Wednesday, 2024-01-17

*** mhen_ is now known as mhen02:33
*** blarnath is now known as d34dh0r5314:56
d34dh0r53#startmeeting keystone15:00
opendevmeetMeeting started Wed Jan 17 15:00:53 2024 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
opendevmeetThe meeting name has been set to 'keystone'15:00
d34dh0r53#topic roll call15:01
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla[m], lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], mharley,jph15:01
d34dh0r53o/15:01
dmendiza[m]🙋15:01
d34dh0r53#topic liaison updates15:03
d34dh0r53nothing from VMT nor Release Management15:03
d34dh0r53#topic review past meeting work items15:04
d34dh0r53#link https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-01-10-15.01.html15:04
d34dh0r53no updates, still a WIP to add these sections to the docs15:05
d34dh0r53#action d34dh0r53 Look into adding/restoring a known issues section to our documentation15:05
d34dh0r53#action d34dh0r53 add https://bugs.launchpad.net/keystone/+bug/1305950 to the known issues section of our documentation15:05
d34dh0r53#topic specification OAuth 2.0 (hiromu)15:05
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:06
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:06
d34dh0r53External OAuth 2.0 Specification15:06
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/86155415:06
d34dh0r53OAuth 2.0 Implementation15:06
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls15:06
d34dh0r53OAuth 2.0 Documentation15:06
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/83810815:06
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/83810415:06
d34dh0r53looks like hiromu isn't around today15:08
d34dh0r53moving on15:08
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:08
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:08
d34dh0r532024.1 Release Timeline15:08
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:09
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/90273015:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/90371315:09
dmendiza[m]Still loking for reviews on the Phase 1 patch: ^^^^15:09
dmendiza[m]Working on the tempest test changes, but it's a bit messy since I have to reorganize some large classes. 😒15:09
d34dh0r53I'll review the phase 1 patch today, on my list of ToDo's15:10
dmendiza[m]thanks d34dh0r53 15:10
d34dh0r53np15:12
d34dh0r53next up15:12
d34dh0r53#topic specification Add schema version and support to "domain" attribute in mapping rules (gtema)15:12
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/748042 (merged)15:12
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/73996615:12
gtemapls reviews15:13
d34dh0r53ack, I'll add that to my list15:13
gtemawe are ready for next steps and need that change to be processed15:13
d34dh0r53thanks gtema 15:13
d34dh0r53#topic open discussion15:15
d34dh0r53I don't have anything15:15
bbobrovi have15:16
bbobrovi would like to talk about project tags and access to them by various actors. Today project tags are there for project admins. They can change them, via a separate API or via a project update API.15:17
bbobrovWe would like to have project tags, that would be writeable only by "system admins". It will allow our system admins to enable certain features for projects based on existence (or nonexistence) of the tags.15:17
bbobrovthe tags are also company-specific and probably should not be done by adding new resource options15:18
bbobrovwould adding tag prefixes or tag namespaces be an option?15:19
bbobrovwould this change be even in scope of keystone, or should it rather be implemented elsewhere?15:19
gtematags are not only writable by admins - there are clouds where domain admins can manage project tags15:21
bbobrovyes, that is true. But i would like to designate certain tags to be writeable only by system admins.15:22
d34dh0r53ahh, I see, a permissions flag for certain tags15:22
d34dh0r53dmendiza[m]: would this be possible with a custom policy?15:25
dmendiza[m]Hmm...  it would be tough to do, I think ...  the policy engine works on an endpoint (URL) and can possibly use metadata about the object to make a decision.15:27
dmendiza[m]Not sure what could be done in a tag to differentiate it from other tags15:28
bbobrovthey only way to do it via policies is to delegate the decision to a remote server (via http: rule)15:28
d34dh0r53hmm, ok15:29
bbobrovanother way to implement this would be via a new endpoint, something like /v3/projects/project_id/system-tags/, but it is a stretch, because it asks for a /domain-tags/ after that :)15:30
d34dh0r53 right15:31
d34dh0r53I think this needs a spec as it's an API change as proposed here15:31
bbobrovhonestly, i am not even sure that it should be in scope of keystone; maybe i should just go with yet another microservice15:32
bbobrovwhich is also not great, because i have to protect it with all the oslo stuff15:32
jrossercould i ask if it would be possible to merge the fix here https://bugs.launchpad.net/keystone/+bug/2030061?15:34
d34dh0r53jrosser: I'll take a closer look at the fix for that later today, it does need tests though15:38
jrosserok so on that, andrew works on my team and we put a bunch of time to debug and make the bug / example fix15:38
jrosserhowever we certainly do not have the skills to make a test for it15:39
d34dh0r53bbobrov: yeah, it's a grey area15:40
d34dh0r53jrosser: ack15:42
d34dh0r53moving on for the sake of time15:42
d34dh0r53bbobrov: it's up to you, we're certainly willing to look at a spec for adding that ability15:43
d34dh0r53#topic bug review15:43
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:43
d34dh0r53looks like a new bug for keystone15:44
d34dh0r53#link https://bugs.launchpad.net/keystone/+bug/204955915:44
d34dh0r53any volunteers to look at that one?15:45
bbobrovi think it was a deliberate decision to hide the error message from the user15:45
d34dh0r53I think so too, but I'd have to check15:46
bbobrovand that the reason is transmitted only via notifications15:46
d34dh0r53yeah, this is by design, just found the release note stating that15:47
d34dh0r53I'll update the bug15:47
d34dh0r53next up15:49
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:49
d34dh0r53no new bugs for python-keystoneclient15:49
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:49
d34dh0r53keystoneauth has no new issues15:50
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:50
d34dh0r53keystonemiddleware is also goo15:50
d34dh0r53d15:50
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=015:50
d34dh0r53nothing new in pycadf15:51
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=015:51
d34dh0r53ldappool is good to go15:51
d34dh0r53#topic conclusion15:51
d34dh0r53Thanks folks!15:51
d34dh0r53I don't have anything15:51
d34dh0r53#endmeeting15:52
opendevmeetMeeting ended Wed Jan 17 15:52:14 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:52
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-01-17-15.00.html15:52
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-01-17-15.00.txt15:52
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-01-17-15.00.log.html15:52
bbobrovthanks15:52

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!