[Yahoo-eng-team] [Bug 1396083] [NEW] Improve List Role Assignments Tests

2014-11-25 Thread Samuel de Medeiros Queiroz
Public bug reported: When listing role assignments, it is possible to filter results by group, role, domain, project, user and inheritance. In addition, it is possible to query for effective role assignments, which expands inherited roles and group membership. Currently we have few tests [1][2]

[Yahoo-eng-team] [Bug 1402339] [NEW] Status code from HEAD requests must be consistent

2014-12-13 Thread Samuel de Medeiros Queiroz
tone/tests/test_v3_assignment.py#L881 [5] https://github.com/openstack/keystone/blob/master/keystone/tests/test_v3.py#L479 ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New ** Changed in: keystone Assignee: (unassigned) => Samuel de Med

[Yahoo-eng-team] [Bug 1403539] [NEW] Can't create both inherited and direct role assignment on same entities

2014-12-17 Thread Samuel de Medeiros Queiroz
Public bug reported: This bug applies to backend SQL, since it is the only that supports inherited role assignments. Given a role assignment (actor_id, target_id, role_id, inherited), it should be possible to grant it as both direct and inherited: - (actor_id, target_id, role_id, inherited=False

[Yahoo-eng-team] [Bug 1406627] [NEW] Inheritance info must be stored inside scope on test_v3_assignment

2014-12-30 Thread Samuel de Medeiros Queiroz
inside the 'scope' key. This reflects on tests, making an assert to never occur [1]. [1] https://github.com/openstack/keystone/blob/master/keystone/tests/test_v3.py#L1070-L1072 ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z)

[Yahoo-eng-team] [Bug 1406640] [NEW] Refactor role assignment assertions and creation of expected entities

2014-12-30 Thread Samuel de Medeiros Queiroz
ent [2]. [1] https://github.com/openstack/keystone/blob/master/keystone/tests/test_v3.py#L1034-L1074 [2] https://github.com/openstack/keystone/blob/master/keystone/tests/test_v3_assignment.py#L26-L71 ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel

[Yahoo-eng-team] [Bug 1406667] [NEW] Return 400 for invalid filter combinations on /role_assignments API

2014-12-30 Thread Samuel de Medeiros Queiroz
inherited) - (effective, group) - (effecitve, domain) We need to raise an exception, returning 400 status code when those parameters are provided. ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New ** Changed in: keystone

[Yahoo-eng-team] [Bug 1406938] [NEW] Check of targets and actors on Assignment Controller should be generic and report a better message

2015-01-01 Thread Samuel de Medeiros Queiroz
Public bug reported: The XOR checking of targets and actors on RoleV3 controller [1] should be generic and placed at V3Controller, so that it could be used on other controllers, such as RoleAssignmentV3 on list_role_assignments method, which needs to report 400 for invalid filters combination [2]

[Yahoo-eng-team] [Bug 1409201] [NEW] Typos in configuration.rst

2015-01-09 Thread Samuel de Medeiros Queiroz
Public bug reported: doc/source/configuration.rst contains some typos that need to be fixed: - "Keystone" is spelled as "keystone"; - Other general typos, such as: - "regeneratable" should be "regenerable"; - "If the plugin require addition configurations" should be "If the plugin requires a

[Yahoo-eng-team] [Bug 1409203] [NEW] Formatting in configuration.rst

2015-01-09 Thread Samuel de Medeiros Queiroz
Public bug reported: doc/source/configuration.rst has: i) double spaces in some sentences; ii) lines with a length > 79 characters. Fixing these would keep the documentation code more organized. ** Affects: keystone Importance: Undecided Status: New -- You received this bug noti

[Yahoo-eng-team] [Bug 1409205] [NEW] Role inheritance section in configuration.rst is outdated

2015-01-09 Thread Samuel de Medeiros Queiroz
Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: In Progress -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1409205 Title: Role inheritance section in configurat

[Yahoo-eng-team] [Bug 1409211] [NEW] Unnecessary checks when cleaning up a domain

2015-01-09 Thread Samuel de Medeiros Queiroz
Public bug reported: When an internal notification for cleaning up a domain is sent, the callback method get all users and groups of that domain (using filtering), in order to delete them. After this, when iterating over the domain's users and groups, it re- verifies their domain_id, which is unn

[Yahoo-eng-team] [Bug 1410415] [NEW] Role inheritance API is inconsistent with implementation

2015-01-13 Thread Samuel de Medeiros Queiroz
6 ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: In Progress ** Changed in: keystone Assignee: (unassigned) => Samuel de Medeiros Queiroz (samuel-z) -- You received this bug notification because you are a member of Yah

[Yahoo-eng-team] [Bug 1415190] [NEW] list_user_projects method at assignment manager needs to be removed

2015-01-27 Thread Samuel de Medeiros Queiroz
Public bug reported: The method list_user_projects at assignment manager [1] is not called anywhere. In addition, it makes a call to list_user_projects on assignment drivers, which does not exist at all. The equivalent call in the controller layer calls the list_projects_for_user method instead.

[Yahoo-eng-team] [Bug 1415189] [NEW] list_user_projects method at assignment manager needs to be removed

2015-01-27 Thread Samuel de Medeiros Queiroz
Public bug reported: The method list_user_projects at assignment manager [1] is not called anywhere. In addition, it makes a call to list_user_projects on assignment drivers, which does not exist at all. [1] https://github.com/openstack/keystone/blob/master/keystone/assignment/core.py#L679-L68

[Yahoo-eng-team] [Bug 1415189] Re: list_user_projects method at assignment manager needs to be removed

2015-01-28 Thread Samuel de Medeiros Queiroz
I have no idea how this bug was reported twice. Please see [1]. I am already fixing this, sorry. Thanks [1] https://bugs.launchpad.net/keystone/+bug/1415190 ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineerin

[Yahoo-eng-team] [Bug 1359231] Re: List role assignments filters performance

2015-01-28 Thread Samuel de Medeiros Queiroz
Invalidated in favor of the created blueprint to fix this [1]. [1] https://blueprints.launchpad.net/keystone/+spec/list-role- assignments-performance ** Changed in: keystone Status: In Progress => Invalid -- You received this bug notification because you are a member of Yahoo! Engineerin

[Yahoo-eng-team] [Bug 1424500] [NEW] /OS-FEDERATION/projects does not honor project inherited role assignments

2015-02-22 Thread Samuel de Medeiros Queiroz
Public bug reported: '/OS-FEDERATION/projects' and '/auth/projects' API endpoints do not honor project inherited group role assignments. ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samueldmq) Status: New ** Summary ch

[Yahoo-eng-team] [Bug 1425895] [NEW] Tests on DomainSpecificLDAPandSQLIdentity cannot create and use new domains

2015-02-26 Thread Samuel de Medeiros Queiroz
Public bug reported: Tests in this class (or in subclasses) can create domains, but cannot use them for any identity operation, such as list_users. When domain-specific backends functionality is used, the created domains (that do not have an explicit configuration) are mapped in the default drive

[Yahoo-eng-team] [Bug 1359231] [NEW] List role assignments filters performance

2014-08-20 Thread Samuel de Medeiros Queiroz
Public bug reported: When listing role assignments, we have the option to filter them by actor, target and role. As Henry Nash pointed out at [1] , the current implementation uses the standard filtering the V3.wrap_collection. Given the large number of individual assignments, this is pretty ine

[Yahoo-eng-team] [Bug 1360406] [NEW] Wrong return from list role assignments on KVS

2014-08-22 Thread Samuel de Medeiros Queiroz
Public bug reported: List role assignments calls should return 'inherited_to_projects': 'projects' for an inherited assignment, as done by the SQL backend [1]. The KVS backend just ignore this information from the retrieved assignments. [1] https://github.com/openstack/keystone/blob/master/keys

[Yahoo-eng-team] [Bug 1364618] [NEW] KvsInheritanceTests does not use backend KVS

2014-09-02 Thread Samuel de Medeiros Queiroz
[2] https://github.com/openstack/keystone/blame/master/keystone/tests/test_backend_kvs.py#L247-L251 ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New ** Changed in: keystone Assignee: (unassigned) => Samuel de Medei

[Yahoo-eng-team] [Bug 1365147] [NEW] No test for tokens using inherited domain role

2014-09-03 Thread Samuel de Medeiros Queiroz
tance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New ** Changed in: keystone Assignee: (unassigned) => Samuel de Medeiros Queiroz (samuel-z) -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to

[Yahoo-eng-team] [Bug 1281771] [NEW] Keystone policy doesn't retrieve domain_id on project scoped token

2014-02-18 Thread Samuel de Medeiros Queiroz
Public bug reported: Giving the possibility to retrieve the project's domain_id from a project scoped token gives cloud service providers more flexibility when configuring their Keystone policy file. For instance, if a cloud service provider wants to allow a project member to see the description

[Yahoo-eng-team] [Bug 1476347] [NEW] LDAP Resource backend should be deprecated

2015-07-20 Thread Samuel de Medeiros Queiroz
Assignee: Samuel de Medeiros Queiroz (samueldmq) Status: In Progress -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1476347 Title: LDAP Resource backend should be deprecated

[Yahoo-eng-team] [Bug 1483375] [NEW] Bad query.one() usage in endpoint-policy extension

2015-08-10 Thread Samuel de Medeiros Queiroz
Public bug reported: In the file keystone/endpoint_policy/backends/sql.py, the return of get_policy_association(..) is a dict in the form {'policy_id': policy_id}. However, policy_id was the return of the call: session.query(PolicyAssociation.policy_id).one(), having the following format:

[Yahoo-eng-team] [Bug 1432892] [NEW] Wrong exception when validating trust scoped tokens with disabled trustor

2015-03-16 Thread Samuel de Medeiros Queiroz
Public bug reported: When validating a trust scoped token with disabled trustor, an exception of type Forbidden with message 'Trustor is disabled.' is raised. However, the exception used when the user (owning the role assignment for the provided token) is disabled is Unauthorized. This should be

[Yahoo-eng-team] [Bug 1434916] [NEW] GET /v3/projects/project_id with parents_as_list or subtree_as_list option is leaking extra data

2015-03-21 Thread Samuel de Medeiros Queiroz
are always returning the whole project info (id, name, domain_id, description, enabled) from all parents/subprojects. [1] https://github.com/openstack/keystone-specs/blob/master/specs/kilo /project-hierarchy-retrieval.rst ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeir

[Yahoo-eng-team] [Bug 1458945] [NEW] Use graduated oslo.policy instead of oslo-incubator code

2015-05-26 Thread Samuel de Medeiros Queiroz
: Undecided Status: New ** Affects: swift Importance: Undecided Status: New ** Changed in: nova Assignee: (unassigned) => Samuel de Medeiros Queiroz (samueldmq) ** Also affects: nova Importance: Undecided Status: New ** Also affects: cinder Importance: Undeci

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-05-26 Thread Samuel de Medeiros Queiroz
** Also affects: swift Importance: Undecided Status: New ** Also affects: ceilometer Importance: Undecided Status: New ** Also affects: trove Importance: Undecided Status: New ** Also affects: ironic Importance: Undecided Status: New -- You received this

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-05-26 Thread Samuel de Medeiros Queiroz
** Also affects: sahara Importance: Undecided Status: New ** Also affects: barbican Importance: Undecided Status: New ** Also affects: designate Importance: Undecided Status: New ** Also affects: magnum Importance: Undecided Status: New ** Also affects: m

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-05-28 Thread Samuel de Medeiros Queiroz
The change on Glance side is already merged. "Use graduated oslo.policy" https://review.openstack.org/#/c/162368/ ** Changed in: glance Status: New => Fix Released ** Also affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-05-28 Thread Samuel de Medeiros Queiroz
Thanks Lin, the change is now merged. "Use graduated version of oslo.policy" https://review.openstack.org/#/c/164420/ ** Changed in: horizon Status: In Progress => Fix Released ** Also affects: glance Importance: Undecided Status: New -- You received this bug notification beca

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-05-28 Thread Samuel de Medeiros Queiroz
Fix released on Keystone side. "Use oslo.policy instead of incubated version" https://review.openstack.org/#/c/148624/ ** Changed in: keystone Status: New => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Ope

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-06-02 Thread Samuel de Medeiros Queiroz
I am re-adding the projects which were marked as 'no longer affects' and then invalidating them, so that we can keep track of the status of this change for the whole OpenStack ecosystem. People who marked as 'no longer affects' and respective projects are: Samuel Merritt (torgomatic) on swift Rub

[Yahoo-eng-team] [Bug 1458945] Re: Use graduated oslo.policy instead of oslo-incubator code

2015-06-02 Thread Samuel de Medeiros Queiroz
Manila change 'Use oslo_policy lib instead of oslo-incubator code' https://github.com/openstack/manila/commit/a4a60b1328443f6a1d5a85884f029e3fa683c142 ** Also affects: swift Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engi

[Yahoo-eng-team] [Bug 1321774] [NEW] Wrong error when creating different instances with the same hostname into the same DNS domain

2014-05-21 Thread Samuel de Medeiros Queiroz
ng thrown, but it is not shown to the caller interface, such as Horizon. ** Affects: nova Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New ** Changed in: nova Assignee: (unassigned) => Samuel de Medeiros Queiroz (samuel-z) -- You recei

[Yahoo-eng-team] [Bug 1522577] [NEW] Endpoint create returns 200 instead of 201

2015-12-03 Thread Samuel de Medeiros Queiroz
Public bug reported: Both /v2.0 and /v3 APIs return 200 OK on endpoint creation. The HTTP status code should be 201 Created. ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samueldmq) Status: In Progress ** Changed in: keystone Assignee

[Yahoo-eng-team] [Bug 1367480] [NEW] Add test for grant CRUD on test_backend

2014-09-09 Thread Samuel de Medeiros Queiroz
: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New ** Changed in: keystone Assignee: (unassigned) => Samuel de Medeiros Queiroz (samuel-z) ** Description changed: The fact of not having tests for this may cause some bugs. -

[Yahoo-eng-team] [Bug 1367740] [NEW] Assignment backends raise non-suggestive exception in grant CRUD

2014-09-10 Thread Samuel de Medeiros Queiroz
Public bug reported: When getting or deleting a grant, if something goes wrong, a RoleNotFound exception is thrown. [1]-[6] In cases where the role exists and the combination of other arguments is invalid, this is a non-suggestive exception because it tells us "Could not find role: %(role_id)s".

[Yahoo-eng-team] [Bug 1367778] [NEW] Extract Assignment related tests from IdentityTestCase

2014-09-10 Thread Samuel de Medeiros Queiroz
in AssignmentTestCase (test_v3_assignment, to be created). ** Affects: keystone Importance: Low Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: Triaged ** Tags: test-improvement ** Changed in: keystone Assignee: (unassigned) => Samuel de Medeiros Queiroz (samue

[Yahoo-eng-team] [Bug 1373113] [NEW] Wrong exception when deleting a domain group assignment using a not domain-aware backend

2014-09-23 Thread Samuel de Medeiros Queiroz
//github.com/openstack/keystone/blob/master/keystone/identity/core.py#L813-L816 [3] https://github.com/openstack/keystone/blob/master/keystone/identity/core.py#L526 ** Affects: keystone Importance: Undecided Assignee: Samuel de Medeiros Queiroz (samuel-z) Status: New -- You received this

[Yahoo-eng-team] [Bug 1483375] Re: Fix get_policy_association return in endpoint-policy SQL driver

2016-01-06 Thread Samuel de Medeiros Queiroz
Yes, it is working. My point was just the consistency between the driver GET and LIST methods, as in this bug's decription. I am okay with leaving this as it is. ** Changed in: keystone Status: In Progress => Invalid -- You received this bug notification because you are a member of Yahoo

[Yahoo-eng-team] [Bug 1472099] Re: when delete a domain, the role assignment of user (this user in the other domain) in this domain isn't deleted.

2016-01-29 Thread Samuel de Medeiros Queiroz
*** This bug is a duplicate of bug 1277847 *** https://bugs.launchpad.net/bugs/1277847 ** This bug is no longer a duplicate of bug 1360391 Domain data remains in DB after domain is deleted ** This bug has been marked a duplicate of bug 1277847 Deleting a domain should remove assignments

[Yahoo-eng-team] [Bug 1439934] Re: Delete a domain with v3 API doesn't delete the user's role in the domain

2016-01-29 Thread Samuel de Medeiros Queiroz
*** This bug is a duplicate of bug 1277847 *** https://bugs.launchpad.net/bugs/1277847 ** This bug is no longer a duplicate of bug 1360391 Domain data remains in DB after domain is deleted ** This bug has been marked a duplicate of bug 1277847 Deleting a domain should remove assignments

[Yahoo-eng-team] [Bug 1155933] Re: Disabling/Deleting a domain should invalidate "foreign" domain tokens

2016-01-29 Thread Samuel de Medeiros Queiroz
*** This bug is a duplicate of bug 1277847 *** https://bugs.launchpad.net/bugs/1277847 ** This bug is no longer a duplicate of bug 1360391 Domain data remains in DB after domain is deleted ** This bug has been marked a duplicate of bug 1277847 Deleting a domain should remove assignments

[Yahoo-eng-team] [Bug 1626778] Re: [api] document /auth/tokens/OS-PKI/revoked

2016-11-01 Thread Samuel de Medeiros Queiroz
Changing to fix release as the v3 docs are merged and https://review.openstack.org/#/c/390913 is gating ** Changed in: keystone Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack I

[Yahoo-eng-team] [Bug 1680040] [NEW] Not all GET should have a correspondent HEAD, and vice-versa

2017-04-05 Thread Samuel de Medeiros Queiroz
Public bug reported: Most of keystone implement GET and HEAD for the same operation. This is okay when you are retrieving an entity or checking its existence, for example: GET /users/ HEAD /users/ However, there are some cases where having GET is obvious, but HEAD does not make any sens

[Yahoo-eng-team] [Bug 1688119] [NEW] change_password_after_first_use is not honored

2017-05-03 Thread Samuel de Medeiros Queiroz
Public bug reported: With change_password_after_first_use set to true, new users or users whom password got administratively updated should get their password_expires_at set to the current time, and password_expires_days should not be honored. keystone.conf: [security_compliance] # Configuring p

[Yahoo-eng-team] [Bug 1688123] [NEW] ignore_password_expiry is not honored

2017-05-03 Thread Samuel de Medeiros Queiroz
Public bug reported: ignore_password_expiry is set for admin user and is not working properly. With it set to true, the user should not be affected if their password has expired. keystone.conf: [cache] # Global toggle for caching. (boolean value) enabled = false [security_compliance] # Configuri

[Yahoo-eng-team] [Bug 1609398] [NEW] test_implied_roles fails intermittently

2016-08-03 Thread Samuel de Medeiros Queiroz
] https://github.com/openstack/python- keystoneclient/blob/41129c850394e97947ec374dad8e852b5e1b33b5/keystoneclient/tests/functional/v3/test_implied_roles.py#L50-L62 [2] https://review.openstack.org/#/c/334546/11 ** Affects: keystone Importance: Medium Assignee: Samuel de Medeiros Queiroz

[Yahoo-eng-team] [Bug 1609398] Re: test_implied_roles fails intermittently

2016-08-03 Thread Samuel de Medeiros Queiroz
** Changed in: python-keystoneclient Importance: Undecided => Critical ** Changed in: python-keystoneclient Importance: Critical => Medium ** Changed in: python-keystoneclient Assignee: (unassigned) => Samuel de Medeiros Queiroz (samueldmq) ** Changed in: keystone

[Yahoo-eng-team] [Bug 1586289] Re: openstack project list can not list the project which is domain.

2016-05-27 Thread Samuel de Medeiros Queiroz
** Changed in: keystone Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1586289 Title: openstack project list can not list

[Yahoo-eng-team] [Bug 1582290] Re: tests depend on testresouces

2016-05-30 Thread Samuel de Medeiros Queiroz
I have confirmed with Doug Hellmann in #openstack-oslo that testresources is coming in via the fixtures extra. Thus, keystone does not have to have it added to test-requirements directly ** Changed in: keystone Status: In Progress => Won't Fix -- You received this bug notification because

[Yahoo-eng-team] [Bug 1367740] Re: Assignment backends raise non-suggestive exception in grant CRUD

2016-03-03 Thread Samuel de Medeiros Queiroz
*** This bug is a duplicate of bug 1418398 *** https://bugs.launchpad.net/bugs/1418398 ** This bug has been marked a duplicate of bug 1418398 role not found and assignment not found mix up together -- You received this bug notification because you are a member of Yahoo! Engineering Team,