Tuesday, 2016-12-13

*** erhudy has quit IRC00:00
*** Ephur has joined #openstack-keystone00:00
*** Ephur has quit IRC00:00
*** Ephur has joined #openstack-keystone00:01
*** Ephur has quit IRC00:01
stingaciayoung:00:02
*** Ephur has joined #openstack-keystone00:02
*** Ephur has quit IRC00:02
*** Ephur has joined #openstack-keystone00:03
*** Ephur has quit IRC00:03
*** Ephur has joined #openstack-keystone00:04
*** Ephur has quit IRC00:04
*** Ephur has joined #openstack-keystone00:04
*** Ephur has quit IRC00:05
ayoungstingaci, ok, so the role is "admin_and_matching_domain_id00:05
ayoungdolphm, stevemar you guys are the admins in here, can you ban the Ephur account please00:05
ayoungits making things unusable00:05
*** Ephur has joined #openstack-keystone00:05
*** Ephur has quit IRC00:06
*** Ephur has joined #openstack-keystone00:06
stingaciI just used the value attribute from that rule to craft the following00:06
stingaci    "role_admin": "role:admin and domain_id:%(domain_id)s",00:06
stingaci    "admin_required": "rule:role_admin or is_admin:1",00:06
*** Ephur has quit IRC00:06
*** Ephur has joined #openstack-keystone00:07
stingaciayoung: the rest is standard out-of-the-box policy.json00:08
*** Ephur has joined #openstack-keystone00:08
*** Ephur has quit IRC00:08
*** Ephur has joined #openstack-keystone00:09
*** Ephur has quit IRC00:09
*** Ephur has joined #openstack-keystone00:10
*** Ephur has quit IRC00:10
ayoungstingaci, are you familiar with the differnence between project and domain scoped tokens?  I assume yes, but worth clarifying00:10
stingaciyes00:10
*** Ephur has joined #openstack-keystone00:10
*** Ephur has quit IRC00:11
*** Ephur has joined #openstack-keystone00:11
stingaciayoung: does this mean that a project scoped token will not have a domain_id hence why any operations with the previously mentioned rules will fail?00:11
ayoungstingaci, yes00:12
ayoungroughly that00:12
*** Ephur has quit IRC00:12
ayoungit would be project.domain_id for project scoped tokens00:12
ayoungand you don't want that anyway00:12
ayoungthat means anyone with admin on anyproject in the domain is a domain admin00:12
ayounggotta run,00:12
*** Ephur has joined #openstack-keystone00:12
stingacicheers00:12
*** Ephur has quit IRC00:13
*** Ephur has joined #openstack-keystone00:13
*** Ephur has quit IRC00:13
*** Ephur has joined #openstack-keystone00:14
*** Ephur has quit IRC00:14
*** Ephur has joined #openstack-keystone00:15
*** Ephur has quit IRC00:15
*** Ephur has joined #openstack-keystone00:16
*** Ephur has joined #openstack-keystone00:17
*** Ephur has quit IRC00:17
*** Ephur has joined #openstack-keystone00:18
*** Ephur has quit IRC00:18
*** phalmos_ has quit IRC00:18
*** Ephur has joined #openstack-keystone00:18
*** Ephur has quit IRC00:19
*** Ephur has joined #openstack-keystone00:19
*** Ephur has quit IRC00:20
*** Ephur has joined #openstack-keystone00:20
*** Ephur has quit IRC00:21
*** Ephur has joined #openstack-keystone00:21
*** Ephur has quit IRC00:21
*** Ephur has joined #openstack-keystone00:22
*** Ephur has quit IRC00:22
*** Ephur has joined #openstack-keystone00:23
*** Ephur has quit IRC00:23
*** Ephur has joined #openstack-keystone00:24
*** Ephur has quit IRC00:24
*** Ephur has joined #openstack-keystone00:25
*** Ephur has quit IRC00:25
*** Ephur has joined #openstack-keystone00:26
*** Ephur has quit IRC00:26
*** Ephur has joined #openstack-keystone00:27
*** Ephur has quit IRC00:27
*** Ephur has joined #openstack-keystone00:27
*** Ephur has quit IRC00:28
*** Ephur has joined #openstack-keystone00:28
*** Ephur has quit IRC00:28
*** Ephur has joined #openstack-keystone00:29
*** Ephur has quit IRC00:29
*** Ephur has joined #openstack-keystone00:30
*** Ephur has quit IRC00:30
*** Ephur has joined #openstack-keystone00:31
*** Ephur has joined #openstack-keystone00:32
*** Ephur has quit IRC00:32
*** Ephur has joined #openstack-keystone00:33
*** Ephur has quit IRC00:33
*** Ephur has joined #openstack-keystone00:34
*** Ephur has quit IRC00:34
*** Ephur has joined #openstack-keystone00:34
*** Ephur has quit IRC00:35
*** Ephur has joined #openstack-keystone00:36
*** Ephur has joined #openstack-keystone00:36
*** Ephur has quit IRC00:36
*** Ephur has joined #openstack-keystone00:37
*** Ephur has quit IRC00:37
*** Ephur has joined #openstack-keystone00:38
*** Ephur has quit IRC00:38
*** Ephur has joined #openstack-keystone00:39
*** Ephur has quit IRC00:39
*** Ephur has joined #openstack-keystone00:40
*** Ephur has quit IRC00:40
*** Ephur has joined #openstack-keystone00:41
*** Ephur has quit IRC00:41
*** Ephur has joined #openstack-keystone00:41
*** Ephur has quit IRC00:42
*** Ephur has joined #openstack-keystone00:42
*** Ephur has quit IRC00:43
*** Ephur has joined #openstack-keystone00:43
*** stingaci has quit IRC00:44
*** Ephur has joined #openstack-keystone00:44
*** Ephur has quit IRC00:44
*** Ephur has joined #openstack-keystone00:45
*** Ephur has quit IRC00:45
*** Ephur has joined #openstack-keystone00:46
*** Ephur has quit IRC00:46
*** Ephur has joined #openstack-keystone00:47
*** Ephur has quit IRC00:47
*** Ephur has joined #openstack-keystone00:48
*** Ephur has quit IRC00:48
*** Ephur has joined #openstack-keystone00:49
*** Ephur has quit IRC00:49
*** Ephur has joined #openstack-keystone00:49
*** Ephur has quit IRC00:50
*** Ephur has joined #openstack-keystone00:50
*** asettle has joined #openstack-keystone00:50
*** Ephur has quit IRC00:51
*** Ephur has joined #openstack-keystone00:51
*** Ephur has quit IRC00:51
stevemarayoung: i guess ephur was kicked?00:52
stevemarayoung: sorry, was eating dinner00:52
stevemarayoung: some of the infra people have admin access too, like fungi00:52
ayoungstevemar, not a problem,. thanks00:52
*** Ephur has joined #openstack-keystone00:52
*** Ephur has quit IRC00:52
*** gagehugo has joined #openstack-keystone00:53
*** Ephur has joined #openstack-keystone00:53
*** Ephur has quit IRC00:53
*** Ephur has joined #openstack-keystone00:54
*** Ephur has quit IRC00:54
*** Ephur has joined #openstack-keystone00:55
*** hoangcx_ has joined #openstack-keystone00:55
*** Ephur has quit IRC00:55
*** asettle has quit IRC00:55
*** Ephur has joined #openstack-keystone00:56
*** Ephur has quit IRC00:56
*** Ephur has joined #openstack-keystone00:56
*** Ephur has quit IRC00:57
*** Ephur has joined #openstack-keystone00:57
*** Ephur has quit IRC00:58
*** Ephur has joined #openstack-keystone00:58
*** Ephur has quit IRC00:59
*** Ephur has joined #openstack-keystone00:59
*** Ephur has quit IRC00:59
*** Ephur has joined #openstack-keystone01:00
*** Ephur has quit IRC01:00
*** Ephur has joined #openstack-keystone01:01
*** Ephur has quit IRC01:01
*** Ephur has joined #openstack-keystone01:02
*** Ephur has quit IRC01:02
stevemarayoung: this is the 3rd or 4th time a spammer has come while i'm at dinner01:02
stevemarayoung: they definitely pick good times01:02
*** Ephur has joined #openstack-keystone01:03
*** spzala has quit IRC01:03
*** Ephur has quit IRC01:03
*** spzala has joined #openstack-keystone01:03
*** Ephur has joined #openstack-keystone01:03
*** spzala has quit IRC01:04
*** spzala has joined #openstack-keystone01:04
*** Ephur has quit IRC01:04
*** Ephur has joined #openstack-keystone01:05
*** Ephur has quit IRC01:05
*** Ephur has joined #openstack-keystone01:05
*** Ephur has quit IRC01:06
*** Ephur has joined #openstack-keystone01:06
*** Ephur has quit IRC01:06
*** Ephur has joined #openstack-keystone01:07
*** Ephur has quit IRC01:07
*** Ephur has joined #openstack-keystone01:08
*** Ephur has quit IRC01:08
*** Ephur has joined #openstack-keystone01:09
*** Ephur has quit IRC01:09
*** tqtran has quit IRC01:10
*** Ephur has joined #openstack-keystone01:10
*** Ephur has quit IRC01:10
*** zhangjl has joined #openstack-keystone01:10
*** Ephur has joined #openstack-keystone01:11
*** Ephur has quit IRC01:11
*** Ephur has joined #openstack-keystone01:12
*** Ephur has quit IRC01:12
*** Ephur has joined #openstack-keystone01:13
*** Ephur has joined #openstack-keystone01:13
*** Ephur has quit IRC01:14
*** Ephur has joined #openstack-keystone01:14
*** Ephur has quit IRC01:14
*** Ephur has joined #openstack-keystone01:15
*** Ephur has quit IRC01:15
*** Ephur has joined #openstack-keystone01:16
*** Ephur has quit IRC01:16
*** Ephur has joined #openstack-keystone01:17
*** Ephur has quit IRC01:17
*** Ephur has joined #openstack-keystone01:18
*** Ephur has quit IRC01:18
*** Ephur has joined #openstack-keystone01:19
*** Ephur has quit IRC01:19
*** Ephur has joined #openstack-keystone01:20
*** Ephur has quit IRC01:20
*** Ephur has joined #openstack-keystone01:20
adriantstevemar: a blank policy is meant to be 'anyone can access' or default to 'default' rule?01:21
*** Ephur has quit IRC01:21
adriantbecause just now testing in my devstack... as a non admin I can do region list: https://github.com/openstack/keystone/blob/master/etc/policy.json#L1401:21
*** Ephur has joined #openstack-keystone01:21
adriantbut if I change that line to "rule:default" I can't anymore.01:21
*** Ephur has quit IRC01:21
*** Ephur has joined #openstack-keystone01:22
*** Ephur has quit IRC01:22
*** Ephur has joined #openstack-keystone01:23
*** Ephur has quit IRC01:23
*** Ephur has joined #openstack-keystone01:24
*** Ephur has quit IRC01:24
*** Zer0Byte__ has quit IRC01:24
*** Ephur has joined #openstack-keystone01:25
*** Ephur has quit IRC01:25
*** ayoung has quit IRC01:25
*** Ephur has joined #openstack-keystone01:26
*** Ephur has joined #openstack-keystone01:26
*** Ephur has quit IRC01:27
*** Ephur has joined #openstack-keystone01:28
*** Ephur has quit IRC01:28
*** Ephur has joined #openstack-keystone01:28
*** Ephur has quit IRC01:29
agrebennikov_hey folks, is it accurate that I cannot use wildcard certs with keystone middleware?01:29
*** Ephur has joined #openstack-keystone01:29
*** Ephur has quit IRC01:29
agrebennikov_probably jamielennox01:30
agrebennikov_(sorry for bugging you so early)01:30
*** Ephur has joined #openstack-keystone01:30
*** Ephur has quit IRC01:30
jamielennoxagrebennikov_: not early for me, what do you mean you can't use wildcards? for hosting? that should be done via apache/something other than imddleware01:31
agrebennikov_no01:31
*** Ephur has joined #openstack-keystone01:31
agrebennikov_for services so that they can authenticate/validate against keystone with https01:31
agrebennikov_I have my cert for the vip as *.test.com01:32
agrebennikov_for example01:32
*** Ephur has joined #openstack-keystone01:32
agrebennikov_and I have my vip as priv.test.com01:32
*** Ephur has quit IRC01:32
agrebennikov_and even though I specified cafile = <cacert> in keystone_authtoken01:32
jamielennoxkeystone middleware shouldn't interfere there at all01:32
agrebennikov_oh, really?01:33
*** Ephur has joined #openstack-keystone01:33
*** Ephur has quit IRC01:33
jamielennoxah, so that's for your (eg) nova service talking to keystone - right01:33
jamielennoxthat should be fine that just ends up as part of your request to keystone01:33
agrebennikov_  File "/openstack/venvs/glance-13.3.9/lib/python2.7/site-packages/keystoneauth1/session.py", line 490, in _send_request01:33
agrebennikov_    raise exceptions.SSLError(msg)01:33
agrebennikov_SSLError: SSL exception connecting to https://priv.test.com:35357/v3/auth/tokens: hostname 'priv.test.com' doesn't match u'*.test.com'01:33
agrebennikov_exactly01:34
*** Ephur has joined #openstack-keystone01:34
stevemaradriant: i thought a blank one allowed any authed user01:34
*** Ephur has quit IRC01:34
jamielennoxso requests.post('https://path.to/keystone/v3/auth/tokens', cacert=CONF.keystone_authtoken.cacert)01:34
adriantstevemar: hmmm is '/OS-REVOKE/events' being non-admin accessible a security flaw? because the default policy doesn't limit non-admin access, nor does the code actually default to the default policy01:34
*** Ephur has joined #openstack-keystone01:34
adriantstevemar: that appears to be the case, yes, so I'm not sure what the point of the 'default' rule is then...01:34
agrebennikov_jamielennox, but what the hell it's complaining about then?01:35
agrebennikov_is it a problem of request lib?01:35
*** Ephur has quit IRC01:35
jamielennoxagrebennikov_: but you generally don't put your wildcard in there, you put the cacert01:35
jamielennoxthe thing that signed the wildcard01:35
agrebennikov_sure, it's my ca :)01:35
*** Ephur has joined #openstack-keystone01:35
jamielennoxi mean, you can pass normal certs in there so i would expect that to work01:35
*** Ephur has quit IRC01:36
jamielennoxagrebennikov_: i would test it first just using requests, like >>> import requests; request.get('https://keystone/v3', cacert='/ptah/to/ca')01:36
*** Ephur has joined #openstack-keystone01:36
*** Ephur has quit IRC01:36
agrebennikov_hm... let me check01:37
agrebennikov_since curl --cacert <> works01:37
stevemaradriant: that is an odd choice at first glance01:37
stevemaradriant: we can ask ayoung what his reasoning was01:37
*** Ephur has joined #openstack-keystone01:37
*** Ephur has quit IRC01:37
adriantstevemar: this works: http://paste.openstack.org/show/592155/01:38
jamielennoxi would expect both of these and curl to just back onto openssl though01:38
*** Ephur has joined #openstack-keystone01:38
*** Ephur has quit IRC01:38
adriantstevemar: and I don't think it should... revocation events aren't exactly that unsafe to know, but it's still not good to allow ANY authed user to get them.01:38
*** Ephur has joined #openstack-keystone01:39
*** Ephur has joined #openstack-keystone01:40
*** Ephur has quit IRC01:40
*** Ephur has joined #openstack-keystone01:41
agrebennikov_hm... is it really "cacert"?01:41
*** Ephur has quit IRC01:41
agrebennikov_    return session.request(method=method, url=url, **kwargs)01:41
agrebennikov_TypeError: request() got an unexpected keyword argument 'cacert'01:41
*** Ephur has joined #openstack-keystone01:42
*** Ephur has quit IRC01:42
agrebennikov_jamielennox,01:42
adriantstevemar: eh, don't actually need the user agent header: http://paste.openstack.org/show/592158/ but you get the idea01:42
jamielennoxagrebennikov_: oh, no sorry - it's verify01:42
*** Ephur has joined #openstack-keystone01:42
jamielennoxverify=01:42
*** Ephur has quit IRC01:43
adriantstevemar: just doing a 'openstack token issue' and pasting the token into that paste should work in a standard devstack.01:43
*** zhangjl has quit IRC01:43
*** Ephur has joined #openstack-keystone01:43
*** Ephur has quit IRC01:44
agrebennikov_jamielennox, so same thing :/01:44
agrebennikov_hostname doesn't match wildcard01:44
jamielennoxagrebennikov_: yea, ok, so there's not much we can do about that from a keystone perspective then01:44
agrebennikov_so it's not the problem of ca01:44
*** Ephur has joined #openstack-keystone01:44
jamielennoxit's either requests or urllib301:44
*** Ephur has quit IRC01:44
agrebennikov_right......01:44
jamielennoxmy recommendation would be don't use a wildcard as a ca01:45
jamielennoxif you want to do that just put a single root above it01:45
agrebennikov_why?01:45
*** Ephur has joined #openstack-keystone01:45
*** Ephur has quit IRC01:45
agrebennikov_I mean - it is the cert which is a wildcart01:45
jamielennoxcaroot -> wildcard01:45
agrebennikov_not just ca01:45
agrebennikov_so that I can use same cert for both public and private vips01:46
*** Ephur has joined #openstack-keystone01:46
jamielennoxi mean it's mostly just weird to have a ca with a wildcard, largely ca's don't have domains at all you just call it something01:46
*** Ephur has quit IRC01:46
jamielennoxbut if you have the ca sign your wildcard then you can use the normal ca as the root of trust and it should be fine01:47
*** Ephur has joined #openstack-keystone01:47
agrebennikov_no, this is not what I'm saying about :) ca can verify the cert in my case. But the library complains about the cert itself01:47
*** Ephur has quit IRC01:47
agrebennikov_since the cert has a *.whatever01:47
agrebennikov_while the lib wants it to be Ecactly private.test.com01:48
agrebennikov_*exactly01:48
*** Ephur has joined #openstack-keystone01:48
stevemaradriant: i think the data there is signed right?01:48
*** Ephur has quit IRC01:48
agrebennikov_if I don't have ca mentioned at all - ssl just drops me01:48
jamielennoxoh, you think this is python's CN validation?01:48
agrebennikov_with this01:48
agrebennikov_requests.exceptions.SSLError: [Errno 1] _ssl.c:510: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed01:48
agrebennikov_yeah01:48
jamielennoxthere is some special stuff it does there - but that looks like an openssl error message01:49
*** Ephur has joined #openstack-keystone01:49
agrebennikov_freaking python.... :/01:49
*** Ephur has quit IRC01:49
adriantstevemar: from my devstack: http://paste.openstack.org/show/592160/01:49
*** Ephur has joined #openstack-keystone01:49
*** Ephur has quit IRC01:50
adriantstevemar: so as a non-admin user you can see who has logged out, been revoked, and when it seems :/01:50
*** Ephur has joined #openstack-keystone01:50
*** Ephur has quit IRC01:51
jamielennoxagrebennikov_: i haven't looked at how that's done in a while, i'm guessing it's in urllib301:51
jamielennoxthere was a function backported from later pytohns01:51
stevemaradriant: well, tokens don't get revoked at log out now :P01:51
*** Ephur has joined #openstack-keystone01:51
adriantah, well *shrug*01:51
jamielennoxactually the only thing to suggest is ensure you pip install requests[security] which ensures like the SSL libraries are installed01:51
stevemaradriant: im not sure on this one, want to file a security bug and see what the VMT says?01:51
jamielennoxbut i'd be surprised if that was the proble01:51
*** Ephur has quit IRC01:52
*** asettle has joined #openstack-keystone01:52
stevemarVMT = vulnerability management team01:52
*** Ephur has joined #openstack-keystone01:52
*** Ephur has quit IRC01:52
adriantstevemar: yeah I guess. I'm not sure what someone could do with revocation data, but having it exposed probably isn't a good thing. Might be worth reviewing all the policies to make sure they make sense.01:53
adriantstevemar: I know the trusts default policies are also blank.01:53
*** Ephur has joined #openstack-keystone01:53
*** Ephur has quit IRC01:53
*** adrian_otto has quit IRC01:54
stevemaradriant: yep, there are in-code checks for those01:54
*** Ephur has joined #openstack-keystone01:54
agrebennikov_jamielennox, nevermind... I know what the problem is.... stupid dumb me01:54
agrebennikov_it should work fine01:54
*** Ephur has quit IRC01:54
stevemaragrebennikov_: haha, hate it when that happens :P01:54
adriantstevemar: just looking through that now :)01:54
stevemaradriant: ;)01:55
agrebennikov_I have my wc as *.test.com01:55
*** Ephur has joined #openstack-keystone01:55
agrebennikov_the vip is called vip.test.com, and it is refistered in the upstream dns01:55
*** Ephur has quit IRC01:55
agrebennikov_and I decided to use private.vip.test.com as private vip01:55
agrebennikov_which just seems to be forbidden01:55
*** Ephur has joined #openstack-keystone01:56
stevemaradriant: thinking about the revoke list now, might be worth addressing it, i can't think of another way to get a bunch of user IDs, which i could then auth with and lock out01:56
agrebennikov_to use second level of the name and expect it to be covered by the wildcard01:56
*** Ephur has quit IRC01:56
jamielennoxi love it when that happens, it means we don't have to do anything upstream :)01:56
agrebennikov_exactly01:56
*** asettle has quit IRC01:56
agrebennikov_but at the same time I have to go talk to odyssey4me01:56
*** Ephur has joined #openstack-keystone01:57
agrebennikov_since the ca is not distributed to any container but keystone01:57
*** Ephur has quit IRC01:57
agrebennikov_but it's a separate story01:57
agrebennikov_thanks jamielennox stevemar01:57
jamielennoxagrebennikov_: maybe the easier way to do this in a deploy is register the certs into the OS instead01:57
agrebennikov_:)01:57
*** Ephur has joined #openstack-keystone01:57
jamielennoxagrebennikov_: you can register one public, one private whatever rather than do it at the keystone level01:57
agrebennikov_jamielennox, what do you mean?01:57
*** Ephur has quit IRC01:58
agrebennikov_ah, yes, sure01:58
agrebennikov_that's not a big deal01:58
agrebennikov_it is just in the OSA01:58
agrebennikov_at all01:58
adriantstevemar: if it was revocation events for you, maybe it would be fine, but it seems to list all of them. :(01:58
*** Ephur has joined #openstack-keystone01:58
*** Ephur has quit IRC01:59
*** Ephur has joined #openstack-keystone01:59
*** Ephur has quit IRC01:59
*** Ephur has joined #openstack-keystone02:00
*** Ephur has quit IRC02:00
*** Ephur has joined #openstack-keystone02:01
*** Ephur has quit IRC02:01
*** Ephur has joined #openstack-keystone02:02
*** Ephur has quit IRC02:02
*** Ephur has joined #openstack-keystone02:03
*** Ephur has quit IRC02:03
*** Ephur has joined #openstack-keystone02:04
*** Ephur has quit IRC02:04
*** Ephur has joined #openstack-keystone02:04
*** Ephur has quit IRC02:05
*** Ephur has joined #openstack-keystone02:05
*** Ephur has quit IRC02:06
*** Ephur has joined #openstack-keystone02:06
*** Ephur has quit IRC02:07
*** Ephur has joined #openstack-keystone02:07
*** Ephur has quit IRC02:07
*** Ephur has joined #openstack-keystone02:08
*** Ephur has quit IRC02:08
*** zhangjl has joined #openstack-keystone02:09
*** Ephur has joined #openstack-keystone02:09
*** Ephur has quit IRC02:09
*** Ephur has joined #openstack-keystone02:10
*** Ephur has quit IRC02:10
*** Ephur has joined #openstack-keystone02:11
*** Ephur has quit IRC02:11
adriantstevemar: so should I file a bug? On launchpad?02:11
stevemaradriant: yeah, when doing so go to the advanced options and mark it as security vuln02:12
adriantstevemar: ultimately, it's unsafe because you can gleam some of your user base, and then it's a question of what exactly can someone do given a user_id02:12
stevemaradriant: yeah, that's my thinking, nothing too crazy but still02:12
adriantwith that endpoint exposed, you can have a script collecting a list of all users it sees on your cloud02:13
adriantwhich isn't exactly a good thing02:13
adriantbut I'm not intrusion minded enough to think of awful things I could do with a list of user_ids02:13
*** namnh has joined #openstack-keystone02:24
stevemaradriant: repeated auth attempts aren't nice02:24
adriantstevemar: well yes, you can brute force, and if not you can lock out a given user.02:26
adriantstevemar: the lock out is not so bad, but the brute force (if no rate limiting in place) is very bad, and it's with a known user02:27
stevemaradriant: if you don't rate limit you're gonna have a bad time02:27
adriantstevemar: yep02:27
*** stingaci has joined #openstack-keystone02:32
*** stingaci has quit IRC02:33
*** stingaci has joined #openstack-keystone02:33
*** guoshan has joined #openstack-keystone02:41
adriantstevemar: submitted02:44
stevemaradriant: thanks02:44
stevemar102:44
stevemar!02:44
*** stingaci has quit IRC02:45
*** chlong has quit IRC02:45
morganugh02:50
morganjust saw that bug02:50
morganadriant: please don't use paste for security bugs.02:51
morganadriant: it is public (and crawled by many things)02:51
adriantmorgan: noted, just used it there because devstack data and doesn't show anything useful02:51
morganbetter to embed it all in the bug report *or* attach the info to the bug02:52
morganas an upload, since those are secure02:52
*** asettle has joined #openstack-keystone02:52
*** spzala has quit IRC02:52
adriantyeah, will edit it. Just used a paste there since the paste data doesn't reflect or say anything about what it is about02:53
openstackgerritShan Guo proposed openstack/keystone: [api] set `is_admin_project` on tokens for admin project  https://review.openstack.org/40967802:55
*** asettle has quit IRC02:57
adriantmorgan: I know in our deployment we've run into weird policy stuff. The note at the end is a suggestion to look a bit deeper, but at least in this case for Keystone, it is a problem. :/02:57
*** chlong has joined #openstack-keystone02:59
morganadriant: also, please avoid publically discussing details of private security bugs.03:01
morganConversations should be in private or as comments on the bug itself for all reviewers to see.03:01
morganadriant: not meaning to pick on you here, just doing the VMT work :).03:01
adriantmorgan: I'm aware, and I don't mind. That's way the above comment was vague as all hell. :)03:02
adriantbut will keep it to email and the report itself.03:02
adriants/way/why/03:03
morganright, but if you look at context, the previous bits you discussed could be put together. I've updated the info so we can get keystone-coresec to look it over and help make a call on severity etc03:03
adriantmorgan: noted :)03:04
*** zhangjl1 has joined #openstack-keystone03:09
*** zhangjl has quit IRC03:10
*** stingaci has joined #openstack-keystone03:25
*** agrebennikov_ has quit IRC03:26
*** raginbajin has quit IRC03:27
*** raginbajin has joined #openstack-keystone03:32
*** stingaci has quit IRC03:38
*** stingaci has joined #openstack-keystone03:42
*** harlowja has quit IRC03:43
*** asettle has joined #openstack-keystone03:53
*** spzala has joined #openstack-keystone03:54
*** asettle has quit IRC03:58
*** nicolasbock has quit IRC03:58
*** stingaci has quit IRC04:09
*** dikonoor has joined #openstack-keystone04:09
openstackgerritTony Breeds proposed openstack/oslo.policy: Add Constraints support  https://review.openstack.org/41002404:10
*** harlowja has joined #openstack-keystone04:21
*** links has joined #openstack-keystone04:22
openstackgerritJamie Lennox proposed openstack/keystonemiddleware: Pass ?allow_expired  https://review.openstack.org/38210004:23
openstackgerritTony Breeds proposed openstack/pycadf: Add Constraints support  https://review.openstack.org/41003604:27
* stevemar thinks tonyb forgot to indent in the if block04:28
tonybstevemar: Ummm in tox_install.sh?04:29
tonybOh phooey04:29
stevemartonyb: y, line 17?04:29
stevemartonyb: i don't remember if that's allowed in bash or not04:30
tonybstevemar: it's correct and does what I wan it just looks ugly04:30
tonybstevemar: It probably won't pass bashate either :(04:31
stevemartonyb: oh def not bashate04:31
stevemarbut most projects don't have that enabled i feel04:31
tonybstevemar: Yeah but it still needs fixing.04:32
*** udesale has joined #openstack-keystone04:32
* stevemar goes off to sleep04:33
openstackgerritTony Breeds proposed openstack/pycadf: Add Constraints support  https://review.openstack.org/41003604:34
openstackgerritTony Breeds proposed openstack/oslo.policy: Add Constraints support  https://review.openstack.org/41002404:39
*** adrian_otto has joined #openstack-keystone04:41
*** hoangcx_ is now known as hoangcx04:42
*** madhaviy has joined #openstack-keystone04:43
*** liujiong has joined #openstack-keystone04:46
*** spzala has quit IRC04:49
*** spzala has joined #openstack-keystone04:49
*** spzala has quit IRC04:49
jamielennoxstevemar: https://review.openstack.org/#/c/410039/1/lib/keystone is the failure for allow_expired04:53
*** asettle has joined #openstack-keystone04:54
*** madhaviy has quit IRC04:56
*** asettle has quit IRC04:59
*** tqtran has joined #openstack-keystone05:07
*** harlowja has quit IRC05:08
*** agrebennikov_ has joined #openstack-keystone05:08
*** tqtran has quit IRC05:11
*** rdo has quit IRC05:11
*** rdo has joined #openstack-keystone05:18
*** guoshan has quit IRC05:29
*** dikonoor has quit IRC05:35
*** adrian_otto has quit IRC05:39
*** adrian_otto has joined #openstack-keystone05:40
*** stingaci has joined #openstack-keystone05:42
*** stingaci has quit IRC05:46
*** dikonoor has joined #openstack-keystone05:55
*** asettle has joined #openstack-keystone05:55
*** adriant has quit IRC05:56
*** harlowja has joined #openstack-keystone05:56
*** asettle has quit IRC06:00
*** namnh has quit IRC06:01
*** hoangcx has quit IRC06:01
*** hoangcx has joined #openstack-keystone06:01
*** namnh has joined #openstack-keystone06:01
*** guoshan has joined #openstack-keystone06:04
*** tovin07 has quit IRC06:06
*** tovin07__ has joined #openstack-keystone06:06
*** stingaci has joined #openstack-keystone06:08
*** stingaci has quit IRC06:09
*** diazjf has joined #openstack-keystone06:11
*** diazjf has quit IRC06:11
*** Ephur has joined #openstack-keystone06:13
*** dikonoo has joined #openstack-keystone06:13
*** Ephur has quit IRC06:17
*** links has quit IRC06:34
*** tovin07__ has quit IRC06:34
*** tovin07__ has joined #openstack-keystone06:35
*** tovin07__ has quit IRC06:35
*** tovin07__ has joined #openstack-keystone06:35
*** agrebennikov_ has quit IRC06:36
*** Zer0Byte__ has joined #openstack-keystone06:37
*** links has joined #openstack-keystone06:39
*** frickler has quit IRC06:40
*** richm has quit IRC06:41
*** tovin07__ is now known as tovin07_afk06:42
*** adrian_otto has quit IRC06:42
*** tovin07_afk has quit IRC06:50
*** asettle has joined #openstack-keystone06:56
*** asettle has quit IRC07:01
*** ravelar has quit IRC07:12
*** nkinder has quit IRC07:14
*** nkinder has joined #openstack-keystone07:23
*** harlowja has quit IRC07:25
*** tobberydberg has joined #openstack-keystone07:52
*** frickler has joined #openstack-keystone07:53
*** Zer0Byte__ has quit IRC07:54
*** asettle has joined #openstack-keystone07:57
*** jaosorior has joined #openstack-keystone07:59
*** stingaci has joined #openstack-keystone08:01
*** asettle has quit IRC08:02
*** basilAB has quit IRC08:04
*** rcernin has joined #openstack-keystone08:05
*** stingaci has quit IRC08:05
*** pnavarro has joined #openstack-keystone08:07
*** basilAB has joined #openstack-keystone08:09
*** pcaruana has joined #openstack-keystone08:10
*** tqtran has joined #openstack-keystone08:10
*** jaosorior has quit IRC08:12
*** jaosorior has joined #openstack-keystone08:12
*** tqtran has quit IRC08:14
*** stingaci has joined #openstack-keystone08:20
*** rcernin has quit IRC08:22
*** stingaci has quit IRC08:24
*** rcernin has joined #openstack-keystone08:25
*** wanghua has joined #openstack-keystone08:49
*** zzzeek has quit IRC09:00
*** zzzeek has joined #openstack-keystone09:01
*** asettle has joined #openstack-keystone09:20
*** asettle has quit IRC09:22
*** asettle has joined #openstack-keystone09:22
*** mvk has quit IRC09:23
*** mvk has joined #openstack-keystone09:54
*** liujiong has quit IRC10:12
*** Ephur has joined #openstack-keystone10:14
*** links has quit IRC10:16
*** ravelar has joined #openstack-keystone10:18
*** Ephur has quit IRC10:19
*** hoangcx has quit IRC10:21
*** ravelar has quit IRC10:23
*** guoshan has quit IRC10:24
*** links has joined #openstack-keystone10:30
*** asettle has quit IRC10:30
*** asettle has joined #openstack-keystone10:36
*** asettle has quit IRC10:37
*** asettle has joined #openstack-keystone10:37
*** namnh has quit IRC10:38
*** guoshan has joined #openstack-keystone10:39
*** woodster_ has quit IRC10:45
*** dikonoo has quit IRC11:00
*** dikonoor has quit IRC11:01
*** daemontool has joined #openstack-keystone11:02
*** udesale has quit IRC11:02
*** guoshan has quit IRC11:06
*** zhangjl1 has quit IRC11:07
*** tqtran has joined #openstack-keystone11:12
*** zhugaoxiao has joined #openstack-keystone11:13
*** richm has joined #openstack-keystone11:14
*** guoshan has joined #openstack-keystone11:14
*** links has quit IRC11:15
*** tqtran has quit IRC11:17
samueldmqmorning keystone11:18
*** mvk has quit IRC11:24
*** amoralej|off is now known as amoralej11:25
*** links has joined #openstack-keystone11:32
*** mvk has joined #openstack-keystone11:37
*** guoshan has quit IRC11:41
*** nicolasbock has joined #openstack-keystone11:45
*** zhugaoxiao has quit IRC11:56
*** zhugaoxiao has joined #openstack-keystone11:56
*** guoshan has joined #openstack-keystone12:07
*** jaosorior is now known as jaosorior_brb12:10
*** guoshan has quit IRC12:27
*** guoshan has joined #openstack-keystone12:27
*** guoshan has quit IRC12:32
*** tobberydberg has quit IRC12:34
*** tobberydberg has joined #openstack-keystone12:34
*** tobberydberg has quit IRC12:38
*** dikonoo has joined #openstack-keystone12:39
*** dikonoor has joined #openstack-keystone12:39
openstackgerritKseniya Tychkova proposed openstack/keystone-specs: Quota limits  https://review.openstack.org/36376512:47
stevemarsamueldmq: o/12:48
stevemarsamueldmq: can you check https://review.openstack.org/#/c/409923/ too, you approved the follow-on12:48
samueldmqstevemar: sure, done12:49
samueldmq:)12:49
stevemarsamueldmq: thx12:49
samueldmqanytime12:49
openstackgerritKseniya Tychkova proposed openstack/keystone-specs: Quota limits  https://review.openstack.org/36376512:49
*** tobberydberg has joined #openstack-keystone12:53
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476912:54
openstackgerritRodrigo Duarte proposed openstack/keystone: Settings for test cases  https://review.openstack.org/41020512:54
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476912:56
*** edmondsw has joined #openstack-keystone13:03
*** dave-mccowan has joined #openstack-keystone13:06
*** edmondsw_ has joined #openstack-keystone13:10
*** stingaci has joined #openstack-keystone13:10
*** tqtran has joined #openstack-keystone13:14
*** stingaci has quit IRC13:15
*** edmondsw_ has quit IRC13:16
*** tqtran has quit IRC13:18
*** asettle has quit IRC13:19
*** nklenke has joined #openstack-keystone13:19
*** asettle has joined #openstack-keystone13:19
rodrigodsstevemar, i guess with https://review.openstack.org/#/c/410205/1 we can have https://review.openstack.org/#/c/324769/23 running fine13:44
*** amoralej is now known as amoralej|lunch13:44
rodrigodsthe only problem is the related bug13:44
stevemarrodrigods: oh?13:56
stevemarah, that bug13:56
stevemarseems fine to me13:56
rodrigodscurious to check the gate output13:57
rodrigodshopefully it will fail only the keystone-dsvm-v3 (which is the only job it is supposed to run in)13:57
*** udesale has joined #openstack-keystone13:58
*** ayoung has joined #openstack-keystone13:58
*** ChanServ sets mode: +v ayoung13:58
*** lamt has joined #openstack-keystone14:03
*** jaosorior_brb is now known as jaosorior14:09
*** guoshan has joined #openstack-keystone14:11
*** agrebennikov_ has joined #openstack-keystone14:22
samueldmqstevemar: please look at https://review.openstack.org/#/c/409678 when you have a chance14:30
samueldmqstevemar: I've put a couple of suggestions there, not sure which one is better. and since you're a docs expert.... :)14:31
*** narasimha_SV has joined #openstack-keystone14:31
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476914:32
*** daemontool has quit IRC14:33
*** adrian_otto has joined #openstack-keystone14:35
*** amoralej|lunch is now known as amoralej14:36
*** adrian_otto1 has joined #openstack-keystone14:39
*** adrian_otto has quit IRC14:40
*** zzzeek has quit IRC14:43
*** zzzeek has joined #openstack-keystone14:43
dstanekayoung: have you seen https://review.openstack.org/#/c/382672/ ?14:44
ayoungdstanek, nope14:44
*** dikonoo has quit IRC14:45
*** dikonoor has quit IRC14:45
ayoungdstanek, its not a bad idea, although calling it RBAC is probably too limiting14:45
dstanekayoung: https://github.com/DavidPurcellATT/patrole14:46
ayoungdstanek, none of the Keystone folks were on the review14:48
*** udesale has quit IRC14:49
stevemarayoung: sounds like it's just additional testing14:50
stevemarno new stuff14:50
ayoungstevemar, it is RBAC in policy.json14:50
ayounghttps://review.openstack.org/#/c/410250/1  posted a revert.  It will start the discussion anyway.14:51
stevemar"Patrole is a Tempest plugin to test Role Base Access Control for OpenStack API's."14:51
stevemargagehugo: do you know who david purcell is?14:52
stevemargagehugo: or his irc handle?14:53
stevemarayoung: you can still comment on https://review.openstack.org/#/c/382672/14:53
stevemarayoung: ah, i see you proposed the revert14:53
stevemarayoung: good comments on the revert14:54
narasimha_SVif we want configure k2k federation do we need to have keystone setups to configure 1 keystone as IDP and another as SP14:54
ayoungstevemar, and a comment saying "this is to start the conversation..."14:54
stevemaryep, noticed14:54
ayoungmorgan, stevemar, BTW, care to re-add the +2s to https://review.openstack.org/#/c/391624/ ? Matt had some reservations with the old one, mostly due to my limiting things to one-operation-one-role14:55
ayoungI made it many to many (still not sure that is right)14:55
ayoungand cleaned up more of the language14:55
dstaneknarasimha_SV: yep14:55
*** tobberyd_ has joined #openstack-keystone14:55
*** wanghua has quit IRC14:56
ayoungdstanek, it is Impossible to map from policy rule to API14:56
ayoungyou need to understand the code structure of each individual project14:56
ayoungand there will be projects that are written in other languages14:56
ayoungthere are projects that are not part of the OpenStack Big tent14:57
ayoungand Keystone needs to support those, too14:57
dstanekayoung: I'm not taking about mapping to URLs, but to operations14:57
lbragstadwe use policy rules today and something already does the mapping anyway14:57
*** tobberydberg has quit IRC14:59
lbragstads/policy rules/operations/14:59
* dstanek is at the doctor now so he's typing sloooow15:00
*** tobberyd_ has quit IRC15:00
ayounglbragstad, dstanek there is even less of a mapping there15:01
ayoungHorizon calls into python-*client15:01
ayoungthat builds the URL15:01
ayoungthat gets passed to the remote service ... passes through keystonemiddleware into the service15:02
ayoungsomewhere deep in the service, it matches a random string to pull out the rule15:02
ayoungfor Keystone that random string is a method name on the object]15:02
ayoungbut the other services do other things15:02
ayoungso,  yeah, two operations on the same resource might get passed through two separate policy checks, nothing we can do to affectthat15:03
ayoungits not really different than the Unix file system approacjh15:04
ayoungyou can hard link the same inode into two different directories15:04
ayoungand have different permissions in each directory15:04
ayoungread only in one, writable in the other15:04
ayoungdiffernt groups, etc15:04
*** guoshan has quit IRC15:05
*** guoshan has joined #openstack-keystone15:06
*** udesale has joined #openstack-keystone15:08
*** udesale has quit IRC15:10
*** udesale has joined #openstack-keystone15:10
*** phalmos has joined #openstack-keystone15:11
*** guoshan has quit IRC15:11
*** edtubill has joined #openstack-keystone15:12
*** chlong has quit IRC15:13
*** phalmos_ has joined #openstack-keystone15:15
*** tqtran has joined #openstack-keystone15:15
*** jaugustine has joined #openstack-keystone15:16
*** phalmos has quit IRC15:18
lbragstadayoung i think having the url makes maintaining things for the project harder15:19
ayounglbragstad, harder than impossible?15:19
lbragstadespecially if a service has the same operation available across two api versions15:19
*** tqtran has quit IRC15:20
lbragstadas a policy writer - I have to make sure all possible ways a user can do something over every api version in the deployment has the same role(s)15:20
openstackgerritRon De Rose proposed openstack/keystone: Require domain_id when registering Identity Providers  https://review.openstack.org/39968415:21
ayounglbragstad, stop saying policy.  We are not talking full policy intentionally here.15:22
ayoungpolicy is a really hard thing to get right15:22
lbragstadsure - but is this making it any easier?15:22
ayoungso, as an administrator, you have to ensure that multiple URLS that provide access to the same resource do not accidentally provide elevated access to a  less privileged user.15:22
ayounglbragstad, yes15:22
ayounglbragstad, as I said, today it is impossible15:23
ayoungmost of the policy rules in effect today do not enforce RBAC at all15:23
ayoungaside from admin, and that is still broken in multiple projects15:23
ayoungbut lets put a pin in admin, grandfather it in, and move back to the other APIS15:23
ayounglong term, I want to remove the admin check from policy15:24
ayoungbut that is a tale for another release15:24
ayounglbragstad, the very real feature request we've had numerous times if for a read only role15:24
gagehugostevemar: yes I know him15:24
ayoungthis is, quite simply, the only way I can see to get that implemented15:25
ayoungthe current policy setup derailed the attempt to get a standard set of roles defined15:25
ayoungand there is no support for linking policy.json to the Keystone database15:25
lbragstadayoung what was the reason?15:25
ayoungwe pushed hard on that15:25
*** ravelar has joined #openstack-keystone15:25
ayounglbragstad, ok,  here are the details15:25
ayoungin order to have a read only role, you need to ensure that tokens with only that role are not accepted on APIs that are `write`15:26
lbragstadayoung sure15:26
ayoungthat involves going through every api in every service and ensuring that has, at a minimum, a role elevated above "reader"15:26
ayoungwhich means changing the policy file everywhere. And, by the way, this breaks if the roles are not already defined in Keystone15:27
ayoungthere was not even a consistant Member vs _member_ out there15:27
ayoungand some, like edmondsw have deployments that don't use member at all15:27
lbragstadok15:28
ayoungwe can't mess with policy without breaking a lot of people15:28
ayoungthus, it calls for a mechanism on top OF the existing policy framework15:28
ayoungand, it calls for something targetted at the roles, and in sync with the Keystone server15:28
ayoungthe set of roles in Keystone need to drive the RBAC rules15:28
ayoungIt is based on the URL to make a mechanism that can work for any service.15:29
ayoungand also to give information to Horizon about what role is required for the service15:29
ayoungand not just Horizon15:29
ayoungtrusts, any delegation15:29
ayoungwe need a way to say "what is the minimum I need to delegate in order to get that worker access to this API"15:30
dstanekayoung: couldn't you use summer friendly token instead of URL?15:30
ayounglbragstad, its a hard problem.  I  tried to keep the solution as simple as possible15:30
ayoungdstanek, so, I don't think so15:31
dstanekSummer should have been user15:31
ayoungdstanek, you mean something like  compute:create_server?15:31
ayoungdstanek, so...I think what we will end up having is a request for a modifyier attribute on roles15:31
ayoungjust like we have domain-specific and global today15:32
dstanekyes, the service already maps that... Horizon and clients already come close15:32
ayoungI see three types of roles over time15:32
ayoungorganizational, workflow, resource15:32
ayoungadmin service and member are orginazational15:33
ayoungworkflow is like "create and modify a vm" that has to talk to multiple services15:33
ayoungresources is lie "image:read_image"15:33
ayoungand then the URL patterns would be mapped one-to-one with the resource roles15:34
ayoungand we can evolve toward that, but I don't want to boil the ocean in this spec15:34
*** udesale has quit IRC15:34
ayoungdstanek, that would make for a nicer UI experience15:35
ayounglist_roles should then show the organization roles by default15:35
ayoungbut, if I need to figure out how to delegate a subset of operations, I can delegate the workflow role, or even the resource level role and provide least priv15:36
ayoungbut...I want this to be incremental15:36
lbragstadayoung go back to the read only role problem15:36
ayoungso, for now, I want to get the mechanism defined, get a proof of concept out there, let people try it, and get feedback15:36
dstanekayoung: I want to define the end state even if it's boiling the ocean15:37
openstackgerritRon De Rose proposed openstack/keystone: Make user to nonlocal_user a 1:1 relationship  https://review.openstack.org/40994615:37
dstanekthe specs will be the roadmap to that vision15:37
lbragstadayoung what exactly is the problem with defining a set of roles - this was the spec dolphm and jamielennox proposed15:37
lbragstaddstanek ++15:37
dstanekI just want to understand the vision15:37
lbragstaddstanek right now I can't see what that is15:37
ayoungdstanek, it feels like we need a follow on spec, then, to capture these kinds of ideas15:37
dstanekYeah, I've been capturing notes, but maybe in the policy meeting we can flesh it out more15:38
ayoung++15:38
ayoungdstanek, one big thing that edmondsw and I hashed out last week was defaults15:38
ayoungif we say that the default role for an operation is Member, without having to define each and every operation, it is a huge step forward15:39
ayoungthen you can limit yourself to defining new api_roles only for the ones you want to deviate from the norm: those that require elevated, or those that you could grant to a read-only delegate15:40
*** stingaci has joined #openstack-keystone15:40
dstanekSure, that makes sense15:42
dstanekDoc in here... Be back in a few15:42
*** links has quit IRC15:42
*** stingaci has quit IRC15:44
*** adrian_otto has joined #openstack-keystone15:48
*** adrian_otto1 has quit IRC15:49
rderoserodrigods: yeah, working on it15:50
rderoserodrigods: tough to test this one :)15:51
rodrigodsrderose, :)15:51
rodrigodsyeah...15:51
*** spzala has joined #openstack-keystone15:54
lbragstadayoung outside of the fact that changing things in other projects is hard, was there another reason why introducing the read-only role didn't work?15:54
ayounglbragstad, "other than that Mrs. O'Malley, how are things in Chicago?"15:54
lbragstadayoung is that a no?15:55
*** chris_hultin|AWA is now known as chris_hultin15:56
ayounglbragstad, I hadn't really thought about it, but, as I said before, it is not just hard, it is impossible, as the role you need has top be symnced across projects that we don;'t even know exists15:56
ayoungand tagged on every API15:57
lbragstadtagged on every api?15:57
ayoungSo, I think that if you did that, you might be able to get a Read-only role15:57
*** raildo has joined #openstack-keystone15:57
ayounglbragstad, every single API needs to say: only accept Member role, or accept the readonly role,15:58
openstackgerritMerged openstack/keystone: Revert "API Documentation for user password expires"  https://review.openstack.org/40992315:58
lbragstadby tagged on every api you mean reflected properly in every projects policy.json file15:58
edmondswayoung reading back15:59
ayoungyou guys are making me think.  I need more coffee16:01
lbragstadayoung if we had an approach before that didn't work i want to understand why and document it16:02
dstanekayoung: lol16:04
*** rcernin has quit IRC16:04
*** daemontool has joined #openstack-keystone16:07
edmondswayoung note that I didn't suggest the default be member (since remember there isn't necessarily a member role in deployments), but rather that the default be to allow any role (i.e. fall back on policy)16:07
rodrigodsrderose, for similar cases when you are reviewing: https://github.com/rodrigods/bug-fix-checker :)16:07
lbragstadedmondsw because that would still allow the policy.json file to do the rbac check16:07
edmondswlbragstad yes16:08
lbragstadedmondsw do you ever have a case where the role check won't be reflective of the scope check?16:08
edmondswlbragstad, not sure what you mean16:09
*** pcaruana has quit IRC16:09
lbragstadedmondsw like a true admin or owner rule16:09
ayoungedmondsw, noted.  And I agree.  However, we do also need to have something that we publish in a document or in code that gives the default setup, and the term Member has been used thus far.16:11
lbragstadedmondsw for example, if I have a user that has some non-admin role on a project and I'm able to create things. The check for those resources is admin_or_owner, .16:11
*** jaosorior has quit IRC16:12
edmondswlbragstad I think so. I'm looking for one16:12
*** jaosorior has joined #openstack-keystone16:13
openstackgerritRon De Rose proposed openstack/keystone: Make user to nonlocal_user a 1:1 relationship  https://review.openstack.org/40994616:14
edmondswlbragstad, so if I understand you correctly, an example would be nova's os-keypairs API... I want to set policy to allow admin or project_manager to view all keypairs but have a same-user scope check for other roles16:15
lbragstadedmondsw right16:15
edmondswlbragstad, I'm not sure if nova will allow that today or has hardcoded some things around admin... was just starting to work on this16:15
lbragstadedmondsw right - it might not be possible today16:15
lbragstadedmondsw but our existing "owner" check is simply a "does this user have a role on this project" check16:16
lbragstadedmondsw and not a true ownership check16:16
lbragstadedmondsw but I assume we do have cases where a check like that would be useful16:16
*** Ephur has joined #openstack-keystone16:16
*** tqtran has joined #openstack-keystone16:17
lbragstadedmondsw as the owner of the resource I want to be able to do things to it, but i also want the admin (or the domain_admin etc..) to be able to access it16:17
edmondswlbragstad the nova default for os-keypairs doesn't use admin_or_owner16:17
edmondswit checks the user id16:17
edmondswif not admin16:17
rderoserodrigods: got it: https://review.openstack.org/40994616:18
openstackgerritMerged openstack/keystone: API Documentation for user password expires  https://review.openstack.org/40993616:18
rderoserodrigods: thanks again16:18
lbragstadedmondsw so - what would happen if nova used keystonemiddleware with the RBAC check enabled?16:18
lbragstadedmondsw would it fail before the user check happens?16:18
lbragstads/user check/user id check/16:18
edmondswlbragstad, you'd need to configure the middleware to allow all roles for os-keypairs in order for the nova default policy to work16:19
edmondswso you're just passing the buck to policy in that case16:19
lbragstadedmondsw got it16:19
edmondswand policy will work as it does today16:19
lbragstadedmondsw sure - but would that be the defacto standard for all checks like that?16:20
edmondswyeah, I think any of those more complicated checks would just have to set the middleware to allow all roles16:20
lbragstadbarbican would have usecases that fit into that model, too16:20
edmondswforunately most policy checks aren't like that16:21
*** tqtran has quit IRC16:21
lbragstadedmondsw it would be nice if they were16:21
*** Ephur has quit IRC16:21
edmondswlbragstad if they were, this spec would be pointless16:22
lbragstadedmondsw regardless of the spec16:22
edmondswwhy would it be ice?16:22
edmondswnice?16:22
lbragstadedmondsw wouldn't that type of granularity in checks be useful?16:23
edmondswyou CAN change things from the defaults if you need more granularity, but most of the time that's just not needed16:23
lbragstadyou'd be able to have access to whatever based on who you are, but an admin still has the ability to do things to those resources16:23
dstanekSo is the point of the spec to shortcut policy sometimes?16:24
edmondswmost of the time the decision is thumbs up or down based on role assignment + project16:24
-openstackstatus- NOTICE: Launchpad SSO is not currently working, so logins to our services like review.openstack.org and wiki.openstack.org are failing; the admins at Canonical are looking into the issue but there is no estimated time for a fix yet.16:24
*** ChanServ changes topic to "Launchpad SSO is not currently working, so logins to our services like review.openstack.org and wiki.openstack.org are failing; the admins at Canonical are looking into the issue but there is no estimated time for a fix yet."16:24
lbragstadedmondsw well - that's because the current solution doesn't provide a way to do it otherwise, right?16:24
edmondswno, it does... but what else would you typically want to look at?16:25
edmondswdstanek, essentially16:25
lbragstadedmondsw what if there were other things about a user that i wanted to roll into my checks?16:26
lbragstadedmondsw like attributes from a SAML assertion or something like that16:26
edmondswlbragstad, you could do that today IFF the service exposing the API passed that information to oslo_context.16:27
edmondswlbragstad though I don't think any are probably passing SAML assertion info today16:27
edmondswit is all over the place what is or is not passed to oslo_context, which is one of the things that makes it very difficult to modify policy16:28
*** jaosorior has quit IRC16:28
edmondswayoung is tackling policy from a keystone perspective. I've been more tackling things from the other side and trying to push changes in nova, cinder, etc. Both may be needed16:29
lbragstadedmondsw sure - i understand that16:30
lbragstadedmondsw again - i'm looking at this as if it were possible, would it be used a lot16:30
ayounglbragstad, so...admin_or_owner means two different things in different projects16:30
ayoungowner is either "I'm on the project" or "my userid matches the resource"16:30
ayoungin the first case,   it is a check of project_id, the second of user_id16:31
lbragstadayoung sure16:31
ayoungKeystone means it as user_id16:31
edmondswayoung, yeah, that's one of those unfortunate things where inconsistency causes confusion16:31
ayoungnova means it as project id16:31
ayoungso, in the case of Keystone, we would use the 'None' option for those URLs, and just let policy decide16:31
ayoungfor Nova, we would set the default ot Member, unless you are edmondsw in which case you use "thingamambob"16:32
ayoungor wasit doohickey?16:32
ayoungI forget16:32
lbragstadayoung in the keystone case, we'd let the RBAC check fall through to the policy.json check16:32
edmondswayoung you'd set the default to ""16:32
ayounglbragstad, right16:32
ayoungedmondsw, nah, for Nova.  You want it to "deployer" I think is what you had, right?16:32
ayoungthings that are "owner" in Nova should be the base level "Here is what we expect most users to be able to do"16:33
lbragstadedmondsw if you set it to "" wouldn't that still just fall through?16:33
ayoungthere is no ""16:33
ayoungThere is None16:33
ayoungin my spec16:33
ayoungif it is a valid string, it has to match a role16:33
lbragstadsure - None or ""16:34
ayounglbragstad, "" will error16:34
lbragstadregardless - you're letting the check fall through, right?16:34
ayoungYers16:35
ayoungYep16:35
ayoungWTF just happend to gerrit signin?16:36
ayoung"Provider is not supported, or was incorrectly entered."16:36
lbragstadayoung launchpad SSO is currently broken16:36
ayoungrapture16:37
ayounghttp://docs-draft.openstack.org/24/391624/21/check/gate-keystone-specs-docs-ubuntu-xenial/258e8d3//doc/build/html/specs/keystone/ongoing/role-check-from-middleware.html#object-schema16:38
ayounglooks like I lost the sub-heading I had for these types of rules...16:39
ayounghttp://docs-draft.openstack.org/24/391624/21/check/gate-keystone-specs-docs-ubuntu-xenial/258e8d3//doc/build/html/specs/keystone/ongoing/role-check-from-middleware.html#api-role16:39
ayounglbragstad, so under ^^ there is the line16:39
ayoung"If there are no api_role entities definied for an api entity, the result will have a special value of None for the roles will indicate that the no Role is required, and that the entire token role check can be skipped."16:39
ayoung{ "service": "identity", "pattern": "/v", "verb": "GET" role: None}  for discover for example16:40
lbragstadok16:40
*** aselius has joined #openstack-keystone16:40
ayoungwe'll need to use lines like that for the unscoped operations16:40
lbragstadbut well also need to use them whenever an operation requires a check of the user attributes16:41
ayounglbragstad, only if we want to bypass the role check16:41
lbragstadlike nova's api key example16:41
lbragstador keystone admin_or_owner check16:41
ayounglbragstad, are api keys scoped to a project?16:41
lbragstadayoung edmondsw just confirmed that nova checks the user's id if they aren't admin16:42
ayounglbragstad, we can make liberal use of them to start.  RBAC "tightens up" access, so it won't make things more permissive than they were before16:42
ayoungthe minimun effect is "no change" or "denial"16:42
lbragstador if barbican wanted to implemented some sort of admin_or_owner check similar to what keystone has, or what nova has16:43
*** chlong has joined #openstack-keystone16:46
ayounghttps://paste.fedoraproject.org/505835/48164759/16:46
ayoung"admin_or_owner": "rule:global_admin or project_id:%(project_id)s"16:47
edmondswayoung right... but see the os-keypairs rules16:49
*** asettle__ has joined #openstack-keystone16:49
ayoungedmondsw, right.  And those are actually a mistake.16:50
edmondswayoung a mistake?16:50
ayoungI can't createa vm and then add your key to that VM, so you can log in16:50
lbragstadhttps://github.com/openstack/nova/blob/master/nova/policies/keypairs.py#L25-L4416:50
ayoungedmondsw, the way that keys are managed in Nova assumes that only the holder of the private key ever wants to stick them in a VM16:50
ayoungwhich is not actually the case16:50
edmondswayoung, yeah, that makes sense... I can open a bug and submit a patch for that and we'll see what nova says16:51
edmondswI have a feeling they'll argue (they usually do), but I'd agree with you16:51
ayoungedmondsw, go for it.  There are closer windmills for me to tilt at first16:51
edmondswI've been submitting some other nova policy changes lately, and getting some traction, so maybe I've built up enough good will :)16:52
ayounghttp://www.alonzoquixano.com/wp-content/uploads/2014/12/dq.jpg16:52
lbragstadbut that's only for showing api keys16:52
lbragstadI wouldn't want someone on the project to delete my api key, i'd still want to have my user id checked in that case16:52
edmondswlbragstad true... ayoung, that would only be to view them... the update/delete would still have to check user_id16:52
ayoungwhy?16:53
edmondswseriously?16:53
lbragstadayoung if we are on the same project i don't want you to be able to delete my api key16:53
*** asettle has quit IRC16:53
ayoungbecause the api key should be in the Keystone database16:53
lbragstadI want to manage my own keys16:53
edmondswworse, I don't want you to be able to replace it with one that you have the private key for16:53
ayoungand there it is managed by you, and then on Nova it is a mapping from user to project based on your role assignments16:53
ayoungI've long thought about this, but have no stomach for the fight16:54
edmondswayoung I didn't follow that16:54
lbragstadme either16:54
ayoungOK... a user should have a key as a credential in Keystone.16:56
ayoungwhen a user joins a project, they can add that key to the project16:56
ayoungwhen a user creates a vm in a project, they should be able to include any keys that are part of that project16:56
ayoungso, yeah, I should not be able to redefine the "lbrastad" key16:57
ayoungbut I should be able to read it16:57
ayoungand an admin should be able to remove it from the project16:57
lbragstadayoung right - i think we agree on that16:57
ayoungor add an additional one from Keystone16:57
ayoungso, yeah, there are going to be a bunch of funky APIs out there16:57
ayoungthe best we can do is provide a means for the RBAC check to get out of the way of them and let them continue to process as is16:58
ayoungthe Key API is a great example of stuff that should add the member role onto the policy16:58
ayoungleave the user check in place, as that is what Nova wants16:58
ayoungregardless of what we thinkg16:58
ayoungbut only a member should be able to add a key to a proejct16:58
ayoungor remove one16:58
ayoungeven if that is their own key16:58
edmondsws/only a member/anyone/16:59
ayoungthe way the policy is written right now, there is no way to make a reader role that could check the key16:59
ayoungno, only a member16:59
edmondsw?16:59
ayoungedmondsw, if I have a user with an auditor role, they should not be able to create or delete keys16:59
ayoungeven with their own userid16:59
*** rcernin has joined #openstack-keystone17:00
edmondswayoung, sure, you're drawing a distinction between the default (anyone, because auditor role doesn't exist by default) and what someone might do in practice17:00
ayoungyes17:00
*** ChanServ changes topic to "Meeting Agenda: https://etherpad.openstack.org/p/keystone-weekly-meeting | Ocata goals: https://docs.google.com/spreadsheets/d/156q820cXcEc8Y9YWQgoc_hyOm3AZ2jtMQM3zdDhwGFU/edit?usp=sharing"17:01
-openstackstatus- NOTICE: Canonical admins have resolved the issue with login.launchpad.net, so authentication should be restored now.17:01
ayoungI am also draw a distinction between what is possible to do now and what we can add with an external layer, without touching the policy files, and breaking the existing checks17:01
*** asettle__ is now known as asettle17:01
dstanekayoung: a agree that we don't to break anyone, but as we imagine what should be implemented i don't want to be burdoned by that17:02
dstanekwe can throw out the parts of our grand scheme that won't work later. as well as provide a transition to the parts that will17:02
dstanekusing nova is great for driving usecases, but i'd like to not be hindered by it when defining the vision17:03
ayoungdstanek, you could put in a default that says 'for all APIS, skip the RBAC check" and things will work exactly as they do now, no check17:03
ayoungyou could then add,. one by one, explicit checks for some APIs that you want to have a lower role than Member...the read only cases17:04
ayoungbut those would still slip by on the None rules17:04
dstanekso, in our future state we want distributed role checks (via middleware), localized policy checks (via keystone) and distributed policy checks (via oslo.policy) for each service request.... is that accurate?17:05
ayoungSo you need a decent default, and then identify the exceptions to it17:05
*** waj334 has joined #openstack-keystone17:06
ayoungdstanek, I am not sure I agree with " localized policy checks (via keystone)" unless you are really referring to the " distributed role checks (via middleware)"17:06
waj334https://etherpad.openstack.org/p/d7afjZnl6Y17:06
ayoungkeystone should not be different than the other services for this17:06
*** htruta` is now known as htruta17:07
*** mvk has quit IRC17:07
dstanekayoung: from what i gathered so far a request to nova will first have a role check in middleware, then a possible call to keystone for policy and then a fall thru to oslo.policy on the service17:07
ayoungthe " possible call to keystone for policy" no longer exists17:08
ayoungit was either/or with the role-check in middleware17:08
ayoungand we scrapped it17:08
lbragstadayoung but the middleware has to get the roles of an operation17:08
dstanekso the middleware will grab the policy rules from keystone?17:08
edmondswI've gotta grab something to eat...17:08
ayoungValidate a token from Keystone, RBAC check in middleware, policy check from service specific code17:08
ayounglbragstad, dstanek the call to keystone is to grab the api_roles for the RBAC check17:09
dstanekayoung: so the future of policy is to keep the policy files around more or less as-is?17:09
ayoungso no check happens in Keystone at that time, except perhaps to say that the remote services is allowed to grab the api_roles file17:09
lbragstadayoung the RBAC check you're referring to is comparing the roles included in the token validation response to the roles required for an operation17:09
ayoungdstanek, yes17:09
ayounglbragstad, yes17:10
waj334Sorry for the random etherpad link, but I just need some insight on this authentication issue I'm having17:10
lbragstadayoung so the "possible call to keystone for policy" does exist17:11
lbragstadit's the RBAC middleware check17:11
lbragstadspecifically, part of the RBAC middleware check17:11
openstackgerritRichard Avelar proposed openstack/keystone: Add id to conflict error if caused by duplicate id  https://review.openstack.org/40901017:11
ayounglbragstad, let me rewrite what dstanek put to correct it:17:11
dstanekayoung: so what's the short, short reason to add role checks to middleware at all if they are likely also in policy? just to trim down the policy files for the defaults?17:12
ayoung a request to nova will first, in middleware, validate the token, then fetch the RBAC rules from Keysonte, and then perform a role check.  After that, it will pass controll to the Nova service which will perform a policy check17:13
ayoungdstanek, so, adding them to policy is really hard17:13
ayoungnova, today, has embedded the policy into code17:13
ayoungand making them consistant across all of the services is really problematic17:13
ayoungso, I don't forsee there being any expansion of the current Role checks in policy17:14
dstaneki think you've hightlighed another problem with URLs. a policy writer (maybe even a domain admin) will have to now policy targets (operations), but also URLs17:14
ayoungdstanek, except that the domain admin/policy writer will not do anything with the underlying policy files17:15
ayoungthey will *only* work with the URLs17:15
*** asettle has quit IRC17:15
ayoungand those can be tested17:15
dstanekin the discussions that led up to the CP meeting for policy i heard more of a need for change. better way to deploy, maybe a better policy language, etc.17:15
ayoungexternal of any tool, a user can always tell what URL they are calling17:15
ayoungthe same is not true of policy files17:15
ayoungdstanek, think of policy as SELinux.17:15
ayoungI'm trying to add the Unix file system permissions on top of that17:16
ayoungand prevent people from having to mess with SELinux policy17:16
* dstanek thinks ayoung uses curl too much. dstanek has no idea what URL is being used when interacting with OpenStack17:16
ayoungdstanek, you can always see the URL when you use the CLI and pass --debug17:16
dstanekayoung: but i don't need to. or at least never have in the past.17:16
ayoungyou could see it using wireshark17:16
dstanekit's an implementation detail that i shouldn't care about17:17
ayoungdstanek, have you ever had to set up an autonomous service to perform an operation for you in an openstack deployment?17:17
ayoungspecificaloly, in one in which you have an admin role17:17
ayoung?17:17
dstanekyou mean have a thing that interacts with a cloud as an admin?17:18
ayoungdstanek, that too17:19
dstaneksure.17:20
*** markvoelker has quit IRC17:20
ayoungdstanek, if you want to do some operation against a service, something you don't know anything about, like, say Trove or Sahara (just guessing, sorry if you know these) how do you know what permissions you need to perform that operation?17:20
ayoungToday, you don't17:20
ayoungI mean, yeah, you could go crawl the code, and you and I are familiar enough that we could probably find out the defaults17:21
ayoungbut there is no way for a deployer to advertise "we'ver changed from Member to Performer" for this17:21
ayoungor DBA17:21
ayoungor Hadooper17:21
ayoungand thus you need to create a token as admin, as that is all you know17:21
*** markvoelker has joined #openstack-keystone17:22
ayoungnow, ideally you could at least create a trust with just "Member" on it and use that token17:22
ayoungand if you have to set up some autonomys system, the same is true:17:22
ayoungit creates a trust with a subset of your roles17:22
ayoungbut...none of the information needed to make that happen is available to the end user17:23
dstanekayoung: in my ideal world i'd as what a token can do and get back a list like ['instance:create', 'instance:delete', ...]17:23
ayoungso, as an admin, you end up exposing the complete set of control in your cloud to every service17:23
ayoungdstanek, so, we are back to resource level roles. We can absolutelty head toward that17:23
ayoungso what we need is a way to say that "Member implies instance:delete"17:24
ayoungwe have that with implied roles17:24
dstanekayoung: why can't this work for any roles?17:24
ayoungdstanek, it can17:24
ayoungit is just a UI issue17:24
*** rcernin has quit IRC17:24
ayoungwhen adding a user to a proejct in a webui, or on the CLI, you want to have a reasonable list to pick from17:24
ayoungnot every single API in the the catalog17:24
ayoungbad UX17:24
dstaneki'd also what to query with what 'instance:*' stuff can i do with this token17:25
ayoungdstanek, and that is why implied roles were so important.17:25
ayounghint hint https://review.openstack.org/#/c/290253/17:25
ayoungdstanek, So, with implied roles, and the api_role mechanism, we can get that information17:26
ayoungyes. it will be URL based, not policy based, but the URLs are what is documented in the api-refs17:26
dstanekayoung: that why i was thinking that policy should be centrally administered even if it is enfoced by each service17:26
ayounghttp://developer.openstack.org/api-guide/quick-start/index.html17:26
ayoungdstanek, even if that were the case, I would advocate splitting RBAC from the rest of it.17:27
ayoungpolicy is too easy to break17:27
ayoungit is a floor below which we should not pass17:27
ayoungRBAC is a ceiling.17:27
dstanekayoung: and that's OK....i just want all of this documented in a way that doesn't tie us to the current implementations17:28
dstanekwe can debate the particulars after everyone has a shared vision17:28
ayoungdstanek, cool.  I think we are on track17:28
ayoungdstanek, just do not underestimate the inertia in the rest of openstack17:29
dstanekayoung: i hope so :-) i'm just trying to understand where you want us to go17:29
ayoungespecially the momentum of Nova.17:29
dstanekayoung: that's why we have to be quick with our assessment17:29
ayoungdstanek, agreed.  And that is why I've been such a noodge with this spec17:30
ayoungdstanek, do you understand the design constraints I've been trying to dance within?17:30
dstanekayoung: yeah, sorta. i'm just looking to see the solution without those constraints17:31
dstanekif i had a brand new thing what would it look like17:31
ayoungdstanek, good question.  But I think it would almost have to look like this spec.17:32
ayoungThis spec does scoped RBAC17:32
ayoungif you wanted to do unscoped RBAC, that would work fine this way as well17:32
ayoungand, if you needed an additional role check once you got an object out of the database that would work too17:32
ayoungthose are both subsets of the scoped rbac approach17:33
dstanekwhen you say scoped rbac what do you mean?17:33
ayoungdstanek, so NIST rbac does not have anythign like out projects17:33
ayoungthe roles are global17:34
ayoungthe RBAC we are doing in Keystone means that the role name itself is not the whole access attribute17:34
ayounginstead it is the tuple of role, projectid17:34
ayoungor domain id...17:34
dstanekright... ok, gotcha17:35
ayoungcool17:35
dstanekis that a standard term?17:35
ayoungso, if and access control has to be done based on the objects out of the database, you have to fetch the object first.17:35
*** rcernin has joined #openstack-keystone17:35
*** rcernin has quit IRC17:35
ayoungdstanek, scoped RBAC?  No it is not a standard term17:35
ayoungit was a term that emerged out of discussions about NIST RBAC17:36
ayoungthe thing about RBAC is that is assumes the scope is "for this application" or "for this organization"17:36
ayoungso the scoping is implicit17:36
dstanekwill any of this get us closer to allowing a domain admin to create their own roles?17:36
ayoungbut cloud means scale, and we need a repeatable pattern17:36
ayoungdstanek, domain_specific roles are already a reality17:36
ayoungbut those roles cannot directly be used to perform access control17:37
ayounginstead, they need to map to a global role17:37
ayoungand, if we add on this spec, the gloval role then maps to an api_role object which is what provides access17:38
dstanekayoung: that's what i mean i thought we wanted more flexibiltiy there17:38
ayoungso, with this approach, here is how it would go17:38
ayoungsay a domain admin needs a role that can only perform a single op17:38
ayoungsay, reboot_server17:38
ayoungthey find the API they need to execute, and see that, today it has only the Member role in the api_role table17:39
ayoungso they ask the admin to create a new role, called rebootvm and have Member imply that role17:39
ayoungif a cloud admin makes that change, and then changes the api_role such that it requires rebootvm instead of Member, nothing breaks17:39
ayoungnow, the domain admin can create a domain specific role, or they can use the global role, whichever they prefer, for rebootvm17:40
ayoungin essence, a domain specific role is only as powerful as the granularity of the global roles17:40
ayoungwhich means, at the extreme, we have one role per api17:40
ayoungwhen we start heading there, we need a way to better list the roles.17:41
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476917:43
openstackgerritRodrigo Duarte proposed openstack/keystone: Settings for test cases  https://review.openstack.org/41020517:43
ayoungdstanek, so, one thing we could do in Keystone is, when we have a an entry like this: http://git.openstack.org/cgit/openstack/keystone/tree/keystone/assignment/routers.py#n114  we could put in the expected role there17:44
knikollarodrigods: great work!17:46
rodrigodsknikolla, let's hope it works17:47
dstanekayoung: i need to reflect on this a little :)17:47
knikollarodrigods: let's hope. patchset 24 passed, but it had skipped the saml2ecpfederation tests17:50
rodrigodsknikolla, yeah17:50
rodrigodsit wasn't setting the tempest configs17:50
lbragstadayoung wouldn't that require redeploying policy files, too?17:52
dstanekayoung: in your experience does any non-service developer use the api-ref? i use it for keystone, but i work on keystone. i don't use it when interactive with nova or other services17:53
knikolladstanek: i have it bookmarked and consult it very often for cinder/glance, which i don't work on.17:55
dstanekknikolla: why?17:56
*** chrisplo has joined #openstack-keystone17:57
knikolladstanek: i maintain a proxy that does k2k between services.17:58
*** henrynash has joined #openstack-keystone17:59
*** ChanServ sets mode: +v henrynash17:59
stevemarmeeting time!17:59
dstanekknikolla: that's a very specific developer case. not the case of someone just using nova right?18:00
lbragstaddstanek i would think so18:00
knikolladstanek: true. outside of that specific use case, i've found the python clients to be enough for 99% of purposes.18:01
knikollathat 1% has been using keystone with an unscoped token for changing a user password. the client doesn't play nicely with unscoped tokens there.18:02
ayoungedmondsw, wannt to join #openstack-meeting?18:04
edmondswayoung sure, just walked back into the office18:04
*** henrynash has quit IRC18:06
*** tqtran has joined #openstack-keystone18:06
*** henrynash has joined #openstack-keystone18:06
*** ChanServ sets mode: +v henrynash18:06
dstanekknikolla: that's what i expected18:07
*** daemontool has quit IRC18:08
*** stingaci has joined #openstack-keystone18:10
*** asettle has joined #openstack-keystone18:14
*** stingaci has quit IRC18:14
*** ravelar has quit IRC18:19
*** spilla has joined #openstack-keystone18:20
*** pnavarro has quit IRC18:21
*** edtubill has quit IRC18:21
*** stingaci has joined #openstack-keystone18:34
*** henrynash has quit IRC18:36
*** henrynash has joined #openstack-keystone18:36
*** ChanServ sets mode: +v henrynash18:36
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476918:37
openstackgerritRodrigo Duarte proposed openstack/keystone: Settings for test cases  https://review.openstack.org/41020518:37
*** henrynash has quit IRC18:40
*** henrynash has joined #openstack-keystone18:41
*** ChanServ sets mode: +v henrynash18:41
*** ravelar has joined #openstack-keystone18:48
openstackgerritRodrigo Duarte proposed openstack/keystone: Do not manually remove /etc/shibboleth2 folder  https://review.openstack.org/41035618:48
openstackgerritRodrigo Duarte proposed openstack/keystone: Do not manually remove /etc/shibboleth folder  https://review.openstack.org/41035618:49
*** ravelar has quit IRC18:51
*** itisha has joined #openstack-keystone18:55
stevemarrderose: want to chat about the idp:domain stuff?19:00
ayoungstevemar, care to re-add your +2 to https://review.openstack.org/#/c/391624/ as I didn't want to presume19:00
stevemarayoung: added19:01
*** narasimha_SV has quit IRC19:01
stevemarayoung: i'm open to keeping it alive for the rest of the week and merging it regardless on friday19:01
*** henrynash has quit IRC19:01
stevemarayoung: you can work on the impl assuming it's approved19:01
ayoungstevemar, I'd rather have it approved with the understanding that we will accept edits19:02
ayoungdstanek, and lbragstad should -2 it now it they want to hold it.19:02
stevemarayoung: right, was just going to say19:02
stevemarayoung: give them til EOD to -2 it, otherwise (even if they -1 it) i'll punch it through19:03
stevemardstanek: lbragstad -- speak now or forever hold your peace19:03
lbragstadstevemar in a meeting19:03
ayoungstevemar, TYVM.  I'll hold off on any more edits19:03
stevemarlbragstad: rgr that19:04
stevemarayoung: np19:04
*** asettle has quit IRC19:08
*** rcernin has joined #openstack-keystone19:14
dstanekedmondsw: lb: https://etherpad.openstack.org/p/keystone-policy-usecases19:22
*** henrynash has joined #openstack-keystone19:25
*** ChanServ sets mode: +v henrynash19:25
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476919:26
openstackgerritRodrigo Duarte proposed openstack/keystone: Settings for test cases  https://review.openstack.org/41020519:26
*** stingaci has quit IRC19:28
*** stingaci has joined #openstack-keystone19:29
*** henrynash has quit IRC19:30
*** diazjf has joined #openstack-keystone19:31
ayoungdstanek, http://kubernetes.io/docs/admin/authorization/  looking at what Kubernetes does for comparison.  Looks like they map it per URL19:36
ayoungnonResourcePath, type string; matches the non-resource request paths (like /version and /apis). * matches all non-resource requests. /foo/* matches /foo/ and all of its subpaths.19:36
ayoungnot sure if it is any more mature than what openstack does19:36
dstanekstevemar: in a meeting too :-(19:40
*** jaugustine has quit IRC19:46
*** spzala has quit IRC19:57
*** jaugustine has joined #openstack-keystone19:58
openstackgerritSteve Martinelli proposed openstack/keystone: Add id to conflict error if caused by duplicate id  https://review.openstack.org/40901020:00
openstackgerritSteve Martinelli proposed openstack/keystone: Add id to conflict error if caused by duplicate id  https://review.openstack.org/40901020:01
*** tobberydberg has joined #openstack-keystone20:02
*** Zer0Byte__ has joined #openstack-keystone20:08
*** spzala has joined #openstack-keystone20:10
*** amoralej is now known as amoralej|off20:17
*** diazjf has quit IRC20:19
*** ravelar has joined #openstack-keystone20:25
openstackgerritSteve Martinelli proposed openstack/keystone: Refactors _get_names_from_role_assignments  https://review.openstack.org/40807420:32
*** diazjf has joined #openstack-keystone20:39
*** nklenke has quit IRC20:47
*** raildo has quit IRC20:51
*** gyee has joined #openstack-keystone20:52
*** gyee has quit IRC20:52
*** gyee has joined #openstack-keystone20:53
rodrigodsstevemar, tests are passing!21:01
rodrigodsknikolla, ^21:01
rodrigodsdstanek, ayoung ^21:02
rodrigodshttps://review.openstack.org/#/c/324769/21:02
rodrigodssee my last comment for details on why the job is failing21:02
*** spzala_ has joined #openstack-keystone21:09
*** tobberydberg has quit IRC21:11
knikollarodrigods: oh, right, that bug.21:11
rodrigodsknikolla, yeah... so one tests fails to clean up the env and the next one fails because the env is not clean21:12
*** spzala has quit IRC21:12
rodrigodsknikolla, the coolest part is everything working fine against testshib21:13
rodrigodsmetadata registration, included21:14
*** dgonzalez has quit IRC21:14
knikollarodrigods: great work! metadata registration was surprising, as it was only a post call.21:15
knikollai expected more complicated things.21:15
rodrigodsyeah...21:15
knikollarodrigods: do we want a separate job for k2k?21:16
*** chris_hultin is now known as chris_hultin|AWA21:16
rodrigodsknikolla, hmm maybe?21:16
rodrigodsideally we would have separate jobs for different deployments21:16
rodrigodsi want to rename this one to include "federation" on it21:17
knikollarodrigods: separate one would be easier in the mod_shib configuration.21:18
knikollai can probably recycle the k2k-idp part as is from my previous plugin.21:18
knikollathis is looking good for ocata though :)21:19
rodrigodsknikolla, ++21:19
*** asettle has joined #openstack-keystone21:21
morganstevemar: are you good with a simple context manager example for KSA21:28
morganas docs?21:28
*** chlong has quit IRC21:30
*** amoralej|off is now known as amoralej21:36
*** asettle has quit IRC21:39
*** diazjf has quit IRC21:47
openstackgerritRichard Avelar proposed openstack/keystone: Add id to conflict error if caused by duplicate id  https://review.openstack.org/40901021:50
stevemarrodrigods: can you use the same topic for the federated identity work if possible21:57
stevemarfed. identitiy functional tests*21:57
rodrigodsstevemar, ++21:57
stevemarrodrigods: it's hard to find all the related work21:57
rodrigodsstevemar, will update everything21:57
rodrigodsjust a sec21:57
stevemarrodrigods: danke21:58
stevemarrodrigods: and we probably have a blueprint you can reference i would think21:58
*** asettle has joined #openstack-keystone21:58
stevemarmeh, less of a concern21:58
rodrigodsstevemar, https://review.openstack.org/#/q/status:open+branch:master+topic:federated_identity_functional_tests21:59
antwashdolphm : ping?22:00
knikollastevemar, rodrigods: i was using the keystone-functional-testing topic :/22:01
*** amoralej is now known as amoralej|off22:01
*** diazjf has joined #openstack-keystone22:03
*** chris_hultin|AWA is now known as chris_hultin22:08
lbragstadstevemar did you happen to attend this session in barcelona? https://etherpad.openstack.org/p/ocata-xp-unified-capabilities-api22:09
*** asettle has quit IRC22:09
*** spilla has quit IRC22:13
*** chris_hultin is now known as chris_hultin|AWA22:19
lbragstadayoung ^22:21
openstackgerritSamuel Pilla proposed openstack/keystone: Add password expiration queries for PCI-DSS  https://review.openstack.org/40389822:21
openstackgerritRodrigo Duarte proposed openstack/keystone: Federated authentication via ECP functional tests  https://review.openstack.org/32476922:26
openstackgerritRodrigo Duarte proposed openstack/keystone: Settings for test cases  https://review.openstack.org/41020522:26
stevemarrodrigods maybe use the topic knikolla mentioned instead ;)22:27
stevemarlbragstad: looking..22:27
stevemarlbragstad: i did not22:27
*** dgonzalez has joined #openstack-keystone22:27
rodrigodsstevemar, --'22:28
rodrigodsstevemar, let's approve everything!22:28
stevemarrodrigods: maybe not everything :)22:28
*** edmondsw has quit IRC22:28
lbragstadstevemar nova and cinder are both working towards writing capability discovery APIs, and one of the main use cases I'm see is the ability to give nova or cinder a token and say "what can I do?"22:28
lbragstadwhich surely has overlap with the rbac in middleware spec22:29
lbragstadseeing*22:29
rodrigodsknikolla, stevemar https://review.openstack.org/#/q/topic:keystone-functional-testing22:29
*** lamt has quit IRC22:31
*** mvk has joined #openstack-keystone22:32
openstackgerritRichard Avelar proposed openstack/keystone: Add checks for doctor credential symptoms  https://review.openstack.org/40928922:32
*** edmondsw_ has joined #openstack-keystone22:32
*** adriant has joined #openstack-keystone22:32
*** lamt has joined #openstack-keystone22:33
*** gyee has quit IRC22:35
*** edmondsw_ has quit IRC22:37
openstackgerritRichard Avelar proposed openstack/keystone: Add checks for doctor credential symptoms  https://review.openstack.org/40928922:38
*** spzala_ has quit IRC22:40
lbragstadstevemar dstanek ayoung - https://review.openstack.org/#/c/306930/12/specs/newton/discovering-system-capabilities.rst22:40
lbragstadhas anyone been involved with that ^22:40
dstaneknot i22:41
lbragstaddstanek thats a really good write up22:41
ayounglbragstad, let them drive one with it22:41
ayoungIthink it might end up solving part of our problem22:41
dstanekbut i do remember hearing about the concept at a summit22:41
lbragstadayoung i wasn't planning on stopping them from working on it at all22:42
lbragstador shooting down the idea - I'm just finding some of this out from talking to nova developers22:42
ayounglbragstad, nah wasn't impying that,just that they can flesh out the idea and we'll let them. I think they are on the right track, it aligns with what we discussed earlier22:43
lbragstadi'm going to poke in their channel to see if there has been any progress on the policy side, specific to roles - since they define that on line 12222:46
*** jaugustine has quit IRC22:47
*** diazjf has quit IRC22:49
*** adrian_otto has quit IRC22:50
*** henrynash has joined #openstack-keystone22:56
*** ChanServ sets mode: +v henrynash22:56
*** henrynash has quit IRC22:58
ayounglbragstad, https://review.openstack.org/#/c/350310/23:06
ayoungNot since september23:06
ayoungrodrigods, care to do the honors on https://review.openstack.org/#/c/391624/  ?23:09
rodrigodsayoung, not at all, wasn't going to wait until eow?23:17
ayoungrodrigods, nah, end of the day23:18
rodrigodsdone! :)23:18
rodrigodsayoung, have something for you too: https://review.openstack.org/#/c/410356/23:18
rodrigodsa easy one23:18
ayoungrodrigods, done23:21
openstackgerritMerged openstack/keystone-specs: Role Check from Middleware  https://review.openstack.org/39162423:23
*** edmondsw has joined #openstack-keystone23:27
*** edmondsw has quit IRC23:31
*** agrebennikov_ has quit IRC23:32
*** stingaci has quit IRC23:40
*** spzala has joined #openstack-keystone23:40
*** edmondsw has joined #openstack-keystone23:47
rderosestevemar: you still around?23:47
*** chris_hultin|AWA is now known as chris_hultin23:52
*** edmondsw has quit IRC23:52
*** spzala has quit IRC23:54
*** spzala has joined #openstack-keystone23:54

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!