Wednesday, 2024-02-07

opendevreviewTakashi Kajinami proposed openstack/oslo.policy master: Use consistent commands for coverage  https://review.opendev.org/c/openstack/oslo.policy/+/90823603:19
opendevreviewDouglas Mendizábal proposed openstack/keystone-tempest-plugin master: Consistent and Secure RBAC (Phase 1)  https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/90371304:41
swalladge[m]Hi, we're trying to figure out what roles and such we need to provide to have a domain scoped admin.   We're following the standard steps for creating a domain admin user, but that user can do things outside the domain still, like creating a project in another domain: https://pastebin.ubuntu.com/p/8hxPW6BTPH/05:11
swalladge[m]This is with the default policies in place, deployment of openstack 2023.2.  Any thoughts appreciated! :)05:12
opendevreviewMerged openstack/oslo.policy master: Use consistent commands for coverage  https://review.opendev.org/c/openstack/oslo.policy/+/90823606:41
gtemaSwalladge: there is spec for adding a dedicated domain manager role https://review.opendev.org/c/openstack/keystone-specs/+/903172 granting some user directly admin on a domain is as you see not the right thing06:48
opendevreviewArtem Goncharov proposed openstack/keystone master: Fix federation mapping role jsonschema  https://review.opendev.org/c/openstack/keystone/+/90816307:50
opendevreviewTakashi Kajinami proposed openstack/oslo.policy master: Remove fallback to DEFAULT section  https://review.opendev.org/c/openstack/oslo.policy/+/90831514:42
*** d34dh0r5- is now known as d34dh0r5314:57
d34dh0r53#startmeeting keystone15:02
opendevmeetMeeting started Wed Feb  7 15:02:19 2024 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:02
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:02
opendevmeetThe meeting name has been set to 'keystone'15:02
d34dh0r53#topic roll call15:02
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla[m], lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], mharley, jph15:02
d34dh0r53o/15:02
xeko/15:03
Luzio/15:04
dmendiza[m]🙋15:05
d34dh0r53#topic review past meeting work items15:06
d34dh0r53#link https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-01-31-15.01.html15:06
d34dh0r53no updates from my end15:06
d34dh0r53#action d34dh0r53 d34dh0r53 Look into adding/restoring a known issues section to our documentation15:07
d34dh0r53#undo15:07
opendevmeetRemoving item from minutes: #action d34dh0r53 d34dh0r53 Look into adding/restoring a known issues section to our documentation15:07
d34dh0r53#action d34dh0r53 Look into adding/restoring a known issues section to our documentation15:07
d34dh0r53#action d34dh0r53 add https://bugs.launchpad.net/keystone/+bug/1305950 to the known issues section of our documentation15:07
d34dh0r53#topic liaison updates15:07
d34dh0r53nothing from VMT15:07
gtemafrom api-sig pov: https://review.opendev.org/c/openstack/keystone/+/90816315:10
gtemaI work on openapi generation and found that one15:10
d34dh0r53we've moved Train and Ussuri to End-Of-Life and Yoga has transitioned to unmaintained status15:10
d34dh0r53ack, thanks gtema I'll take a look at that one15:11
d34dh0r53that should do it for liaison updates15:12
d34dh0r53moving on15:12
d34dh0r53#topic specifications OAuth 2.0 (hiromu)15:12
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:12
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:12
d34dh0r53External OAuth 2.0 Specification15:12
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/86155415:12
d34dh0r53OAuth 2.0 Implementation15:12
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls15:12
d34dh0r53OAuth 2.0 Documentation15:12
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/83810815:12
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/83810415:12
d34dh0r53I haven't seen hiromu around in a while15:13
d34dh0r53it looks like the WIP patches are somewhat active, updates in the last 30 days15:15
d34dh0r53moving on15:15
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:15
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:15
d34dh0r532024.1 Release Timeline15:15
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:15
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:15
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/902730 (Merged)15:15
dmendiza[m]Making progress on Phase 115:15
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/90371315:15
dmendiza[m]down to just a few more tests that need fixin in the tempest patch15:15
dmendiza[m]Of course, spending so much time in the tempest code made me realize it sucks and I hate it. :-P15:16
d34dh0r53lol15:16
d34dh0r53yep15:16
dmendiza[m]Needs a serious refactor for DRY principle15:16
d34dh0r53indeed15:17
dmendiza[m]Anyway, the tempest patch should be ready for review for Friday's reviewathon hopefully15:17
d34dh0r53ack, thanks dmendiza[m] 15:17
dmendiza[m]I'm not refactoring anything right now, but it would be worth refactoring and removing duplication when we add the "manager" role tests15:17
d34dh0r53good idea15:18
d34dh0r53moving on15:19
d34dh0r53#topic specification Improve federated users management (previously: Add schema version and support to "domain" attribute in mapping rules) (gtema)15:19
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/748748 - waiting for reviews15:19
gtemaright -waiting for spec reviews15:19
d34dh0r53I gave that one a once over and will try to give it a deeper look this week15:19
gtemagreat, thanks15:20
d34dh0r53nothing jumped out at me15:20
gtemasounds good15:20
d34dh0r53next up15:20
d34dh0r53#topic specification Dedicated domainmanager role15:20
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/903172 -waiting for reviews15:20
gtemaso, I do not know whether you noticed or not15:21
gtemaearlier today someone posted a question here in room15:21
gtemathat admin on a domain is still capable of doing other dangerous operations15:21
gtemathat one more time proves necessity of improvements in the area15:21
gtemaand I know - it touches the RBAC topic as well (at least similar direction)15:22
gtemaso, what operators often need is some sort of domain manager (admin) role that they are able to give out to customers15:22
d34dh0r53right, I agree15:22
gtemabut that should not be "admin"15:22
dmendiza[m]gtema "admin" role is essentially root15:23
gtemacorrect, and thus something new should be added15:23
dmendiza[m]whether "admin" is assigned on a project, or on a domain, or on the system the result is the same15:24
dmendiza[m]Have you read through the latest version of the Secure RBAC spec?15:24
dmendiza[m]#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#direction-change15:24
dmendiza[m]gtema: perhaps you want the "manager" role?15:24
gtemayes, but it doesn't explicitly describe usecase with domains15:24
dmendiza[m]Right ... there's a lot of confusion around scopes unfortunately.  If your use case is something that has more access than "member" but less than "admin" then the answer is the "manager" role.15:25
gtemacorrect, so if also in the scope of your work we can consider "manager" role it would be great15:26
gtemaanyway, I wanted to put that spec on the table and if all opinions are welcome15:26
dmendiza[m]Ack, I'll read through it and comment15:27
gtemagreat, thanks15:27
d34dh0r53thanks both!15:27
d34dh0r53#topic open discussion15:28
d34dh0r53nothing on the agenda15:28
Luzigtema there is a spec https://review.opendev.org/c/openstack/keystone-specs/+/90317215:28
Luzifor a domain manager role15:29
gtemacorrect, this is exactly the spec I mentioned15:29
Luzia collegue and me will be driving this, when the spec is accepted15:30
gtemathat's great15:30
Luzibut concerning this: with feature freeze around, i doubt this will make it into this cycle - am I right d34dh0r53 ?15:31
d34dh0r53that is correct, it will have to be 2024.215:31
Luziokay, thank you for the information d34dh0r53 :)15:32
dmendiza[m]TIL 2024.2 code name is Dalmatian15:32
d34dh0r53oh sweet, I missed that15:33
dmendiza[m]I assume @spotz had something to do with that.15:33
dmendiza[m]Yeah, Schedule is already out: 15:33
d34dh0r53lol, I'm sure she did :)15:33
dmendiza[m]#link https://releases.openstack.org/dalmatian/schedule.html15:33
d34dh0r53woo woo15:34
d34dh0r53err, woof woof?15:34
d34dh0r53anything else for open discussion?15:35
dmendiza[m]Feature Freeze is in a few weeks15:35
d34dh0r53indeed, good call dmendiza[m] 15:36
dmendiza[m]Just a heads up in case there's things we want to land before then15:36
d34dh0r53Feb 26 - Mar 01 is Caracal-3 and Feature freeze week15:36
dmendiza[m]#info Feature Freeze is the week of Feb 20 - Mar 0115:37
dmendiza[m]☝️for folks who just get the tl;dr from the summary.15:38
d34dh0r53yeah, forgot about that hashtag15:38
d34dh0r53moving on15:39
d34dh0r53#topic bug review15:40
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:40
d34dh0r53no new bugs for keystone15:40
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:40
d34dh0r53python-keystoneclient is also good15:40
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:40
d34dh0r53nothing new for keystoneauth15:41
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:41
d34dh0r53keystonemiddleware is also good15:41
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=015:41
d34dh0r53pycadf has no new bugs15:42
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=015:42
d34dh0r53nor does ldappool15:42
d34dh0r53#topic conclusion15:42
tkajinamthis is not a bug, but it's known that you have to update a release note file for yoga after transitioning stable/yoga to unmaintained/yoga15:42
tkajinamrelease note jobs are all broken until you merge the release patches proposed by bot15:43
tkajinamsome projects like barbican didn't get that update by bot so manual patch may be needed (I've created ones for barbican I believe)15:43
tkajinam(assuming some people here may be interested in barbican as well :-P15:43
tkajinamexample: https://review.opendev.org/c/openstack/keystone/+/90815015:43
tkajinamso I'd suggest you check your review queue and merge these patches asap before a different problem hit you15:44
d34dh0r53ack, thanks tkajinam I'll get those in for keystone15:48
d34dh0r53anything else for today?15:48
tkajinamd34dh0r53, thanks :-)15:48
tkajinamd34dh0r53, nothing else from me15:48
d34dh0r53excellent, thanks everyone!15:49
d34dh0r53have a great rest of your week :)15:49
d34dh0r53#endmeeting15:49
opendevmeetMeeting ended Wed Feb  7 15:49:18 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:49
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-02-07-15.02.html15:49
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-02-07-15.02.txt15:49
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-02-07-15.02.log.html15:49
opendevreviewMerged openstack/keystoneauth master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/keystoneauth/+/90815215:59
opendevreviewMerged openstack/python-keystoneclient master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/python-keystoneclient/+/90815616:00
opendevreviewMerged openstack/keystonemiddleware master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/keystonemiddleware/+/90815416:00
opendevreviewMerged openstack/keystone master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/keystone/+/90815019:16
swalladge[m]<gtema> "Swalladge: there is spec for..." <- thanks, this is helpful :)  Does this mean that currently there is actually no concept of a 'domain admin'?  What about the rules in keystone that seem to scope things to a domain like the create_project rule: https://opendev.org/openstack/keystone/src/commit/653d82b1b4e09b2ff37b56868e57d08c8e3af7dd/keystone/common/policies/project.py#L170 ?21:55

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!