** gyee has joined #openstack-keystone15:32
mfischdoes anyone know why user-role-add is pulling a full user-list under some conditions before trying to add the role?15:33
mfischWhen I add someone who is in my local DB, it does a user-lookup  .../users/<ID>15:33
mfischBut when I try to add a role to someone who's authenticated from AD (with a stacked driver) it pulls the full user-list  .../users15:34
mfischAnd from my AD that takes a long long long time15:34
mfischI can't figure out how it's deciding which way to make the call15:36
*** stevemar has joined #openstack-keystone15:38
*** joesavak has joined #openstack-keystone15:38
*** dims has joined #openstack-keystone15:39
*** gokrokve has joined #openstack-keystone15:40
mfischI think the client is trying to do an ID lookup (getID), which fails, and then leaves the call with no argument past "users"15:43
*** jsavak has joined #openstack-keystone15:46
*** joesavak has quit IRC15:49
*** marekd is now known as marekd|away15:51
*** dims has quit IRC15:52
*** diegows has quit IRC15:53
*** browne has joined #openstack-keystone15:56
*** marcoemorais has joined #openstack-keystone15:59
openstackgerritDavid Stanek proposed a change to openstack/keystone: Moves test database setup/teardown into a fixture  https://review.openstack.org/8565116:00
openstackgerritDavid Stanek proposed a change to openstack/keystone: Adds table and model for storing rotated passwords  https://review.openstack.org/7336816:00
openstackgerritDavid Stanek proposed a change to openstack/keystone: password rotation extension WIP  https://review.openstack.org/7462316:00
*** dims has joined #openstack-keystone16:05
*** joesavak has joined #openstack-keystone16:05
*** jsavak has quit IRC16:05
*** thiagop has joined #openstack-keystone16:11
*** dims has quit IRC16:13
*** dims has joined #openstack-keystone16:27
*** tomoiaga has quit IRC16:31
mfischif anyone cares it appears that my issue is that if the user-id is not a UUID, which it's not in LDAP, then the python-keystone client does a search instead of a direct lookup16:31
*** chandan_kumar has joined #openstack-keystone16:33
dolphmayoung: this was the same crypto talk that was in SA https://www.youtube.com/watch?v=r_Pj__qjBvA16:33
dolphmmfisch: with the latest client?16:34
dolphmmfisch: there was a fix for an issue that sounds a lot like that a few months ago16:34
mfischdolphm: I'm in Havana16:34
mfischdolphm: I was about to file a bug, let me check Icehouse16:35
mfischmy one line hack fixed it though16:35
openstackgerritDavid Stanek proposed a change to openstack/keystone: Ingore broken endpoints in get_catalog  https://review.openstack.org/8152816:35
openstackgerritDavid Stanek proposed a change to openstack/keystone: Ignore broken endpoints in get_v3_catalog  https://review.openstack.org/8152716:35
mfischdolphm: from a brief glance it looks to be fixed in I, the assumption that UIDs had to be UUIDs was taken out16:36
*** tzumainn has left #openstack-keystone16:36
dolphmmfisch: ++16:38
mfischhttps://bugs.launchpad.net/python-keystoneclient/+bug/118993316:38
uvirtbotLaunchpad bug 1189933 in python-keystoneclient "user-get fails when using IDs which are not UUIDs" [High,Fix released]16:38
mfischthanks dolphm16:38
mfischand thanks ayoung for fixing this16:38
mfischI spent all Friday afternoon working around this by making local copies in SQL of LDAP users which was kinda fun16:39
openstackgerritguang-yee proposed a change to openstack/keystone: Make sure all the auth plugins agree on the shared identity attributes.  https://review.openstack.org/8494516:39
mfischbknudson: will the DocImpact bug on my review be assigned to me?16:40
mfischdolphm: is there a ML specific to keystone? I didn't see one in the wiki16:43
*** htruta has joined #openstack-keystone16:43
ayoungdolphm, thanks.  I'll watch it here shortly...around a troubleshooting session for Neutron managed networks...16:45
htrutadolphm, ayoung https://bugs.launchpad.net/keystone/+bug/1081221 can you see the comment I've made on this bug? i think it was already solved in another bug or BP16:46
uvirtbotLaunchpad bug 1081221 in keystone "Keystone POST /tokens response does not contain all endpoints" [Medium,Triaged]16:46
ayounghtruta, probably solved.  THat was an old report16:46
htrutaayoung: can you update the bug status?16:47
*** leseb has quit IRC16:47
*** leseb has joined #openstack-keystone16:48
dolphmhtruta: done, thanks!16:51
*** leseb has quit IRC16:52
htrutaayoung: thanks!16:52
*** harlowja_away is now known as harlowja16:54
dolphmmarekd|away: stevemar: we need those federation docs on at least keystone.openstack.org!16:55
stevemardolphm, which docs you thinking of, specifically?16:56
dolphmstevemar: marekd|away's mailing list response should just be docs16:56
dolphmstevemar: marekd|away: there have been a *lot* of requests for docs to setup mod_shib etc16:56
stevemardolphm, i was worried you would want those ones specifically16:57
dolphmstevemar: why is that a worry?16:58
stevemardolphm, cause work?16:58
stevemardolphm, i'll start something16:58
openstackgerritA change was merged to openstack/keystone: Collapse SQL Migrations  https://review.openstack.org/7816916:59
dolphmstevemar: hrm, marekd|away actually replied off-list with instructions (gmail is just showing it to me as part of the same thread)17:02
dolphmnot sure why it's not on list, but i'll forward it to you17:03
stevemardolphm, please do17:03
dolphmstevemar: it sounds like marekd|away is working on docs already too17:03
stevemardolphm, even better17:03
stevemardolphm, he's the one actually consuming/trying it out17:03
stevemardolphm, can you fwd to my ibm email, if you have it on record17:04
*** afaranha has joined #openstack-keystone17:06
nkinderdolphm: yeah, I've had folks asking about how to set things up for federation lately too17:07
dolphmstevemar: i did17:07
stevemarnkinder, fwding to you17:10
*** amcrn has joined #openstack-keystone17:11
nkinderstevemar: thanks17:13
*** gokrokve_ has joined #openstack-keystone17:16
*** gokrokve has quit IRC17:19
*** htruta has quit IRC17:33
*** marekd|away is now known as marekd17:37
*** gokrokve_ has quit IRC17:37
marekddolphm: i wanted to reply to the list with some more 'ready to share' document...17:37
openstackgerritA change was merged to openstack/python-keystoneclient: Don't use generic kwargs in v2 Token Generation  https://review.openstack.org/8715617:41
bknudsondolphm: keystone switching to 'cryptography' lib?17:42
dstanekbknudson: is there a review for that?17:55
bknudsondstanek: I haven't seen a patch. I just heard of the lib.17:55
bknudsonI assume barbican is planning to use it.17:56
dstanekbknudson: ah, ok; i think it was ayoung and nkinder that were looking for what we should be doing cryptographically17:56
ayoungdstanek, reading up17:57
ayoungah...not yet17:57
ayoungnot sure if the cryptography libraray even has the primitives for CMS, never mind the "recipe"17:57
ayoungdstanek, bknudson I'd like to drive toward that, though, as I think it would be great to have a really mature, full featured Crypto story in Python17:58
*** afaranha has left #openstack-keystone17:59
*** afaranha has joined #openstack-keystone17:59
nkinderThe barbican guys are involved with that whole effort17:59
nkinderhttps://github.com/pyca/cryptography17:59
ayoungnkinder, we should evalutate the feasability of NSS as a cryptography.py backend18:00
nkinderayoung: fairly certain they are already looking at it18:01
ayoungand whether something that uses that could get common criteria certification....or if it would suffer from the same restriction that JCCE has with multi-backends18:01
* ayoung never understood that18:01
afaranhadstanek: Hello, you asked me the link of my review, here it is https://review.openstack.org/#/c/85480/ (About testing keystoneclient in nova API)18:02
afaranhadstanek: The problem is: I don't know how to automatic test it, because it needs to change some data in the currently openstack instance18:03
afaranhain line 75 I instantiate keystoneclient (https://review.openstack.org/#/c/85480/3/nova/api/openstack/compute/contrib/change_instance_ownership.py), and use it in line 13318:05
dstanekafaranha: maybe that's a job for the tempest tests? i took a look when you first posted, but i don't have an constructive comments because I don't know how nova tests work18:05
dstanekafaranha: i thought you were making keystoneclient changes18:05
afaranhano, no, I just use it to list projects. Do you know how does the tempest works? I only know how to run it, but what difference does it make?18:06
dstanekafaranha: in keystone unit test we spin up a new database for each test so we are able to mess with it as much as we want and it won't impact other tests18:06
afaranhadstanek: I'm still new to openstack and don't know how to do it, could you, please,  explain how to spin up a new database?18:08
dstanekafaranha: i think you need to talk to the nova team about what you want to do for some guidance18:09
dstanekafaranha: that is just built into the way our tests run18:09
dstanekafaranha: as far as i understand, tempest is more for testing larger scenarios across projects - different that project unit testing18:10
afaranhadstanek: I think for this functionality I could create a database and create users and projects to test it18:10
dstanekafaranha: is this for a unit test?18:10
*** leseb has joined #openstack-keystone18:10
openstackgerritPablo Fernando Cargnelutti proposed a change to openstack/keystone: Extracting get group roles for project logic to drivers.  https://review.openstack.org/8602518:10
dstanekafaranha: if it is you should find our how they handle this kind of testing18:11
afaranhaI think I cannot do an unit test for it, since it depends on keystone and mock it won't work18:11
*** morganfainberg_Z is now known as morganfainberg18:15
morganfainbergmarekd, sorry missed ya last night18:16
afaranhadstanek: Thank you, I'll ask more details with nova team :)18:17
openstackgerritDavid Stanek proposed a change to openstack/keystone: Moves test database setup/teardown into a fixture  https://review.openstack.org/8565118:18
openstackgerritDavid Stanek proposed a change to openstack/keystone: Adds table and model for storing rotated passwords  https://review.openstack.org/7336818:18
openstackgerritDavid Stanek proposed a change to openstack/keystone: password rotation extension WIP  https://review.openstack.org/7462318:18
dstanekafaranha: good luck!18:18
*** doddstack has quit IRC18:19
*** doddstack has joined #openstack-keystone18:19
*** leseb has quit IRC18:20
*** andreaf has quit IRC18:20
morganfainbergdolphm, yay! sql collapse went in!18:22
*** Guest_ has joined #openstack-keystone18:29
*** gokrokve has joined #openstack-keystone18:39
*** derek_c has quit IRC18:43
dstanekmorganfainberg: nice18:44
morganfainbergdstanek, now i need to get on the refactor to move to the migration testing like nova does (more programatic)18:44
marekdmorganfainberg: no problem, and thanks for the review.18:49
morganfainbergmarekd, +2 by the way, thanks for fixing the RST issues, looks way better now18:49
marekdmorganfainberg: yay!18:49
morganfainbergalso not masking id is good, but broken docs are super bad :P18:50
* morganfainberg gets back to catching up on email18:51
marekdunderstood.18:53
*** kun_huang has quit IRC18:54
*** tomoiaga has joined #openstack-keystone18:55
*** Guest_ has quit IRC18:55
*** Guest_ has joined #openstack-keystone18:55
tomoiagaI can't find a way to get a token on behalf of another user, having admin credentials. I believe this is not possible right now right ? (I can re-scope by domain/project, but user has a default domain ID, not sure if it's the right way)18:58
*** dstanek has quit IRC18:59
*** doddstack has quit IRC19:10
*** thedodd has joined #openstack-keystone19:10
*** thedodd has quit IRC19:19
*** thedodd has joined #openstack-keystone19:20
*** thedodd has quit IRC19:22
dolphmtomoiaga: correct - even as "admin" you can't just impersonate another identity19:22
*** chandan_kumar has quit IRC19:22
dolphmtomoiaga: we support explicit impersonation through trust delegation, but it sounds like that not actually what you need19:23
dolphmtomoiaga: if you just need to perform operations on a specific project/tenant, as admin you can assign yourself whatever roles you want on that tenant/project, and just scope to it19:23
dolphmtomoiaga: i.e. you don't have to impersonate anyone19:23
*** thedodd has joined #openstack-keystone19:24
*** cynosure_ has joined #openstack-keystone19:24
*** vhoward has left #openstack-keystone19:27
*** amcrn is now known as notamrith19:28
*** notamrith is now known as amcrn19:32
*** nkinder has quit IRC19:40
morganfainbergwow there are a lot of proposed sessions for keystone @ ATL19:51
tomoiagadolphm: yes, that is what I am thinking. I need to integrate keystone with an existing user base and I would of wanted to only perform tasks using the users credentials not the admin ones, but I guess I just have to scope to roles I need in a specific domain/project.19:52
openstackgerritMarek Denis proposed a change to openstack/python-keystoneclient: Add CRUD operations for Federated Protocols.  https://review.openstack.org/8382919:58
openstackgerritA change was merged to openstack/identity-api: Fix bad formatting in v3 federation markdown  https://review.openstack.org/8561720:00
*** boris-42 has joined #openstack-keystone20:01
boris-42dolphm hi20:01
*** gokrokve has quit IRC20:21
*** tomoiaga has quit IRC20:22
*** stevemar has quit IRC20:22
*** derek_c has joined #openstack-keystone20:23
gyeemorganfainberg, yeah, I am adding one more proposal20:24
morganfainberggyee, wheeeee!20:25
morganfainberggyee, sooooo many proposals20:25
gyeetime to write more code! :D20:25
boris-42morganfainberg hi20:26
morganfainbergboris-42, hi there!20:26
boris-42morganfainberg just looking for people who cares about performance of openstack=)20:26
boris-42morganfainberg do you know somebody here in keystone?)20:26
morganfainbergboris-42, ++ i care a lot about it20:26
boris-42morganfainberg so nice=)20:27
boris-42morganfainberg and I am working on tool for benchmarking openstack projects20:27
morganfainbergboris-42, but i'm not the only one, i know ayoung, bknudson, dolphm, and the rest of the core team do as well.20:27
morganfainberg(sorry for those not explicitly named :P)20:27
morganfainbergboris-42, awesome!20:27
bknudsonboris-42: our group cares about keystone performance20:28
boris-42so we have already some base benchmarks20:28
boris-42for keystone20:28
bknudsonboris-42: getting some baseline numbers is the first step20:28
boris-42how about running on every patch?20:28
boris-42in gates?)20:28
boris-42benchmarks20:28
bknudsonboris-42: that's what we need.20:28
boris-42so why not just run Rally ?20:29
boris-42it has already benchmarks + processing and graphics=)20:29
boris-42http://pavlovic.me/rally/glance_list.html output for glance lol20:29
boris-42bknudson I mean for 1 hrs that takes tempest (we are able to run a lot of benchmarks)20:30
bknudsonboris-42: I can't get to that site.20:31
boris-42hmm20:31
boris-42bknudson it takes a bit to load that page20:31
boris-42bknudson that page is huge ..20:31
boris-42bknudson morganfainberg  so guys if you are interested I can make live demo of benchmarking keystone20:32
boris-42bknudson morganfainberg  + share ideas about voting gate performance tests20:32
boris-42in case of nodes with different performance20:33
morganfainbergboris-42, i would love to see performance per-commit (even if it doesn't block gate), but show trends.20:33
morganfainbergso we can see which direction we're moving and get averages etc.20:33
boris-42morganfainberg so it's actually quite simple to do20:33
boris-42morganfainberg we will have gate inside rally that will run all scenarios20:34
bknudsonI think we especially want to see if some change done for performance reasons actually improves performance20:34
boris-42morganfainberg but in case of keystone we can make task that exercise only keysotne20:34
bknudsonbut I also like the idea of gating on a change that really causes a perf problem.20:34
boris-42bknudson morganfainberg actually that is why started Rally 8 months ago20:34
boris-42bknudson morganfainberg  to make it possible to see how changes affect performance20:34
morganfainbergboris-42, nice.20:35
bknudsonboris-42: glance is using this laready?20:35
bknudsonalready20:35
*** marcoemorais has quit IRC20:35
boris-42bknudson nope we just started work on gates recently20:35
*** gokrokve has joined #openstack-keystone20:35
boris-42bknudson cause we were more concentrate on Rally not on integrations=)20:35
boris-42bknudson but seems like "cinder" will add rally gate soon20:36
*** marcoemorais has joined #openstack-keystone20:36
bknudsonboris-42: I think cinder also has different backends / drivers -- do they test with different drivers?20:36
boris-42bknudson seems like first gate will be on top of fake driver20:37
boris-42bknudson to check infrastructure issues20:37
boris-42bknudson not performance of hdd=)20:37
boris-42bknudson perfromance/scale testing could be done with relative small amount of hardware20:38
*** leseb has joined #openstack-keystone20:38
boris-42bknudson you can split benchmarking driver from benchmarking whole project infrastructure20:38
bknudsonboris-42: it would be interesting to have some numbers for how keystone performs with concurrent requests.20:38
boris-42bknudson just run rally=)20:39
boris-42bknudson we already have benchmarks for authenticate (create users and tenants)20:39
morganfainbergboris-42, bknudson, concurrency is a bit part of what i plan to focus on this cycle, i'm thinking i need to poke at rally to make sure i'm moving us in the right direction20:39
bknudsonboris-42: I think the keystone performance we want is authenticating (getting and validating a token)20:39
boris-42morganfainberg bknudson  so guys maybe just shot live demo?20:39
boris-42short*20:40
boris-42https://wiki.openstack.org/wiki/Rally/HowTo <- or you can read this manual =)20:40
bknudsonboris-42: is there code with they keystone tests?20:40
boris-42bknudson in tutorial we are running nova benchmark20:40
boris-42bknudson but https://github.com/stackforge/rally/tree/master/doc/samples/tasks/keystone20:41
boris-42^ samples of benchmarks tasks for keystone20:41
boris-42and one for authenticate20:41
boris-42https://github.com/stackforge/rally/tree/master/doc/samples/tasks/authenticate20:41
boris-42so you can just run with rally this tasks and that's all20:41
boris-42btw installation of rally is quite simple task20:42
bknudsonthe tests are in json?20:42
boris-42git clone https://github.com/stackforge/rally.git20:42
boris-42bknudson you are able to use json or yaml20:42
boris-42bknudson as an input format20:42
boris-42bknudson it was holly war in rally20:42
bknudsonlooks like they both won20:42
boris-42bknudson cause half of Rally team preferred json half yaml20:42
bknudsonnow you have to do both20:42
boris-42yep=)20:42
boris-42changed json.loads to yaml.safe_load lol20:43
boris-42+)20:43
boris-42so to install rally just run20:44
boris-42https://github.com/stackforge/rally/blob/master/install_rally.sh =)20:44
*** dstanek has joined #openstack-keystone20:44
bknudsonis rally integrated into devstack?20:44
boris-42bknudson we are on stack forge =(20:45
boris-42bknudson but you can use rally devstack plugin20:45
boris-42bknudson https://wiki.openstack.org/wiki/Rally/installation#Rally_with_DevStack_all_in_one_installation20:45
bknudson./tests/fakes.py:        self._keystone = FakeKeystoneClient() ... interesting20:47
boris-42bknudson hehe=)20:47
boris-42bknudson tests - are real unit tests20:47
boris-42bknudson not benchmarks=)20:47
boris-42all benchmarks are here https://github.com/stackforge/rally/tree/master/rally/benchmark/scenarios20:48
bknudsonboris-42: how do I link the "Authenticate.keystone" from keystone.json to the function?20:49
boris-42bknudson so first of all there is a base.Scenario class20:50
boris-42all subclasses of it are auto discovered20:50
boris-42bknudson to make a benchmark scenario from just a method of this class20:51
boris-42you should add @base.scenario decorator20:51
cynosure_hi, has anyone tried running keystone in apache2 containers ?20:51
dstanekmorganfainberg: did you have any thoughts on https://bugs.launchpad.net/keystone/+bug/130058120:51
uvirtbotLaunchpad bug 1300581 in keystone "test_revoke.RevokeTreeTests.test_cleanup fails" [Critical,Triaged]20:51
dstaneki can't reproduce it locally20:51
morganfainbergdstanek, i was trying to duplicate it. i can't20:51
cynosure_I am following these instructions https://github.com/openstack/keystone/blob/master/doc/source/apache-httpd.rst but facing issues20:51
boris-42bknudson so "Authenticate" - is class name and "keystone" is method in this class20:51
morganfainbergdstanek, i've tried many many many ways.20:51
morganfainbergdstanek, but we're somehow losing an event (we are expecting more than there are)20:52
bknudsondstanek: morganfainberg: https://review.openstack.org/#/c/86472/ -- I tried adding some debug output, but never hit it20:52
bknudsonmaybe merge it and see if it helps20:52
morganfainbergdstanek, i'm actually wondering if a sleep(0) would "fix" it.20:52
morganfainbergbknudson, thats a good idea.20:52
morganfainbergbknudson, needs a rebase but i'm 100% for merging that20:54
openstackgerritBrant Knudson proposed a change to openstack/keystone: More debug output for test  https://review.openstack.org/8647220:54
bknudsonrebased.20:54
morganfainbergbknudson, ++ LGTM. will +2 once jenkins is happy20:55
boris-42bknudson so is it now clear how name from task is bind to scenario method?)20:56
bknudsonboris-42: https://github.com/stackforge/rally/blob/master/rally/benchmark/scenarios/authenticate/authenticate.py#L24 is Authenticate.keystone ?20:58
bknudsonit's pretty short20:58
boris-42bknudson yep20:58
dstanekbknudson: i like the logging20:58
bknudsondstanek: I don't know what else to do other than see what the args are... I was never able to recreate locally20:59
boris-42bknudson and here is the sample https://github.com/stackforge/rally/blob/master/doc/samples/tasks/authenticate/keystone.yaml20:59
boris-42bknudson of task for it20:59
boris-42bknudson not a fun of tempest stuff20:59
bknudsonboris-42: what does the output look like? took x seconds?20:59
dstanekbknudson: yeah, i ran the tests in a loop over night and never got a failure21:00
boris-42bknudson it's a bit more complex21:00
boris-42bknudson =)21:00
boris-42bknudson here is the result schema21:00
boris-42bknudson https://github.com/stackforge/rally/blob/master/rally/benchmark/runners/base.py#L82-L12921:00
bknudsonboris-42: so looks like we've got a test for getting a token via username and password (not sure what the backend is)...21:01
boris-42bknudson yep something like that21:01
boris-42bknudson and in this case we are actually using small part of power of rally21:02
bknudsonboris-42: how about a scenario for validating a token, and one for getting a token given another token?21:02
boris-42bknudson I have always simple answer on that =)21:02
boris-42bknudson it's python and you are able to run any functions from std python client21:02
*** browne has quit IRC21:03
boris-42bknudson so it's possible21:03
boris-42=)21:03
boris-42bknudson more then you're able to measure time of every action21:03
boris-42bknudson like here https://github.com/stackforge/rally/blob/master/rally/benchmark/scenarios/keystone/basic.py#L44-L4721:04
boris-42bknudson you'll get whole duration, duration of user create and duration of list users21:04
bknudsonboris-42: what does the output look like? I thought I'd find some in cinder but didn't see any21:05
boris-42bknudson let me re-run some keystone benchmark21:05
*** browne has joined #openstack-keystone21:05
bknudsonboris-42: you were planning to integrate this into the gate/check runs?21:06
boris-42bknudson http://paste.openstack.org/show/75713/21:07
boris-42bknudson this is already aggregated result21:07
bknudsonkeystone.create_tenant |   10  | 1.0027561187721:08
bknudsonslow!21:08
bknudsonrunning on a commodore 64?21:08
boris-42bknudson this is without aggregation http://paste.openstack.org/show/75714/21:08
boris-42bknudson so we have information for every call21:08
boris-42bknudson information about exception (if it occurred), information about duration and so on21:09
bknudsonboris-42: I'd be happy with just a big table of action         | count |   max (sec)    |   avg (sec) for each action.21:09
boris-42bknudson it's 5 concurrent requests21:09
boris-42bknudson heh21:09
boris-42bknudson on page that I share21:09
boris-42bknudson you can find pretty graphs21:09
boris-42bknudson let me share just HTML code21:10
bknudsonboris-42: what's the plan to compare against previous runs or figure out if this commit is a lot slower?21:11
bknudsonboris-42: we've got a similar problem where we might want to compare tox -e cover results across commits.21:11
boris-42bknudson http://paste.openstack.org/show/75716/21:11
boris-42bknudson just open in your browser21:12
boris-42bknudson so I have some thoughts21:12
boris-42bknudson first step integration is just use your eyes=)21:12
boris-42bknudson second step integration is use one DB for all rally instances21:12
boris-42bknudson so you'll be able to store all results in one place21:13
boris-42bknudson and access them in every moment21:13
*** topol has quit IRC21:13
boris-42bknudson the third step is to make in rally support of task comparison (so it will draw graphs and son on)21:13
boris-42bknudson then we should have "normalization" of absolute values21:14
boris-42bknudson e.g. running some benchmark that measure cpu/io/mem performance21:15
boris-42and having function that calculates normalization_number21:15
boris-42based on that values=)21:15
boris-42and last step is voting gate21:16
boris-42that normalizes absolute values and compares with latest merged patch21:16
boris-42bknudson ^21:17
*** leseb has quit IRC21:17
boris-42seems like if we get approve from PTL this can take whole Juno cycle..21:17
bknudsonboris-42: sounds great. I'd like to see the results generated for every commit.21:17
boris-42bknudson yep it's quite simple to get results21:17
boris-42bknudson but normalization & voting gate & comparing with previous will be interesting a big task=)21:18
*** nkinder has joined #openstack-keystone21:39
*** Guest_ has quit IRC21:40
*** nkinder has quit IRC21:48
*** marekd is now known as marekd|away21:48
*** derek_c has quit IRC21:53
*** joesavak has quit IRC21:56
*** dims has quit IRC21:57
*** jagee has quit IRC22:01
*** browne has quit IRC22:03
*** amcrn has quit IRC22:04
*** browne has joined #openstack-keystone22:07
*** dims has joined #openstack-keystone22:10
dolphmdstanek: just came across your comments on bug 1292311 - nice work lol22:36
uvirtbotLaunchpad bug 1292311 in keystone "5 unicode unit test failures when building Debian package" [Undecided,Invalid] https://launchpad.net/bugs/129231122:36
dstanekdolphm: that was a bit of a pain to figure out, but i learned a ton about debain packaging from zigo22:37
*** gokrokve has quit IRC22:38
dolphmdstanek: i can imagine! zigo == thomas ?22:39
dstanekyep22:40
*** gokrokve has joined #openstack-keystone22:46
*** gokrokve has quit IRC22:48
*** dims has quit IRC22:57
*** doddstack has joined #openstack-keystone23:03
*** thedodd has quit IRC23:04
morganfainbergdstanek, yeah i learned a lot talking to zigo last time23:05
*** jamielennox|away is now known as jamielennox23:06
*** doddstack has quit IRC23:08
jamielennoxayoung: from my understanding cryptography will accept an NSS backend but the core team isn't interested in writing it23:11
jamielennoxi have been watching it for a while now and would be keen to write it, just not sure how to fit it in with other stuff23:12
jamielennoxCMS is a long way off because they need a full x509 stack for that23:12
*** bknudson has quit IRC23:12
cynosure_tried to use keystone with apache2 facing problem "no module named openstack.common"23:20
cynosure_its able to find the keystone paste file but not keystone23:20
*** gokrokve has joined #openstack-keystone23:21
cynosure_am i missing something23:21
cynosure_following instructions from here https://github.com/openstack/keystone/blob/master/doc/source/apache-httpd.rst23:21
*** dims has joined #openstack-keystone23:22
jamielennoxcynosure_: openstack.common should be a part of keystone (keystone.openstack.common) so it would appear to be an install issue rather than httpd specific23:22
jamielennoxcan you pastebin the whole error23:22
dolphmmorganfainberg: +1 for markdown in your email23:23
dolphmcynosure_: i'd be curious to see the whole backtrace as well23:24
cynosure_I installed keystone from source ; then followed the instructions here https://github.com/openstack/keystone/blob/master/doc/source/apache-httpd.rst. Installed httpd and mod_wsgi. If I installed keystone from source I can see keystone being part of standard source path /usr/lib/python2.6/site-packages. Still not understanding why seeing "no module named openstack.common"23:28
cynosure_dolphm: patebin link http://pastebin.com/PnEqjFc723:30
dolphmjamielennox: ^23:30
cynosure_jamielennox : ^^23:30
*** derek_c has joined #openstack-keystone23:31
cynosure_what is the normal procedure to use keystone with apache2 ? Are there well documented steps to do the same apart from the link which i pasted above23:31
jamielennoxcynosure_: i'm guessing that python is not picking up keystone in your path23:32
jamielennoxlooking here: https://github.com/openstack/keystone/blob/master/httpd/keystone.py the gettextutils are the first thing ever imported from keystone23:32
cynosure_jamielennox: true, but why ?23:32
jamielennoxso i don't think it's related to openstack.common just that your http process can't find the keystone module23:32
dolphmcynosure_: this is a very opinionated keystone.conf, but it deploys to apache https://github.com/dolph/keystone-deploy23:32
cynosure_me and my collugue both are seeing this23:32
dolphmcynosure_: what version of keystone is this?23:32
dolphmjamielennox: i find it really odd that it doesn't say keystone.openstack.common ...23:34
jamielennoxyea23:34
dolphmfor example, python -c "from asdfasdf.openstack.common import gettextutils" fails with ImportError: No module named asdfasdf.openstack.common23:34
jamielennoxcynosure_: can you pastebin the whole apache conf file as well23:34
cynosure_the apache conf file is unmodified23:35
dolphmcynosure_: and /usr/local/www/wsgi-scripts/keystone/keystone.py ?23:35
cynosure_i can paste that too23:35
cynosure_dolphm : thats where the keystone wsgi application is residing.23:35
cynosure_which i got from the keystone source23:36
jamielennoxa good check is normally sudo -u apache python -c "import keystone"23:36
jamielennoxbut it depends on your setup a bit23:36
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Rename HTTPError -> HttpError  https://review.openstack.org/8741123:41
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add new error for invalid auth response  https://review.openstack.org/8521323:41
openstackgerritJamie Lennox proposed a change to openstack/python-keystoneclient: Add new error for invalid response  https://review.openstack.org/8521323:43
cynosure_jamielennox : Am I missing something here ?23:44
cynosure_when I run sudo -u apache python -c "import keystone" it says Sorry, user XYZ is not allowed to execute '/usr/bin/python -c import keystone' as apache on MACHINE23:45
jamielennoxcynosure_: so what are you seeing now? same thing? did you try that import statement to make sure the apache user can see the keystone module? is there a pastebin with your httpd config?23:45
jamielennoxhmm, so you have a fairly restrictive environment then23:46
jamielennoxis apache your www user?23:46
dolphmcynosure_: sounds like you just have some permissions issues to work through!23:48
cynosure_yes apache is my www user23:48
jamielennoxinteresting, you can run mod_wsgi because you are getting the exception but the apache user can't run python23:49
*** arborism has joined #openstack-keystone23:49
cynosure_apache   20447  0.0  1.2 404568 25144 ?        S    22:11   0:00 /usr/sbin/httpd23:49
*** vhoward has joined #openstack-keystone23:51
cynosure_jamielennox : i haven't modified the httpd.conf23:52
cynosure_using httpd-2.2.15-30.el6_5.x86_6423:52
cynosure_and python 2.6.623:55
*** cynosure_ has quit IRC23:55
jamielennoxif its a basic rhel/centos install then i can't see any reason that the apache user can't run the python process23:57
jamielennoxand make sure that you have selinux disabled (not that you should need it in production, but in testing it's a PITA)23:57
*** arborism is now known as amcrn23:58
*** wchrisj has quit IRC23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!