*** ncoghlan has joined #openstack-keystone | 00:11 | |
openstackgerrit | Jamie Lennox proposed a change to openstack/keystonemiddleware: Replace httpretty with requests-mock https://review.openstack.org/112777 | 00:25 |
---|---|---|
*** jsavak has quit IRC | 00:35 | |
*** diegows has quit IRC | 01:01 | |
*** xianghui has joined #openstack-keystone | 01:11 | |
*** ncoghlan is now known as ncoghlan_afk | 01:58 | |
*** hrybacki has joined #openstack-keystone | 01:59 | |
*** hrybacki has quit IRC | 02:04 | |
*** bvandenh has joined #openstack-keystone | 02:20 | |
*** bvandenh has quit IRC | 02:28 | |
*** ayoung has quit IRC | 03:19 | |
*** stevemar has joined #openstack-keystone | 03:25 | |
openstackgerrit | Jeffrey Zhang proposed a change to openstack/keystone: Redirect stdout and stderr when using subprocess https://review.openstack.org/51610 | 03:28 |
*** ncoghlan_afk is now known as ncoghlan | 03:29 | |
*** chandankumar has joined #openstack-keystone | 03:33 | |
*** nkinder_away has joined #openstack-keystone | 03:44 | |
*** hrybacki has joined #openstack-keystone | 04:01 | |
*** amirosh has joined #openstack-keystone | 04:05 | |
*** hrybacki has quit IRC | 04:05 | |
openstackgerrit | Jeffrey Zhang proposed a change to openstack/keystone: Redirect stdout and stderr when using subprocess https://review.openstack.org/51610 | 04:12 |
*** chandankumar has quit IRC | 04:27 | |
openstackgerrit | Jamie Lennox proposed a change to openstack/python-keystoneclient: Auth plugin serialization https://review.openstack.org/113163 | 04:33 |
*** chandankumar has joined #openstack-keystone | 04:38 | |
*** Lily_shhqp has joined #openstack-keystone | 04:46 | |
*** k4n0 has joined #openstack-keystone | 05:38 | |
*** abhishekk has joined #openstack-keystone | 05:43 | |
*** tomoiaga has joined #openstack-keystone | 05:54 | |
*** stevemar has quit IRC | 06:01 | |
openstackgerrit | OpenStack Proposal Bot proposed a change to openstack/keystone: Imported Translations from Transifex https://review.openstack.org/111920 | 06:04 |
*** xianghui has quit IRC | 06:05 | |
*** Lily_shhqp has quit IRC | 06:06 | |
*** xianghui has joined #openstack-keystone | 06:06 | |
*** abhishekk has quit IRC | 06:12 | |
*** abhishekk has joined #openstack-keystone | 06:13 | |
*** zigo has quit IRC | 06:31 | |
openstackgerrit | Marek Denis proposed a change to openstack/keystone: Remove _BaseFederationExtension. https://review.openstack.org/113136 | 06:32 |
*** zigo has joined #openstack-keystone | 06:36 | |
*** abhishekk has quit IRC | 06:36 | |
openstackgerrit | Abhishek Kekane proposed a change to openstack/keystone: Keystone service throws error on receiving SIGHUP https://review.openstack.org/107482 | 06:40 |
*** ajayaa has joined #openstack-keystone | 06:44 | |
*** marekd|weekend is now known as marekd | 06:46 | |
*** abhishekk has joined #openstack-keystone | 06:49 | |
openstackgerrit | Jamie Lennox proposed a change to openstack/keystonemiddleware: Create an Auth Plugin to pass to users https://review.openstack.org/107222 | 06:59 |
openstackgerrit | Marek Denis proposed a change to openstack/python-keystoneclient: SAML2 federated authentication for ADFS. https://review.openstack.org/111771 | 07:00 |
*** ildikov has joined #openstack-keystone | 07:06 | |
openstackgerrit | Jamie Lennox proposed a change to openstack/python-keystoneclient: Auth plugin serialization https://review.openstack.org/113163 | 07:09 |
openstackgerrit | Kanagaraj Manickam proposed a change to openstack/keystone: endpoint table is missing reference to region table https://review.openstack.org/113183 | 07:19 |
*** jamielennox is now known as jamielennox|away | 07:28 | |
*** jaosorior has joined #openstack-keystone | 07:29 | |
*** junhongl has quit IRC | 07:49 | |
openstackgerrit | Marek Denis proposed a change to openstack/python-keystoneclient: SAML2 federated authentication for ADFS. https://review.openstack.org/111771 | 07:55 |
openstackgerrit | wanghong proposed a change to openstack/keystonemiddleware: convert the conf value into correct type https://review.openstack.org/113191 | 07:58 |
*** hrybacki has joined #openstack-keystone | 08:02 | |
*** hrybacki has quit IRC | 08:07 | |
*** ncoghlan has quit IRC | 08:11 | |
*** afazekas_ has joined #openstack-keystone | 08:15 | |
*** fifieldt__ has quit IRC | 08:16 | |
*** fifieldt__ has joined #openstack-keystone | 08:18 | |
ildikov | hi All | 08:29 |
ildikov | is there anyone around for answering some quick questions? | 08:29 |
*** k4n0 has quit IRC | 08:42 | |
*** chandankumar has quit IRC | 08:48 | |
*** henrynash has joined #openstack-keystone | 08:50 | |
*** chandankumar has joined #openstack-keystone | 08:58 | |
*** k4n0 has joined #openstack-keystone | 08:59 | |
*** abhishekk has quit IRC | 09:06 | |
*** abhishekk has joined #openstack-keystone | 09:06 | |
mhu | marekd, I got ECP working \o/ thanks again for your help on Friday | 09:08 |
openstackgerrit | Marcos Fermín Lobo proposed a change to openstack/keystone: Group related methods for LDAP backend https://review.openstack.org/102244 | 09:08 |
*** oomichi has quit IRC | 09:09 | |
*** ajayaa has quit IRC | 09:16 | |
marekd | mhu: jababdabadu! | 09:18 |
marekd | mhu: what was the issue? | 09:18 |
*** ajayaa has joined #openstack-keystone | 09:28 | |
mhu | marekd, I assume it was my SP metadata. I regenerated them, uploaded them on the IdP, restarted the IdP and all went smoothly | 09:28 |
marekd | mhu | 09:28 |
marekd | great | 09:28 |
*** henrynash has quit IRC | 09:30 | |
*** afazekas has quit IRC | 09:38 | |
marekd | i wish you had some ADFS IdP installed :-) | 09:38 |
marekd | as I have adfs code | 09:39 |
marekd | mhu: one more thing: do you thing you and FLorent have some time to work on openstackclient? | 09:39 |
*** jaosorior has quit IRC | 09:42 | |
mhu | marekd, I am switching back on it now that this is done | 09:48 |
mhu | marekd, the code we have works correctly with the v2password auth plugin, but fails with the other plugins ... I need to see why | 09:49 |
mhu | before uploading a new patch | 09:50 |
marekd | mhu: you are talking about osc, right? | 09:50 |
mhu | marekd, yes | 09:50 |
mhu | sorry, no ADFS around here AFAIK | 09:50 |
marekd | mhu: that's great. I started worry that you ran out of time and you are not working on OSC | 09:51 |
mhu | marekd, sorry, it was just a slow period - summer holidays + florent getting paternity leave :) | 09:52 |
marekd | mhu: no a problem! | 09:55 |
*** bvandenh has joined #openstack-keystone | 09:55 | |
*** hrybacki has joined #openstack-keystone | 10:03 | |
*** hrybacki has quit IRC | 10:08 | |
*** ajayaa has quit IRC | 10:09 | |
*** ajayaa has joined #openstack-keystone | 10:25 | |
openstackgerrit | Marek Denis proposed a change to openstack/python-keystoneclient: SAML2 federated authentication for ADFS. https://review.openstack.org/111771 | 10:26 |
*** k4n0 has quit IRC | 10:27 | |
*** chandankumar has quit IRC | 10:28 | |
*** chandankumar has joined #openstack-keystone | 10:30 | |
*** krypto has joined #openstack-keystone | 10:42 | |
*** henrynash has joined #openstack-keystone | 10:50 | |
*** jaosorior has joined #openstack-keystone | 10:50 | |
*** k4n0 has joined #openstack-keystone | 10:59 | |
*** chandankumar has quit IRC | 11:01 | |
*** chandankumar has joined #openstack-keystone | 11:01 | |
*** afazekas_ is now known as afazekas | 11:29 | |
openstackgerrit | Alexey Miroshkin proposed a change to openstack/keystone: Support the hints mechanism in list_credentials() https://review.openstack.org/113091 | 11:36 |
*** bvandenh has quit IRC | 11:37 | |
openstackgerrit | Alexey Miroshkin proposed a change to openstack/keystone: Enable filtering of credentials by user ID https://review.openstack.org/113232 | 11:43 |
*** rodrigods has joined #openstack-keystone | 12:01 | |
openstackgerrit | Ajaya Agrawal proposed a change to openstack/keystone: Implemented caching in policy layer. https://review.openstack.org/113236 | 12:03 |
*** hrybacki has joined #openstack-keystone | 12:04 | |
openstackgerrit | Rodrigo Duarte proposed a change to openstack/keystone: Create, update and delete hierarchical projects https://review.openstack.org/111842 | 12:07 |
*** hrybacki has quit IRC | 12:08 | |
*** zigo has quit IRC | 12:17 | |
*** zigo has joined #openstack-keystone | 12:18 | |
*** henrynash has quit IRC | 12:21 | |
*** henrynash has joined #openstack-keystone | 12:21 | |
*** diegows has joined #openstack-keystone | 12:24 | |
*** henrynash has quit IRC | 12:25 | |
*** diegows has quit IRC | 12:45 | |
*** diegows has joined #openstack-keystone | 12:48 | |
*** raildo has joined #openstack-keystone | 12:50 | |
*** gordc has joined #openstack-keystone | 12:52 | |
*** diegows has quit IRC | 12:56 | |
openstackgerrit | Raildo Mascena de Sousa Filho proposed a change to openstack/keystone-specs: Hierarchical Multitenacy https://review.openstack.org/101017 | 12:59 |
*** diegows has joined #openstack-keystone | 13:00 | |
*** andreaf has joined #openstack-keystone | 13:01 | |
*** bvandenh has joined #openstack-keystone | 13:03 | |
*** nkinder_away has quit IRC | 13:05 | |
*** diegows has quit IRC | 13:09 | |
*** krypto has quit IRC | 13:12 | |
*** jaosorior has quit IRC | 13:12 | |
*** diegows has joined #openstack-keystone | 13:23 | |
openstackgerrit | Lance Bragstad proposed a change to openstack/keystone: Add i18n to exceptions in serializer.py https://review.openstack.org/113255 | 13:26 |
*** ayoung_ has joined #openstack-keystone | 13:31 | |
*** andreaf has quit IRC | 13:35 | |
*** andreaf has joined #openstack-keystone | 13:35 | |
*** andreaf has quit IRC | 13:35 | |
*** stevemar has joined #openstack-keystone | 13:37 | |
dstanek | these ldap live tests are killing me - i cannot get them to run at all the way through | 13:37 |
ayoung_ | dstanek, live or FakeLDAP? | 13:45 |
ayoung_ | dstanek, BTW, remote-pdb has been working for me. Thanks. | 13:45 |
dstanek | ayoung_: i'm trying to get the live ones to work | 13:46 |
ayoung_ | What happens? | 13:46 |
dstanek | i setup slapd to the point where there were no errors, but it basically blocks forever now | 13:47 |
dstanek | i have to do some debugging to see what is locking | 13:47 |
dstanek | i started the test and it just hung - went to breakfast for about an hour and it was sitting doing nothing | 13:48 |
*** henrynash has joined #openstack-keystone | 13:48 | |
ayoung_ | dstanek, which tests and what call, do you know? | 13:48 |
dstanek | ayoung_: trying to find that out now | 13:48 |
openstackgerrit | Alexey Miroshkin proposed a change to openstack/keystone: Enable filtering of credentials by user ID https://review.openstack.org/113232 | 13:51 |
*** ayoung_ is now known as ayoung_\ | 13:52 | |
*** gabriel-bezerra has joined #openstack-keystone | 13:55 | |
*** abhishekk has quit IRC | 13:57 | |
*** nkinder_away has joined #openstack-keystone | 13:57 | |
*** xianghui has quit IRC | 13:58 | |
*** xianghui has joined #openstack-keystone | 13:58 | |
*** ildikov has quit IRC | 14:00 | |
*** joesavak has joined #openstack-keystone | 14:01 | |
*** ayoung_\ is now known as ayoung | 14:03 | |
ayoung | In case anyone is wondering where XChat stores its FreeNode passwords it in /home/ayoung/.config/xchat2/servlist_.conf under N=FreeNode (formerly OpenProjects.net)...the B= value that follws i Pasword | 14:05 |
*** hrybacki has joined #openstack-keystone | 14:05 | |
rharwood | so *that's* why you have a home directory on my system ;) | 14:05 |
*** xianghui has quit IRC | 14:07 | |
*** hrybacki has quit IRC | 14:09 | |
*** hrybacki has joined #openstack-keystone | 14:14 | |
ayoung | rharwood, Almost certainly | 14:15 |
openstackgerrit | Alexey Miroshkin proposed a change to openstack/keystone: Enable filtering of credentials by user ID https://review.openstack.org/113232 | 14:17 |
*** jsavak has joined #openstack-keystone | 14:21 | |
*** joesavak has quit IRC | 14:24 | |
*** xianghui has joined #openstack-keystone | 14:25 | |
*** amirosh has quit IRC | 14:29 | |
ayoung | henrynash, I'm trying to test out the multi domain stuff. Here's what I have: | 14:29 |
ayoung | Basic devstack, Identity SQL driver | 14:29 |
henrynash | ayoung: ok | 14:29 |
ayoung | enabled the two config options: one to turn on multi-dom, one to put the files in /etc/keystone/domains | 14:30 |
*** xianghuihui has joined #openstack-keystone | 14:30 | |
henrynash | yep | 14:30 |
*** xianghui has quit IRC | 14:30 | |
ayoung | domain_config_dir=/etc/keystone/domains | 14:30 |
ayoung | domain_specific_drivers_enabled=true | 14:30 |
openstackgerrit | Ajaya Agrawal proposed a change to openstack/keystone: Implemented caching in trust layer. https://review.openstack.org/113277 | 14:30 |
henrynash | seems good | 14:30 |
ayoung | henrynash, I assume I need to "create" the domain still, right? | 14:30 |
dstanek | ayoung: i think it may be a slapd problem - is there a better ldap server or am i stuck with that? | 14:31 |
henrynash | yes | 14:31 |
ayoung | Otherwise it is not in the domains table. OK. I've done that | 14:31 |
ayoung | the domain name is freeipa | 14:31 |
ayoung | and I have | 14:31 |
ayoung | /etc/keystone/domains/freeipa.conf | 14:31 |
ayoung | with a basic LDAP config in it, and | 14:31 |
ayoung | [identity] | 14:32 |
ayoung | driver = keystone.identity.backends.ldap.Identity | 14:32 |
ayoung | http://paste.fedoraproject.org/124659/40776754 | 14:32 |
henrynash | needs to be called keystone.freeipa.conf | 14:32 |
ayoung | Ah...ok, let me rename | 14:32 |
*** k4n0 has quit IRC | 14:33 | |
henrynash | contents of file look fine | 14:33 |
ayoung | {"error": {"message": "An unexpected error prevented the server from fulfilling your request: No module named ldappool (Disable debug mode to suppress these details.)", "code": 500, "title": "Internal Server Error"}}-sh-4.2$ | 14:33 |
ayoung | Ok...let me get that in | 14:33 |
ayoung | BTW, I think we need to put that in requirements.txt | 14:34 |
henrynash | ahh, mayeb true | 14:34 |
openstackgerrit | Ajaya Agrawal proposed a change to openstack/keystone: Implemented caching in policy layer. https://review.openstack.org/113236 | 14:34 |
*** rwsu has joined #openstack-keystone | 14:34 | |
ayoung | henrynash, this is a good sign, though. I didn't see that problem before | 14:34 |
henrynash | indeed…it must be trying to do ldapy things | 14:34 |
henrynash | (technical term, that) | 14:35 |
*** hrybacki has quit IRC | 14:35 | |
ayoung | SCWEEET! | 14:35 |
ayoung | OK,. I was able to get a token for a user in the LDAP domain | 14:35 |
henrynash | yay! | 14:35 |
ayoung | henrynash, well done. | 14:36 |
henrynash | by jove, this stuff actually works, old bean | 14:36 |
*** ajayaa has quit IRC | 14:36 | |
ayoung | henrynash, yeah. At some point, I need to try it where the default Domain is in LDAP and the service users are in an alternate, but I think this is the base use case. | 14:37 |
henrynash | ayoung: ok, understand | 14:37 |
morganfainberg | dstanek, dirserv is better | 14:38 |
ayoung | OK, I'll need to play around with this some. Would you expect to see hashed usersids in the table, or the LDAP geenrated ones? | 14:38 |
morganfainberg | dstanek, 389 directory server | 14:38 |
henrynash | hashed | 14:38 |
henrynash | for those in the ldap domain, regualr UUIDs for the SQL users | 14:38 |
ayoung | henrynash, what is the table named? | 14:38 |
henrynash | idenity_mapping? hold on let me check | 14:39 |
ayoung | id_mapping | 14:39 |
ayoung | I see it | 14:39 |
dstanek | morganfainberg: that looks interesting, thx | 14:39 |
henrynash | that should only contain those users that we have created a mapping for | 14:39 |
ayoung | henrynash, what If I need those to be the LDAP Ids? Is there a switch to make that happen? | 14:40 |
dstanek | morganfainberg: slapd seemed to get into an infinite loop and i had to 'kill -9' it | 14:40 |
henrynash | ayoung: eeek! | 14:40 |
ayoung | I'm thinking for an existing deployment | 14:40 |
*** xianghuihui has quit IRC | 14:40 | |
ayoung | We had the "backwards compat Id" flag...is that just for the default domain? | 14:40 |
*** diegows has quit IRC | 14:41 | |
henrynash | ayoung: yes, it is just for teh defualt domain | 14:41 |
ayoung | backward_compatible_ids=false | 14:41 |
*** xianghuihui has joined #openstack-keystone | 14:41 | |
henrynash | you can create a domain specifc file called keystone.default.conf for that domain as well | 14:41 |
ayoung | henrynash, AH | 14:42 |
ayoung | yeah, I was just getting there... | 14:42 |
*** jorge_munoz has joined #openstack-keystone | 14:42 | |
ayoung | henrynash, in order to use that, we would need all auth_token middleware users to be set to the non default domain. Maybe we should do that in devstack: | 14:43 |
ayoung | create two domains by default, one for service users. | 14:43 |
*** jorge_munoz has quit IRC | 14:43 | |
ayoung | OK...this rocks. this is going to be the killer feature for Juno. | 14:43 |
henrynash | let’s hope so! | 14:46 |
*** henrynash has quit IRC | 14:46 | |
*** jsavak has quit IRC | 14:52 | |
*** david-lyle has joined #openstack-keystone | 14:54 | |
*** zigo has quit IRC | 14:58 | |
*** radez_g0n3 is now known as radez | 14:58 | |
*** diegows has joined #openstack-keystone | 14:59 | |
*** zigo has joined #openstack-keystone | 14:59 | |
*** bvandenh has quit IRC | 15:02 | |
*** joesavak has joined #openstack-keystone | 15:04 | |
*** amirosh has joined #openstack-keystone | 15:05 | |
*** hrybacki has joined #openstack-keystone | 15:05 | |
*** tomoiaga has quit IRC | 15:07 | |
*** hrybacki has quit IRC | 15:09 | |
*** richm has joined #openstack-keystone | 15:09 | |
*** marcoemorais has joined #openstack-keystone | 15:13 | |
*** marcoemorais has quit IRC | 15:13 | |
*** jasondotstar has joined #openstack-keystone | 15:14 | |
*** zzzeek has joined #openstack-keystone | 15:18 | |
*** nkinder_away is now known as nkinder | 15:19 | |
*** chandankumar has quit IRC | 15:26 | |
*** joesavak has quit IRC | 15:35 | |
*** afazekas has quit IRC | 15:45 | |
*** amerine has quit IRC | 15:49 | |
*** hrybacki has joined #openstack-keystone | 15:49 | |
*** jorge_munoz has joined #openstack-keystone | 15:49 | |
*** ajayaa has joined #openstack-keystone | 15:52 | |
ajayaa | morganfainberg, hi | 15:57 |
*** andreaf has joined #openstack-keystone | 15:59 | |
morganfainberg | ajayaa, hello | 16:00 |
ajayaa | morganfainberg, I could use some review from you. :) | 16:00 |
ajayaa | https://review.openstack.org/#/c/110575/ | 16:01 |
ajayaa | https://review.openstack.org/#/c/113277/ | 16:01 |
ajayaa | https://review.openstack.org/#/c/113236/ | 16:01 |
morganfainberg | ajayaa, fyi, policy layer caching is scary. i'll need to spend a bit of extra time on that one | 16:04 |
ajayaa | morganfainberg, okay. But why is that? | 16:04 |
morganfainberg | ajayaa, policy is a bit weird in it's implementation | 16:05 |
morganfainberg | ajayaa, it's just not as straight forward as the crud for other subsystems in keystone | 16:05 |
morganfainberg | oh | 16:06 |
morganfainberg | i did notice an issue | 16:06 |
morganfainberg | why are you not setting a default cache time? | 16:06 |
morganfainberg | we probably do not want to cache these vaules indefinitely | 16:06 |
*** gyee has joined #openstack-keystone | 16:07 | |
ajayaa | These are just for tests. So thought no need of default cache time. When user is using it, he will set it in etc/keystone.conf | 16:08 |
morganfainberg | if a user doesn't set the cache_time value, we will rely on the cache backend to LRU it | 16:08 |
morganfainberg | rather than have a fixed window cache | 16:08 |
morganfainberg | most of the time I tries to set a sane fixed window cache so we don't over-utilize memcache for example | 16:09 |
morganfainberg | most people do not change defaults (expecially not defaults like cache_ttl unless they have a good reason) | 16:10 |
ajayaa | Let's say a user does not set a cache_time in etc/keystone.conf, then there is no cache time out essentially, right? | 16:11 |
morganfainberg | correct | 16:11 |
morganfainberg | and we don't have a *default* cache TTL in the cache layer | 16:11 |
*** rushiagr has joined #openstack-keystone | 16:11 | |
morganfainberg | none = cache until you need to LRU the value | 16:11 |
morganfainberg | potentially *forever* | 16:11 |
ajayaa | The default behaviour should be forever until the user explicitly sets it in etc/keystone.conf, I guess. | 16:14 |
morganfainberg | ajayaa, i dont know if i agree with that statement. | 16:14 |
morganfainberg | ajayaa, it's too early for me to make that call :P (no coffee / just started looking at work) | 16:15 |
ajayaa | LRU would come into picture if we have fixed size of memory to store the key, values. I am not sure how that is linked to cache time. | 16:15 |
ajayaa | okay, I get it. Is there a default memory limit in memcache itself? | 16:16 |
dstanek | ajayaa: if anything i would say that the default should be to never cache or something really short - even if they have caching enabled | 16:16 |
ajayaa | morganfainberg, We don't want the cache to grow forever. That's why we would need to set either a time limit or memory limit. | 16:17 |
openstackgerrit | Raildo Mascena de Sousa Filho proposed a change to openstack/keystone-specs: Hierarchical Multitenacy https://review.openstack.org/101017 | 16:17 |
dstanek | ajayaa: it's OK if the cache grows forever; memcache, for example, will start evicting data when it needs to | 16:19 |
ajayaa | dstanek, that is also a possible option. | 16:19 |
dstanek | ajayaa: you want to be very careful when setting a default timeout because it's hard to clear individual values in memcache | 16:19 |
dstanek | or probably anything | 16:19 |
ajayaa | dstanek, If memcache makes sure that it does not grow forever, we don't need to set a timeout because whenever there is a delete or update we are invalidating that particular key explicitly. | 16:22 |
dstanek | ajayaa: i don't follow. what would ever delete the key? | 16:24 |
dstanek | ajayaa: memcache will evict when necessary, but that could be never if the cluster is sized big enough | 16:24 |
ajayaa | dstanek, okay. It seems to me that we are trying to compensate for memcache deficiency in our application code. | 16:29 |
ajayaa | dstanek, although I don't know the reason behind lazy deletion in memcache. | 16:30 |
dstanek | ajayaa: to my knowledge that how's most caching systems work - i have never heard of anything else | 16:30 |
dstanek | you just want to be careful that you don't cache too long by default | 16:31 |
*** openstack has joined #openstack-keystone | 16:32 | |
*** amcrn has joined #openstack-keystone | 16:42 | |
*** ildikov has joined #openstack-keystone | 16:48 | |
*** abhishekk has joined #openstack-keystone | 16:55 | |
morganfainberg | dstanek, ++ that is why we have the defaults set lower than forever on most places i implemented caching | 16:55 |
morganfainberg | dstanek, ajayaa, we do our best to invalidate the cache when / where appropriate, but if for some reason we miss, i would rather not be stuck with that "forever" (** until memcache evicts, etc) | 16:56 |
*** bearhands is now known as comstud | 17:07 | |
*** gokrokve has joined #openstack-keystone | 17:09 | |
abhishekk | dstanek:hi, you around? | 17:11 |
*** amerine has joined #openstack-keystone | 17:23 | |
*** amerine_ has joined #openstack-keystone | 17:24 | |
*** amirosh has quit IRC | 17:25 | |
*** amerine has quit IRC | 17:28 | |
*** amerine_ has quit IRC | 17:29 | |
*** amerine has joined #openstack-keystone | 17:34 | |
*** amerine has quit IRC | 17:38 | |
*** joesavak has joined #openstack-keystone | 17:45 | |
*** amcrn has quit IRC | 17:46 | |
*** mdorman has joined #openstack-keystone | 17:53 | |
*** amcrn has joined #openstack-keystone | 17:54 | |
dstanek | abhishekk: mostly, yes | 17:56 |
*** amcrn has quit IRC | 17:57 | |
abhishekk | dstanek:just for update, I have implemented your review comments | 17:57 |
dstanek | abhishekk: excellent, i'll take a look a little later today then | 18:00 |
abhishekk | dstanek:thank you for support | 18:01 |
*** amcrn has joined #openstack-keystone | 18:03 | |
*** amerine has joined #openstack-keystone | 18:08 | |
*** nkinder has quit IRC | 18:14 | |
*** wwriverrat1 has joined #openstack-keystone | 18:16 | |
mdorman | we’re running into an issue with the latest icehouse build of keystone. we use AD for the auth backend, and our AD records contain a couple binary fields. when keystone loads in the AD records, it tries to convert everything to utf8, which bombs on those binary fields. | 18:16 |
mdorman | is there a way we can configure an attributes filter for the ldap query, so we don’t pull down those binary fields? | 18:16 |
*** amerine has quit IRC | 18:19 | |
dstanek | mdorman: i don't know much about the LDAP backend so I may be way off here, but have you tried the attribute_ignore values in the config file | 18:20 |
wwriverrat1 | ya. I'm seeing binary issue in 2014.1.2 icehouse. Happens in the "self.user._id_to_dn(user_id)" in authenticate method that assumes all fields come back as strings | 18:20 |
mdorman | dstanek: we’ll look at attribute_ignore | 18:21 |
wwriverrat1 | will tinker with attribute_ignore. thx! | 18:21 |
dstanek | there is a setting for each of the models user_attribute_ignore, group_attributer_ignore, etc. | 18:21 |
dstanek | you can see the full list in the keystone sample conf | 18:21 |
wwriverrat1 | cool | 18:22 |
dstanek | mdorman, wwriverrat1: let me know if that actually works | 18:23 |
wwriverrat1 | will do. should know shortly | 18:23 |
*** mgarza has joined #openstack-keystone | 18:24 | |
*** amerine has joined #openstack-keystone | 18:25 | |
*** mgarza has quit IRC | 18:26 | |
*** nkinder has joined #openstack-keystone | 18:31 | |
*** hrybacki has quit IRC | 18:32 | |
*** joesavak has quit IRC | 18:32 | |
dstanek | ayoung: ldap live tests have a wierd error about an undefined attribute type | 18:34 |
*** vhoward has left #openstack-keystone | 18:35 | |
*** ajayaa has quit IRC | 18:39 | |
*** abhishekk has quit IRC | 18:40 | |
*** ayoung has quit IRC | 18:42 | |
*** diegows has quit IRC | 18:42 | |
*** rushiagr is now known as rushiagr_away | 18:44 | |
*** diegows has joined #openstack-keystone | 18:55 | |
openstackgerrit | Morgan Fainberg proposed a change to openstack/keystone: Clean whitespace off token. https://review.openstack.org/113108 | 19:06 |
*** amerine has quit IRC | 19:15 | |
*** zzzeek has quit IRC | 19:16 | |
openstackgerrit | Steve Martinelli proposed a change to openstack/keystone: Add a URL field to region table https://review.openstack.org/106935 | 19:21 |
*** diegows has quit IRC | 19:35 | |
*** nkinder has quit IRC | 19:37 | |
*** andreaf has quit IRC | 19:39 | |
morganfainberg | dstanek, ayoung, what would you think of implementing IMS support in keystone? useful case: revocation events, instead of 'last check XXXX' issue an 'If-modified-since' and if no new events occured since XXX a 304 is issued | 19:41 |
morganfainberg | dstanek, ayoung, similar thought for the endpoint policy spec (cc henry-nash) ^ | 19:41 |
morganfainberg | oh.. and ayoung and henry-nash are not on irc :P | 19:41 |
*** henrynash has joined #openstack-keystone | 19:42 | |
*** nkinder has joined #openstack-keystone | 19:44 | |
*** KimJ has joined #openstack-keystone | 19:47 | |
*** diegows has joined #openstack-keystone | 19:52 | |
*** vhoward has joined #openstack-keystone | 19:55 | |
dolphm | morganfainberg: any reason this wasn't +A'd? https://review.openstack.org/#/c/109162/ | 20:18 |
morganfainberg | dolphm, all of the token_api ones have had to be rebased a bunch | 20:19 |
morganfainberg | dolphm, the patch they depended on merged on friday | 20:19 |
dolphm | morganfainberg: so it's good to merge? | 20:19 |
morganfainberg | yeah | 20:19 |
dolphm | morganfainberg: +A'd then | 20:20 |
morganfainberg | dolphm, all of these actually should be: https://review.openstack.org/#/q/status:open+project:openstack/keystone+branch:master+topic:bp/non-persistent-tokens,n,z | 20:20 |
morganfainberg | next step in that is fixing authcontextmiddleware and the @protect dectorator to not do double duty and looking up / decoding tokens | 20:21 |
dolphm | morganfainberg: done and done | 20:21 |
morganfainberg | then we need to solve the federated user domain thing (we talked about it last meeting, no definitive answer) | 20:21 |
morganfainberg | and i think we can be done with token_api by the end of the week (pending federated user thing) | 20:21 |
dolphm | morganfainberg: i read through the logs, it seemed the definitive answer was to fix all the things? | 20:21 |
morganfainberg | dolphm, sortof | 20:22 |
morganfainberg | dolphm, we do document that tokens (identity-api) have user['domain'] section | 20:22 |
morganfainberg | honestly, whatever the direction we go, as long as it isn't brittle/prone to breakage, i'm good with it. | 20:23 |
*** ayoung has joined #openstack-keystone | 20:23 | |
dolphm | morganfainberg: doesn't the federation extension mention user domains are specifically not included? | 20:23 |
morganfainberg | dolphm, i don't think it did, it might now | 20:23 |
morganfainberg | dolphm, with stevemar's recent toking inclusion to the federated.md docs, we do explicitly show no user domain section | 20:24 |
morganfainberg | dolphm, https://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3-os-federation-ext.md#request-a-scoped-os-federation-token-post-authtokens | 20:25 |
morganfainberg | so fixing everything is reasonable i guess. | 20:25 |
morganfainberg | :) | 20:25 |
ayoung | dstanek, sorry, I was late for a Kid pickup. Are you still stuck> | 20:26 |
*** nonameentername has quit IRC | 20:27 | |
*** nonameentername has joined #openstack-keystone | 20:30 | |
ayoung | dolphm, morganfainberg I just did a sanity check on henrynash 's multi-domain work. Work great: http://adam.younglogic.com/2014/08/getting-service-users-out-of-ldap/ | 20:31 |
ayoung | It lead to some interesting conclusions: users for throw-away jobs are now cheap | 20:31 |
ayoung | so, take the hadoop case, if you have something running for 3 days, create a user for it, and use trusts to add roles to it | 20:32 |
dolphm | ayoung: cool, good to hear! | 20:32 |
ayoung | hadoop is interesting in that it pretty much needs swift or something like it | 20:32 |
ayoung | read the data , write the results | 20:32 |
*** amcrn has quit IRC | 20:33 | |
ayoung | so RBAC could come in to play there, where the haddoop-job-user gets two tokens, one to read from one swift object store (Genome data say) | 20:33 |
ayoung | and one to write partial and final results | 20:33 |
*** amcrn has joined #openstack-keystone | 20:33 | |
morganfainberg | ayoung, quickly, i'm near to +2 on https://review.openstack.org/#/c/99842/ but just had a couple quick questions (would have just fixed the nit about the link if i didn't have the questions). | 20:33 |
morganfainberg | ayoung, thats the endpoint policy spec | 20:34 |
ayoung | yeo | 20:34 |
morganfainberg | ah, henry answered them | 20:34 |
morganfainberg | nvm | 20:34 |
morganfainberg | :P | 20:34 |
morganfainberg | ayoung, yeah other than the two questions henry answered i'm good witht that spec | 20:34 |
ayoung | morganfainberg, so when to fetch policy is a whole-nother set of questions | 20:35 |
ayoung | certainly at startup, possible at points after that | 20:35 |
morganfainberg | yes, and if we're doing "on startup" as the baseline for this spec, i'm good with that | 20:35 |
morganfainberg | just wanted to have it clear what we were aiming for | 20:36 |
ayoung | thing is, that is outside the scope of this spec | 20:36 |
ayoung | it would be a spec on keystonemiddleware | 20:36 |
*** joesavak has joined #openstack-keystone | 20:36 | |
ayoung | assuming that will hold the policy enforcement code | 20:36 |
morganfainberg | except you've already mixed in "update middleware to fetch policy" in this spec | 20:36 |
morganfainberg | as a work item | 20:36 |
ayoung | we are not doing any notifications | 20:36 |
ayoung | ah...that is true | 20:36 |
ayoung | well, a complete solution would be: | 20:36 |
ayoung | 1/ fetch at startup | 20:36 |
ayoung | 2. register for notifications and fetch if notified | 20:37 |
ayoung | for changes | 20:37 |
morganfainberg | ayoung, so since it's a work item, might as well say "fetch on startup with plans to expand for re-fetch on notification ... and/or poll" | 20:37 |
ayoung | yep | 20:37 |
morganfainberg | then we have a clear target. or we split the spec into two bits, one targeting middleware and one targeting keystone | 20:37 |
ayoung | ++ | 20:38 |
ayoung | I like | 20:38 |
dolphm | /poll how many people use the Star feature in gerrit, and if you do: what reviews do you choose to star? if you don't, why don't you use it? | 20:38 |
*** radez is now known as radez_g0n3 | 20:38 | |
*** jsavak has joined #openstack-keystone | 20:38 | |
ayoung | dolphm, I use it for ones that I need to go back to | 20:38 |
dolphm | ayoung: as a reviewer, or an author? | 20:38 |
morganfainberg | dolphm, i use the star feature around freeze and use it to watch the -2'd because of freeze reviews | 20:38 |
ayoung | like, I got 1/2 through, and want to remind myself to complete it | 20:38 |
ayoung | I don;t star my own | 20:38 |
ayoung | my own list is short enough I can view it and mentally prioritize | 20:39 |
morganfainberg | dolphm, i also use it if there is something i know i want to check again in say... a week or two. - never star my own reviews | 20:39 |
ayoung | more for a short list of ones for me to go back to and review | 20:39 |
dolphm | ayoung: do you keep it starred until it merges, or keep it stared until you finish your review pass? | 20:39 |
ayoung | dolphm until it merges, cuz it means it is a priotiy review, and I assume it will get additional review before merge | 20:40 |
ayoung | I usually only clean up ones I've starred. Starred reviews is a fairly short list | 20:40 |
dolphm | cool - i've been thinking about how to expose starred reviews as a social feature | 20:40 |
nonameentername | irssi | 20:41 |
ayoung | I have 5 starred right now, probably should have more | 20:41 |
ayoung | like, Jose's two Kerberos revews should be starred, but I really don';t need to, because I check them often anyway | 20:41 |
*** joesavak has quit IRC | 20:42 | |
wwriverrat1 | dstanek, you requested mdorman and I report back on what we found regarding "user_attribute_ignore" to skip ldap binary data items for id_to_dn call. When we added the ignore config property, our code actually failed earlier when get_all is called. We're going to roll back to 2014.1.1 until we can put together something adequate to report | 20:43 |
ayoung | wwriverrat1, is this the whole "build the DN " thing? | 20:44 |
wwriverrat1 | yep | 20:44 |
ayoung | wwriverrat1, are you doing subgroup? | 20:44 |
wwriverrat1 | sorry. coworker distraction. subgroup? | 20:46 |
ayoung | wwriverrat1, there are two ways to fetch users. subgroup queries actually quere the Id attribute, not building the domain name | 20:47 |
*** PsionTheory has joined #openstack-keystone | 20:47 | |
ayoung | wwriverrat1, https://github.com/openstack/keystone/blob/master/keystone/common/config.py#L483 | 20:47 |
ayoung | subtree | 20:48 |
openstackgerrit | Raildo Mascena de Sousa Filho proposed a change to openstack/keystone-specs: Hierarchical Multitenacy https://review.openstack.org/101017 | 20:48 |
wwriverrat1 | when I'm in pdb, the id_to_dn is being called with only a 'dn'. It then fetches that id given his creds to authenticate. When it gets the entries (ours is Active Directory) it gets them all without filtering the binary fields. Those are the ones blowing chunks. | 20:51 |
wwriverrat1 | scope needs to search whole subtree | 20:52 |
wwriverrat1 | blow up here: https://github.com/openstack/keystone/blob/stable/icehouse/keystone/common/ldap/core.py#L464 | 20:55 |
*** amerine has joined #openstack-keystone | 21:07 | |
ayoung | wwriverrat1, which fields? | 21:10 |
ayoung | wwriverrat1, I assume you are not using a custom schema here | 21:11 |
wwriverrat1 | haha... in our enterprise AD installation, they have as few as 5 and as many as 10 binary fields. aka: thumbnail | 21:11 |
wwriverrat1 | We are using keystone for authentication, keystone for authorization | 21:12 |
stevemar | the gate is getting pwned right now | 21:12 |
wwriverrat1 | oops | 21:12 |
wwriverrat1 | AD for authentication, keystone for authorization | 21:12 |
ayoung | wwriverrat1, that quere should only be returning the DN. Those are attributes on the user objects, I assume, and should not be returned | 21:13 |
wwriverrat1 | yes and yes I agree | 21:14 |
ayoung | let me see what the code *actually* does | 21:14 |
ayoung | dn, attrs = search_result[0] | 21:14 |
ayoung | yep...that indicates something is wrong | 21:14 |
ayoung | probably instead of fetching all attributes and then filtering out the ones we don't want it should be an explicit list of attributes we do want | 21:15 |
wwriverrat1 | +1 | 21:15 |
wwriverrat1 | a white list | 21:15 |
ayoung | in this case it should be oly DN | 21:16 |
ayoung | catching the attributes is an attempt to avoid fetching the object more than once, though | 21:16 |
ayoung | wwriverrat1, can you edit the code on that server where is blowing up? | 21:17 |
wwriverrat1 | sure | 21:17 |
ayoung | A good test would be to add in a set of fields...let me see if I can craft a line for you | 21:17 |
*** andreaf has joined #openstack-keystone | 21:18 | |
*** andreaf has quit IRC | 21:19 | |
*** hrybacki has joined #openstack-keystone | 21:19 | |
*** andreaf has joined #openstack-keystone | 21:19 | |
wwriverrat1 | This same user seems to be queried twice: 1) when the keystone user verifies they exist (this one sends in only the return_attrs it wants), then 2) When the user actually authenticates with their creds. The second doesnt seem to have the return_attrs set and therefore fails to work. | 21:19 |
*** andreaf has quit IRC | 21:19 | |
ayoung | OK, I'm guessing that call is a wrapper to http://www.python-ldap.org/doc/html/ldap.html#ldap.LDAPObject.search | 21:20 |
*** jsavak has quit IRC | 21:20 | |
*** KimJ has quit IRC | 21:20 | |
*** andreaf has joined #openstack-keystone | 21:20 | |
ayoung | wwriverrat1, not sure if it will work, but try attrlist=None or attrlist=[] as an additional param | 21:20 |
wwriverrat1 | k | 21:21 |
ayoung | If I remember correctly, it does not treat the DN as one of the attributes, and is returned separately | 21:21 |
ayoung | None looks like the default, which makes me suspect we overwrite it somewhere, though | 21:21 |
ayoung | yeah, that calls | 21:22 |
ayoung | def search_s(self, base, scope, | 21:22 |
ayoung | filterstr='(objectClass=*)', attrlist=None, attrsonly=0): | 21:22 |
ayoung | https://github.com/openstack/keystone/blob/stable/icehouse/keystone/common/ldap/core.py#L794 | 21:23 |
ayoung | wwriverrat1, it should not be returning attributes with that query | 21:24 |
wwriverrat1 | k. will check it out | 21:24 |
*** hrybacki has quit IRC | 21:24 | |
*** hrybacki has joined #openstack-keystone | 21:25 | |
*** amcrn has quit IRC | 21:26 | |
openstackgerrit | A change was merged to openstack/keystone: Expose token revocation list via token_provider_api https://review.openstack.org/109170 | 21:26 |
*** amcrn has joined #openstack-keystone | 21:27 | |
*** amerine has quit IRC | 21:27 | |
openstackgerrit | A change was merged to openstack/keystone: Remove ec2 contrib dependency on token_api https://review.openstack.org/109173 | 21:28 |
*** amerine has joined #openstack-keystone | 21:28 | |
wwriverrat1 | ayoung. so should I be passing a [] into at the end of this line? (instructing it to return no attrs?) https://github.com/openstack/keystone/blob/stable/icehouse/keystone/common/ldap/core.py#L470 | 21:29 |
ayoung | wwriverrat1, pass it as a named parameter so there is no confusion | 21:29 |
ayoung | attrs=[] | 21:29 |
wwriverrat1 | gotya | 21:29 |
ayoung | attrlist | 21:29 |
ayoung | wwriverrat1, this is what you are calling https://github.com/openstack/keystone/blob/stable/icehouse/keystone/common/ldap/core.py#L794 | 21:30 |
ayoung | so we are trying to force it to not fetch any attributes | 21:30 |
*** gokrokve has quit IRC | 21:31 | |
*** gokrokve has joined #openstack-keystone | 21:31 | |
*** andreaf has quit IRC | 21:32 | |
*** PsionTheory has quit IRC | 21:32 | |
openstackgerrit | Steve Martinelli proposed a change to openstack/keystone: remove unused import https://review.openstack.org/113378 | 21:40 |
*** henrynash has quit IRC | 21:46 | |
*** andreaf has joined #openstack-keystone | 21:46 | |
*** andreaf has quit IRC | 21:46 | |
*** andreaf has joined #openstack-keystone | 21:47 | |
*** gokrokve has quit IRC | 21:50 | |
*** gokrokve has joined #openstack-keystone | 21:50 | |
wwriverrat1 | ayoung, when I added this, got the binary error (attrlist=[]). When I added this, all went well (attrlist=['cn']). Seems an empty array somewhere means to return all attr from ldap. | 21:52 |
ayoung | Joy | 21:53 |
ayoung | wwriverrat1 so that value should probably be a throw away that we know exists. CN is as good as any, I think | 21:53 |
ayoung | or id attribute really | 21:54 |
wwriverrat1 | ya. either | 21:54 |
*** gokrokve has quit IRC | 21:54 | |
wwriverrat1 | something we know for sure is NOT binary ;-) | 21:54 |
ayoung | wwriverrat1, its more delicate than that. This is common code, not specific to user or anything | 21:55 |
ayoung | the only attribute we can trust is the one we are searching on | 21:55 |
ayoung | wwriverrat1 so [ id_attr ] is correct. Can you try that? | 21:56 |
wwriverrat1 | sure | 21:57 |
*** hrybacki has quit IRC | 21:57 | |
wwriverrat1 | yep, this works: After "'objclass': self.object_class}", I added ",attrlist=[self.id_attr]" in _id_to_dn method of core.py | 22:01 |
ayoung | ++ | 22:01 |
ayoung | wwriverrat1, submit a bug report and that change, please | 22:01 |
wwriverrat1 | sure. Thanks for your help! | 22:01 |
ayoung | No problem. | 22:01 |
*** Dafna has quit IRC | 22:02 | |
*** nkinder has quit IRC | 22:06 | |
*** ayoung has quit IRC | 22:14 | |
*** gokrokve has joined #openstack-keystone | 22:17 | |
*** gokrokve has quit IRC | 22:19 | |
*** gokrokve has joined #openstack-keystone | 22:19 | |
*** gokrokve has quit IRC | 22:19 | |
*** gokrokve has joined #openstack-keystone | 22:19 | |
*** hrybacki has joined #openstack-keystone | 22:31 | |
*** gordc has quit IRC | 22:31 | |
*** KimJ has joined #openstack-keystone | 22:32 | |
*** andreaf has quit IRC | 22:35 | |
morganfainberg | hmm. | 22:36 |
morganfainberg | dolphm, dstanek, ping - re authcontextmiddleware | 22:37 |
dolphm | morganfainberg: whats up | 22:53 |
*** bknudson has joined #openstack-keystone | 22:54 | |
morganfainberg | dolphm, so i talked with ayoung about where we decode the auth token | 22:56 |
morganfainberg | dolphm, *in* keystone | 22:56 |
dolphm | yep | 22:56 |
morganfainberg | dolphm, we generally decided that it made sense to put that in authcontext middleware, but I'm waffling on that because then authcontext becomes *required* and required in paste is semi-icky | 22:56 |
morganfainberg | dolphm, paste pipeline feels like it should be... configurable, but removing that middleware would break all @protect stuff for v3 | 22:57 |
dolphm | morganfainberg: it's critical to our architecture, just like it's basically critical to have auth_token in front of every other service | 22:57 |
morganfainberg | dolphm, ok so we're good with "this is a mandatory middleware"? | 22:58 |
morganfainberg | dolphm, it | 22:58 |
morganfainberg | 's just a sanity check :) | 22:58 |
morganfainberg | before i start hacking away at it | 22:58 |
morganfainberg | dolphm, i also aim to get it so we don't decode the token twice on all requests going to v3 with this change. | 22:59 |
dstanek | morganfainberg: optional middleware seems full of problems | 23:02 |
morganfainberg | dstanek, the alternative is to make it not middleware | 23:02 |
morganfainberg | dstanek, it was either make the wsgi code always decode the token or the middelware, but not the middleware, the @protect decorator, and somecases the wsgi code (cleanup) | 23:03 |
*** amerine has quit IRC | 23:07 | |
*** jorge_munoz has quit IRC | 23:15 | |
*** andreaf has joined #openstack-keystone | 23:25 | |
dstanek | morganfainberg: what's the driver to move it from where it is now to middleware | 23:32 |
morganfainberg | dstanek, it's done in both places | 23:32 |
morganfainberg | dstanek, so either we do it in middleware *or* wsgi *or* protect decorator, not a mix of one, two, or all three | 23:33 |
morganfainberg | dstanek, right now we do the same work twice on all v3 api calls. | 23:33 |
morganfainberg | dstanek, at least twice | 23:33 |
dstanek | hmm...now you have me interested | 23:36 |
*** david-lyle has quit IRC | 23:36 | |
*** david-lyle has joined #openstack-keystone | 23:37 | |
morganfainberg | dstanek, authcontext middleware catches the token and does token_api.get_token, and a token_provider.validate | 23:38 |
morganfainberg | then builds the context | 23:39 |
morganfainberg | then the @protect decorator does the same thing :P | 23:39 |
morganfainberg | and i think the wsgi code does it too in some cases | 23:39 |
morganfainberg | :P | 23:39 |
*** nkinder has joined #openstack-keystone | 23:39 | |
*** david-lyle has quit IRC | 23:42 | |
*** mdorman has quit IRC | 23:44 | |
*** jamielennox|away is now known as jamielennox | 23:54 |
Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!