Wednesday, 2024-03-27

*** mhen_ is now known as mhen02:12
kevkoHi folks, master keystone is reporting "Couldn't not find a service {service}" or "Couldn't find a role {role}" etc .... logs here https://ecbb8cfc7e1592890056-5f9169eacee10b8db2558d8a4c802669.ssl.cf5.rackcdn.com/913728/80/check/kolla-ansible-debian-upgrade/6692fc2/primary/logs/kolla/all-ERROR.txt   .... everything is working ..but maybe it has08:38
kevkosome side effect elsewhere ? I don't know ..but I think it should be fixed ... 08:38
fricklerkevko: this is normal (at least when using OSC), check on any of your installations. OSC first tries to use the parameter you give it as UUID, only when keystone returns that failure, it looks up by name08:52
fricklerone could argue about keystone being buggy by logging this as an error. or at all. or argue OSC should go the other way round. but it has been like this forever and I'm really surprised this is coming up time and again08:53
kevkofrickler: well, but shouldn't be this lookup or exception be handled inside keystone code and raise only if real "not found" exception ? 08:59
fricklerkevko: maybe. but that would likely be a massive API change and I think it will be difficult to convince anyone that it would be useful to come up with v4.0 for that09:10
kevkofrickler: API massive change ? why ? 09:13
kevkofrickler: btw, if i follow traceback and catch the dict send to keystone ... there is  {'role_id' : 'service'} while calling openstack role show service ...  but if i pop('role_id') and add 'role_name' do dict ...keystone is happy ...so maybe check if resource i am asking for in client is name/id ? 09:15
fricklerit may be non-trivial to decide whether your CLI parameter is meant to be a name or an id? also this only works for some calls, not for stuff like GET /v3/projects/{project_id}/users/{user_id}/roles09:18
kevkofrickler: i still think this can't be difficult fix ...09:27
opendevreviewDouglas Mendizábal proposed openstack/keystone master: Allow admin to access tokens and credentials  https://review.opendev.org/c/openstack/keystone/+/91452014:04
d34dh0r53#startmeeting keystone15:02
opendevmeetMeeting started Wed Mar 27 15:02:17 2024 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:02
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:02
opendevmeetThe meeting name has been set to 'keystone'15:02
d34dh0r53#topic roll call15:02
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla[m], lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], mharley, jph, gtema15:02
d34dh0r53o/15:02
dmendiza[m]🙋15:03
d34dh0r53#topic review past meeting work items15:04
d34dh0r53#link https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-03-20-15.00.html15:05
d34dh0r53no updates from me15:05
d34dh0r53#action d34dh0r53 Look into adding/restoring a known issues section to our documentation15:05
d34dh0r53#action d34dh0r53 add https://bugs.launchpad.net/keystone/+bug/1305950 to the known issues section of our documentation15:05
d34dh0r53#topic liaison updates15:05
d34dh0r53nothing much, on the VMT side, we've converted two private bugs to public, LMK if you want details15:07
d34dh0r53#topic specification OAuth 2.0 (hiromu)15:07
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:07
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:07
d34dh0r53External OAuth 2.0 Specification15:07
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/86155415:07
d34dh0r53OAuth 2.0 Implementation15:07
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls15:07
d34dh0r53OAuth 2.0 Documentation15:07
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/83810815:07
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/83810415:07
d34dh0r53guess hiromu isn't around15:08
d34dh0r53next up15:09
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:09
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:09
d34dh0r532024.1 Release Timeline15:09
dmendiza[m]🙋15:09
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:09
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:09
dmendiza[m]Yeah, lots of updates15:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/902730 (Merged)15:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/903713 (Merged)15:09
d34dh0r53awesome!15:10
dmendiza[m]OK, first up, it looks like Tempest currently has an all-or-nothing approach for setting scope in the Admin clients.15:10
dmendiza[m]That means that they're either all project-scope or all system-scope15:11
dmendiza[m]Unfortunately that does not work since some projects (i.e. neutron) only allow project-scoped requests for admin APIs.15:11
dmendiza[m]So, for now, we want to only run tests as project-scoped admins15:11
dmendiza[m]which is what this patch does: (in keystone at least)15:11
dmendiza[m]#link https://review.opendev.org/c/openstack/keystone/+/91399915:12
dmendiza[m]Still need another review (maybe from knikolla ?)15:12
dmendiza[m]since Grzegorz Grasza is out on PTO this week15:12
dmendiza[m]Now, for some reason, devstack also sets those same options15:13
dmendiza[m]so we have duplicate code setting the same options in two repos15:13
dmendiza[m]this is the patch to remove them from lib/tempest in the devstack repo:15:13
dmendiza[m]#link https://review.opendev.org/c/openstack/devstack/+/91411515:13
dmendiza[m]Next, I have a patch that modifies a couple of policies that were missed when we implemented Phase 1 of SRBAC:15:14
dmendiza[m]#link https://review.opendev.org/c/openstack/keystone/+/91452015:14
dmendiza[m]That one is fresh out of the oven, so still waiting on CI to run the gate jobs15:14
dmendiza[m]Additionally, we still have the "protection" aka SRBAC jobs disabled in Keystone.  I have a patch up to re-enable them, but I am not sure why it failed when I rebased... I'll look into that next:15:15
dmendiza[m]#link https://review.opendev.org/c/openstack/keystone/+/90923815:16
dmendiza[m]Moving on, we do not have any tests that run the full tempest suite against Keystone with SRBAC turned on15:16
dmendiza[m]Tempest does have an SRBAC job, but Keystone is not currently enforcing SRBAC.  I have a patch up to enable it in that existing job.  Currently failing the gate, but mostly due to needing some of the patches I've linked15:17
dmendiza[m]#link https://review.opendev.org/c/openstack/tempest/+/91248915:18
dmendiza[m]Lastly, I have a patch to rename the tempest option that enables SRBAC tests in keystone-tempest-plugin.  Currently it does its own thing, and my patch changes it to be in-line with the rest of the projects that use the [enforce_scope] section of tempest.conf15:19
dmendiza[m]#link https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/91359315:19
dmendiza[m]Oh, and I also have a DNM test to keystone-tempest-plugin to pull everything together across all those related repos and run a full suite test of SRBAC using project-admin credentials:15:20
dmendiza[m]#link https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/91408915:20
dmendiza[m]I still need to investigate why it's failing.  I think we may need to change some tests around in the srbac suite due to the change of admin scope.15:21
dmendiza[m]That's all for now.15:21
* dmendiza[m] feels like he's juggling spinning plates15:21
d34dh0r53wow, that was a lot15:22
d34dh0r53thanks dmendiza[m] 15:22
d34dh0r53I'll leave it open for questions for a minute or two15:23
d34dh0r53#topic specification Improve federated users management (gtema)15:27
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/748748 - waiting for reviews15:27
d34dh0r53next up15:33
d34dh0r53#topic specification OpenAPI support (gtema)15:33
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/91058415:33
d34dh0r53#topic open discussion15:35
d34dh0r53passlib update15:35
d34dh0r53The maintainer responded to the bug, and one of the top priorities is to fix the bcrypt version bug15:35
d34dh0r53#link https://foss.heptapod.net/python-libs/passlib/-/issues/19015:35
d34dh0r53Targeted to 1.7.515:35
d34dh0r53No updates on this, hopefully 1.7.5 will be released soon15:36
d34dh0r53#topic bug review15:39
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:39
d34dh0r53no new bugs for keystone15:39
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:39
d34dh0r53python-keystoneclient is good15:40
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:40
d34dh0r53nothing new in keystoneauth15:40
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:40
d34dh0r53one new bug in keystonemiddleware15:42
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bug/194077015:42
d34dh0r53it's actually not new, just recently updated15:42
d34dh0r53I'll keep an eye on that one, maybe we should move to pymemcache15:43
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=015:43
d34dh0r53no new bugs for pycadf15:43
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=015:43
d34dh0r53ldappool is good15:43
d34dh0r53#topic conclusion15:43
d34dh0r53Nothing from me, add topics for the PTG to15:44
d34dh0r53#link https://etherpad.opendev.org/p/dalmation-ptg-keystone15:44
d34dh0r53Thanks all!15:44
d34dh0r53#endmeeting15:44
opendevmeetMeeting ended Wed Mar 27 15:44:25 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:44
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-03-27-15.02.html15:44
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-03-27-15.02.txt15:44
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-03-27-15.02.log.html15:44
fricklerd34dh0r53: dmendiza[m]: please check the reno update patches from yesterday related to the unmaintained branches. those should be merged before the release to make sure release note generation isn't broken. https://review.opendev.org/c/openstack/keystone/+/914285 etc.15:47
opendevreviewDouglas Mendizábal proposed openstack/keystone-tempest-plugin master: DNM: test keystone change  https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/91408918:22
opendevreviewDouglas Mendizábal proposed openstack/keystone master: Enable protection jobs  https://review.opendev.org/c/openstack/keystone/+/90923818:26
opendevreviewDouglas Mendizábal proposed openstack/keystone-tempest-plugin master: Fix domain-scope tests for list_domains  https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/91455819:28
opendevreviewDouglas Mendizábal proposed openstack/keystone-tempest-plugin master: DNM: test keystone change  https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/91408919:28

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!