Tuesday, 2021-11-09

redrobot#startmeeting keystone15:00
opendevmeetMeeting started Tue Nov  9 15:00:02 2021 UTC and is due to finish in 60 minutes.  The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
opendevmeetThe meeting name has been set to 'keystone'15:00
redrobot#topic Roll Call15:00
redrobotCourtesy ping for ayoung, bbobrov, crisloma, d34dh0r53, dpar, dstanek, gagehugo, hrybacki, knikolla, lamt, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, spilla, ruan_he, wxy, sonuk, vishakha,Ajay, raildo, rafaelweingartner, xek15:00
d34dh0r53o/15:00
lbragstado/ 15:01
lbragstaddouble booked atm15:01
knikollao/15:01
redrobotYeah, I had a lot of fun sorting out my schedule today.  Thanks, Daylight Savings Time.15:02
redrobot#topic Review Past Meeting Action Items15:02
redrobot#link https://meetings.opendev.org/meetings/keystone/2021/keystone.2021-11-02-15.00.html15:02
redrobotWe didn't have any15:02
redrobot#topic Liaison Updates15:03
redrobotknikolla anything on your radar?15:03
knikollai don't think so15:03
redrobotOK, moving on 15:04
redrobot#topic OAuth 2.015:05
redrobot#link https://review.opendev.org/c/openstack/keystone-specs/+/81315215:05
redrobotThanks for reviewing knikolla.  Still looking for gagehugo and lbragstad reviews15:05
lbragstadack15:09
lbragstadi'm not sure i'll be able to review it15:09
redrobot😔15:10
redrobotYeah, I don't know enough OAuth to give it a proper review15:10
redrobotI'll keep bugging y'all 'til we merge this thing though. 😜15:11
redrobotOK, let's move on15:12
redrobot#topic Secure RBAC15:12
redrobotlbragstad any updates?15:12
lbragstadyep - i spent a bunch of time last week reworking https://review.opendev.org/c/openstack/governance/+/81515815:13
lbragstadi'd love to get some reviews on that 15:13
lbragstadand it is time sensitive since we're in Yoga and that goal is targeted for Yoga15:13
knikollai'm going through it today15:13
lbragstadknikolla thank you 15:13
redrobotI'll try to get to that today as well15:15
redrobot#topic Open Discussion15:17
redrobotAny other topics y'all want to talk about before we look at the mountain 'o bugs?15:17
redrobotOK,moving on15:28
redrobot#topic Bug Review15:29
redrobot#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:29
redrobot#link https://bugs.launchpad.net/keystone/+bug/195032515:29
redrobot> domain list via projects api with domain-scoped token is always empty15:29
redrobotThis one is fresh out the bug factory15:29
lbragstadi'm not sure listing domains with a domain-scoped token is the right thing15:33
lbragstadi think you should have a system-scoped token to do that15:33
knikollahmmm, i think i feel that way too. 15:34
lbragstadthat bug could be a filtering issue15:35
knikollathough should it display the domains that are further down the tree, if the domain scoped token has the admin role on that domain? 15:35
lbragstadwhere it's getting a list of domains and then trying to filter out the domains outside of context15:35
lbragstadknikolla i don't think you can have nested domains15:35
lbragstaddomains are top-level project trees15:35
knikollaah okay. i misremembered. 15:36
redrobot> you should have a system-scoped token <  - I kind of think so too15:36
redrobotseems like the correct response should be a 403 - Forbidden?15:36
lbragstadwell - i could see if i listed domains using a domain-scoped token, i could get back the domain i have a token to 15:37
lbragstadso - a list of one 15:38
lbragstador maybe a list of the domains i have a role assignment on?15:38
lbragstadi'm not sure which would be the right response 15:38
lbragstadthat's typically covered by the /v3/auth/domains API15:38
knikollaDo you get any domains when you list for projects? with the appropriate system level scope? or just projects? 15:38
lbragstadi'm not sure - i haven't tried15:39
lbragstadredeploying an environment now and I'll try 15:40
knikollai don't think i'm leaning on a 40x type response, because you're putting a filter on an action that you have permission to perform. 15:41
lbragstadyeah 15:41
lbragstadi think returning an empty list is appropriate and I thought there was a guideline about that somewhere?15:41
lbragstadmaybe in the API working group?15:41
knikollaand it's either a list of 1, with the scoped domain being returned. or a list of 0, because while the token is scoped to that domain, you may not have permission to query it? (which we should check if it's the case)15:42
lbragstadhttps://specs.openstack.org/openstack/api-wg/guidelines/pagination_filter_sort.html#filtering15:42
knikollaalso it would be, hmmm, weird if the non-filtered /projects query doesn't return the current domain, but the filtered version does. 15:43
lbragstadright15:43
lbragstadi think if you list projects with a project-scoped token, you get the project your token is scoped to15:44
lbragstadyeah -  listing projects with a project-scoped tokens only gives you the projects you have access to15:52
lbragstadit doesn't give you a full list15:52
redrobotis_domain is a valid filter key?15:52
lbragstadyeah 15:53
redrobotso /v3/projects?is_domain=true should return the domains you have access to, you think?15:53
lbragstadhttps://docs.openstack.org/api-ref/identity/v3/index.html?expanded=list-projects-detail15:53
lbragstadsure?15:54
lbragstadthe /v3/domains api does that i think15:54
lbragstadand so does /v3/auth/domains15:54
knikollaif the domain is included in the /projects query without the filter, yes. 15:54
knikollaaka being incorrectly filtered out with the is_domain filter present. 15:55
redrobot> If this is specified as true, then only projects acting as a domain are included. Otherwise, only projects that are not acting as a domain are included. <15:55
lbragstadhttps://paste.opendev.org/show/810880/15:56
knikollaoh, interesting15:56
knikollathat's a weird filter15:56
redrobotsounds like GET /v3/projects?is_domain=true should be the same as GET /v3/domains15:57
knikolla^ yes15:57
lbragstadwell - this seems wrong 15:57
lbragstadhttps://paste.opendev.org/show/810881/15:57
lbragstadthat user doesn't have a role assignment on the foo domain15:58
knikollayeah, that shouldn't appear there15:58
redrobotAlmost out of time15:59
redrobotbut this does sound like a valid bug15:59
lbragstadi think there are probably workarounds for it though16:00
lbragstadlike using the domains API - but those would be patches to terraform16:00
redrobotI'm going to leave a comment on the bug pointing to this discussion16:01
redrobotwe can revisit next week16:01
redrobotThat's all the time we have this week16:01
redrobotThanks for joining, y'all!16:01
redrobot#endmeeting 16:02
opendevmeetMeeting ended Tue Nov  9 16:02:20 2021 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:02
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2021/keystone.2021-11-09-15.00.html16:02
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2021/keystone.2021-11-09-15.00.txt16:02
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2021/keystone.2021-11-09-15.00.log.html16:02
prometheanfireso..., does anyone mind taking a look at keystone failures with the new olso.policy-3.10.0 ?  https://review.opendev.org/81582019:09

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!