20:01:27 #startmeeting barbican 20:01:28 Meeting started Mon Aug 11 20:01:27 2014 UTC and is due to finish in 60 minutes. The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:01:29 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:01:31 The meeting name has been set to 'barbican' 20:02:03 Sorry about that guys... almost missed the meeting time 20:02:13 as usual the agenda can be found here: 20:02:15 #link https://wiki.openstack.org/wiki/Meetings/Barbican 20:02:20 #topic Roll Call 20:02:28 o/ 20:02:31 _o/ 20:02:32 o/ 20:02:32 o/ 20:02:38 o/ 20:02:41 o/ 20:02:55 o/ 20:02:59 \o/ 20:03:05 o/ 20:03:22 awww yeah!!! lots of barbicaneers here 20:03:34 IT'S A PARTY! 20:03:53 hehe indeed! 20:04:02 ok, let's get the ball rolling 20:04:07 #topic Barbican Integration 20:04:17 #link https://wiki.openstack.org/wiki/Barbican/Integration 20:05:05 So, I was asked by SheenaG1 to start looking into the integration tasks we'll be needing to meet to graduate from Incuabation 20:05:25 the documented requirements are listed here: 20:05:27 #link http://git.openstack.org/cgit/openstack/governance/tree/reference/incubation-integration-requirements.rst#n79 20:05:53 the first link is for a wiki page that summarizes the items that I think still need work 20:06:39 I still have to get a hold of the TC to figure out if there are any undocumented requirements 20:07:00 I am expecting at least half a dozen undocumented requirements per our experience Incubating 20:07:29 in any case... the biggest item in the list in my opinion is integration with Horizon 20:07:52 I don't think anyone has looked at integration, or even blueprinted what integration might look like 20:08:21 Another big area is documentation, which I know SheenaG1 is starting to tackle 20:08:57 Wheeeeeee. 20:09:06 so I wanted to bring up the topic, to see if there are any contributors who may have free time to look into the Horizon integration piece 20:09:09 I saw there is a docs gate test. What is that doing? 20:09:44 rellerreller so the docs gate was added by infra (we think?) some time last week 20:10:04 What kind of help are you looking for with the Horizon integration? What are you hoping to see? 20:10:50 redrobot what does the docs gate test do? I just noticed it today. 20:10:53 right now it's not doing much. it's basically just running tox -e docs, which in turn is just running setup.py build_sphinx 20:11:20 eventually the docs are going to end up in docs.openstack.org 20:11:40 oh, never mind, I think they're already being pushed 20:11:41 #link http://docs.openstack.org/developer/barbican/ 20:11:50 OK, that's good to know. 20:12:15 I'm not entirely sure if this is pushed every merge, or if its only during release 20:12:37 but yeah... it did kind of take everyone by surprise when the gate turned on last week. 20:13:18 The idea is that we'll start building the Sphix based documentation, which is docs aimed at developers/contributors 20:13:24 *Sphinx 20:13:46 The docs I linked is a first pass I made at documenting things a few weeks back 20:14:02 I don't think there's much there, so any help would be appreciated 20:14:15 as far as Dashboard (Horizon) integation, I htink that's still up for debate 20:14:39 to be honest, I'm not sure if it's up to us, Horizon or the TC to decide what the integration would look like 20:14:56 jraim are you around? 20:15:23 the governance docs don't go into much detail as to what is required, other than "some" integration is required 20:16:01 Depending on what is needed, we may not be able to graduate to integrated for Kilo 20:16:46 so now that I'm talking about it here, maybe I need to dig deeper into this? 20:18:07 sounds like reaching out earlier to the TC similar to what jraim did for incubation might be needed. 20:18:19 I agree 20:18:37 x2 20:18:50 #action redrobot will reach out to TC to flesh out Integration requirements, especially Horizon integration 20:19:58 I think it would be awesome if we can Graduate when our review comes up at the end of Juno, but I'm starting to think it may be a long shot 20:21:14 Also, is there anyone interested in being part of the vulnerability disclousure process for Barbican? 20:21:28 I was thinking of volunteering myself, but we'll need at least one more 20:21:34 preferably a couple more 20:21:40 what does that entail? 20:21:54 all the details are outlined here: 20:21:56 #link https://wiki.openstack.org/wiki/Vulnerability_Management 20:21:58 sounds personal 20:22:21 * redrobot feels a little vulnerable ;) 20:22:38 redrobot: I'd like to help out - being ex VMT etc I might be able to add value. 20:22:54 might be a nice way to get more involved too. 20:23:10 hyakuhei woohoo! sounds good 20:23:46 This line is interesting: "Where a member of the team is employed by a downstream stakeholder, the member does not give their employer prior notice of any vulnerabilities." What if your employer is implementing the code themselves? 20:24:21 woodster_: It's just a best intention document - not the most presciptive of policies... 20:24:44 hyakuhei: ok, thanks 20:25:03 hyakuhei send me your contact info so I can list you as a Vulnerability contact for Barbican 20:25:14 hyakuhei /me douglas.mendizabal AT rackspace.com 20:25:23 Righto 20:27:07 I think that's all I wanted to cover for now... I'll be talking to the TC as we get closer to the end of the cycle 20:27:27 any questions/comments before we move on to the next agenda point? 20:28:36 ok, moving on. 20:28:49 #topic Barbican as a Keystone service 20:28:55 rellerreller you wanted to talk about this? 20:28:59 blpoulos has been working to integrate Barbican into Nova and Cinder. She ran into an issue and is wondering if others know how to solve it. 20:29:12 I am working on patches https://review.openstack.org/#/c/104001/ for nova and https://review.openstack.org/#/c/104339/ for cinder. 20:29:19 These patches add a barbican keymgr wrapper, so that barbican can be used with cinder volume encryption. 20:29:25 Currently, I am unable to get the barbican service URL, and provide it manually as a config parameter. 20:29:32 Ideally, this would come from the service catalog. 20:29:38 I would like to create a barbican client with just the nova context or cinder context. 20:29:44 These context objects have the auth token and the user ID, among other values. 20:29:50 Does anyone have any experience/ideas for using the context objects to create a barbican client? 20:29:58 (Where this would be used would be line 70 of https://review.openstack.org/#/c/104339/10/cinder/keymgr/barbican.py) 20:31:34 blpoulos it is possible that barbicanclient does not support context objects 20:31:54 barbicanclient has not been getting all the attention it should, so it's lagging behind a bit 20:32:10 we were also waiting for some patches to land on keystoneclient to be able to use sessions and other goodies 20:32:19 gotcha 20:32:54 we /should/ have an entry in Keystone catalog for the service endpoint though 20:33:27 Using devstack I do have an entry in Keystone for barbican 20:33:42 but I'm just having trouble accessing it, and was wondering if anyone else had any insight 20:34:03 blpoulos what do you mean by accessing it 20:34:15 getting it using just the context 20:34:25 from keymgr/barbican.py 20:34:56 I'd like to retrieve the service URL for barbican from keystone 20:35:26 does that endpoint in the service catalog have a 'v1' at the end? 20:35:49 yes 20:36:24 it sounds like we might be able to discuss/troubleshoot this offline in the barbican IRC? 20:36:32 sounds good 20:37:19 yeah... I was trying to dig up an etherpad we had with notes of changes that we need on barbicanclient, and related changes on keystoneclient 20:37:51 I think I remember a pending CR on keystone that would add the ability to get the endpoint from the session? ... not sure though 20:38:07 we can definitely look at this more offline. 20:39:14 #link https://etherpad.openstack.org/p/keystone-juno-hackathon 20:39:24 ...as an FYI anyway :) 20:39:33 thanks woodster_ 20:39:39 #link https://etherpad.openstack.org/p/barbicanclient-keystone-sessions-vs-auth 20:39:44 ^^ is the one I was thinking about 20:40:10 ah, got it 20:42:11 ok guys... that's all I had on the agenda for today. Any other topics/questions/concerns/comments? 20:43:53 do folks know if atiwari is on vacation? I was interested in two CRs he is working on... 20:44:08 I have a question about containers and naming restrictions for Secrets 20:44:15 if we could briefly touch on that 20:44:37 ok, one at a time... 20:44:42 heh 20:44:50 #topic Containers and Naming Restrictions for Secrets 20:44:54 (also, I missed all of the backlog for this meeting, JUST realized it was happening now) 20:44:59 rm_work go ahead 20:45:10 alright, so I'm working on python-barbicanclient right now 20:45:32 and I'm wondering if we have or see a need for naming restrictions on secrets... 20:45:43 it may impact the way I implement container support 20:45:55 for example, could a container have a secret named "name" or "type"? 20:46:18 afaik, names are arbitrary and we don't enforce any kind of validation 20:46:24 ok 20:46:28 I'll have to plan for that then 20:46:29 if a name is null we assign the UUID as a name 20:46:31 that's all I had :P 20:46:45 right, but if they had a *secret* named "name" 20:46:58 I was going to try to have all of the secrets be properties on the Container object based on their name 20:47:13 so the container to secret association can have a name, and the individual secrets can have names too. 20:47:21 but that doesn't work obviously if there could be a collision between the Container's name property and a secret named "Name" 20:47:22 fancy.... but totally not what the BP specified. :-P 20:47:31 redrobot: shhhh 20:47:50 I can always update the BP :P 20:48:17 there is a ContainerSecret association that holds the name you see in the Container API 20:48:22 hehe.... I'd rather keep properties on the container limited to only typed containers where we know what the secret restrictions are 20:48:30 I guess my first commit for that CR will probably get ripped to shreds for not necessarily following the BP to the letter… we'll see what comes of that 20:48:32 Can two secrets in a container have the same name? 20:48:35 redrobot: right, ok so definitely those 20:49:03 paul_glass, generic container, yes 20:49:28 yep, a typed container just restricts what names you can associate to those secrets in the container 20:49:30 right, so this could only apply to RSAContainer / CertificateContainer 20:49:58 GenericContainer (or just… Container) would only be able to reference secrets by doing myContainer.secrets[secretName] 20:50:03 ...but the secrets themselves could have different names on them, or no names at all 20:50:09 err 20:50:19 oh, right actually I guess it'd have to be a list of Typles 20:50:21 couldn't be a dict 20:50:32 if a generic container can have multiple secrets that go by the same name 20:50:41 *Tuples 20:51:03 ok, I can talk offline / in #openstack-barbican if I have further questions about this 20:51:11 thanks for the clarification 20:52:13 I thought it *might* be cool if a container could be iterated 20:52:17 ie. 20:52:26 rm_work: Arvind is doing some work along these lines too...one of the CRs he is working on 20:52:29 for secret in my_container: # do stuff 20:52:46 but it might be more trouble than is worth 20:52:49 woodster_: is he doing "add containers to Python-barbicanclient"? if so, i need to coordinate with him :P 20:53:02 ha, not client side work 20:53:09 well right now you can do "for secret in my_container.secrets: #do stuff" 20:53:30 redrobot, sorry, got delayed. Arvind is on vacation. he will be back tomorrow 20:53:30 rm_work ok, that's cool too 20:53:37 I can show you the kind of… framework I have in place right now, if you want to stop by sometime today redrobot 20:53:47 may or may not actually make it to submitting a CR today 20:54:18 tsv: thanks! 20:54:34 rm_work cool... I might swing by if I get some time. 20:54:45 ok, guys seems like we're at a good stopping point for today 20:55:18 thanks everyone for coming. See you all next week, or sooner on #openstack-barbican 20:56:47 #endmeeting