18:07:49 #startmeeting keystone 18:07:51 Meeting started Tue Oct 9 18:07:49 2012 UTC. The chair is dolphm. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:07:52 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:07:53 The meeting name has been set to 'keystone' 18:07:59 might as well make it official 18:08:12 O/ 18:08:47 \o 18:08:48 more officiality: any high priority bugs? 18:09:31 https://bugs.launchpad.net/keystone/+bug/1063852 18:09:32 Launchpad bug 1063852 in keystone "Default to PKI tokens" [High,In progress] 18:09:54 The goal was to switch to PKI day one so we get people beating on it all during the dev cycle 18:10:09 I had planned on submitting this earlier, but there were a few issues to iron out first. 18:10:28 ayoung: i saw the build failures, is the 27 failure legit? 18:10:30 the --wrap change broke scripting, and now that it is in for the keystone client 18:10:55 ayoung -- I did leave you a question in that bug... nothing urgent just a question 18:11:14 AssertionError: u'2012-10-10T17:12:13Z' != u'2012-10-10T17:12:14Z' 18:11:20 we really should fix that 18:11:41 yeah 18:11:48 boden, I 18:11:51 there's a bug for it, right? 18:12:22 'll answer in the ticket, but the short is that devstack is set up to do it right, and the Packages will need to make their own decisions how to handle it 18:12:29 dolphm, I think so. 18:12:32 ayoung: boden: do we have docs instructing people to run keystone-manage pki_setup? 18:12:57 https://bugs.launchpad.net/keystone/+bug/1045962 18:12:58 Launchpad bug 1045962 in keystone "Transient test failure: test_token_expiry_maintained" [Low,Confirmed] 18:13:05 #link https://bugs.launchpad.net/keystone/+bug/1063852 18:13:06 I'll trigger a recheck 18:13:06 Launchpad bug 1063852 in keystone "Default to PKI tokens" [High,In progress] 18:13:18 #link https://bugs.launchpad.net/keystone/+bug/1045962 18:14:30 boden, the short of it for the packagers is that they probably need to call the keystone setup for PKI as the appropriate user 18:14:54 https://bugs.launchpad.net/keystone/+bug/1031372 18:14:56 Launchpad bug 1031372 in openstack-manuals "keystone-manage pki_setup creates certs owned by root" [High,Triaged] 18:15:00 ayoung: do you think packagers will use pki_setup or do a similar setup manually? 18:15:07 "manually" 18:15:16 dolphm, I would think pki_setup 18:15:38 ayoung -- ok, I'm still coming up to speed on openstack in general so some of my comments/questions may be obvious.. bare with me 18:15:48 the thing is, the RPM approach still requires a post install configuration. I don't think the deb approach does that 18:16:15 boden: that's a never-ending process :) 18:16:33 so, for RPM, it will be up to the end user to trigger it, or for the install script to trigger it 18:17:07 they might want to use a certificate signed by a pre-existing CA. 18:17:51 I was just typing that (existing CA)... I was expecting to see a set of docs on setting up PKI 18:18:54 boden: +1 i haven't seen any 18:19:01 just to confirm -- OpenStack does support PKI based tokens for Folsom right? I know the code is there, I'm just verifying its formally supported 18:19:08 #link http://docs.openstack.org/developer/keystone/configuration.html 18:19:13 would expect them there ^ 18:19:42 in addition to an entry on http://docs.openstack.org/developer/keystone/man/keystone-manage.html 18:19:46 boden, yes 18:19:55 you need to enable it in the config file 18:20:56 ayoung, yep I've been running with with since you dropped it... I posted a blog on developer works this AM which very quickly talks about PKI, but I think we have a gap in the OpenStack docs 18:22:13 boden, please open a ticket, and we can use that to track the PKI docs changes required 18:22:20 will do 18:23:20 ayoung: boden: already opening one, will link in a second 18:24:53 #link https://bugs.launchpad.net/keystone/+bug/1064585 18:24:54 Launchpad bug 1064585 in keystone "Docs missing for keystone-manage pki_setup" [Undecided,Confirmed] 18:25:50 is there a plan to introduce more like "organizational" tenant structures in keystone ? 18:26:02 since ya'll here 18:26:11 #topic open discussion 18:26:23 zykes-: yep! 18:26:31 ayoung, should you be adding openssl to pip-requires? 18:26:38 dolphm: v3 api @ grizzly or ? 18:26:47 zykes-: yep https://github.com/openstack/identity-api/blob/master/openstack-identity-api/src/markdown/identity-api-v3.md 18:27:07 how's permissions then dolphm ? 18:27:10 better then today or ? 18:27:15 zykes-: the official spec ^ see Domains & Projects 18:27:17 gyee, yes 18:28:03 V2 is gonna be a wanted piece! 18:28:10 zykes-: v3 also includes centralized policy repository, and the proposed implementation of the v3 api includes full RBAC 18:28:21 will you be able to implement it all during G ? 18:28:55 zykes-: a lot of it is already implemented https://review.openstack.org/#/q/is:watched+status:open+branch:feature/keystone-v3,n,z 18:28:59 zykes-: just needs review :) 18:29:08 oh 18:29:22 Do you know how KS will play in the "Cell" game of nova ? 18:30:15 zykes-, probably the first pass will be to assign cells to tenants 18:30:21 or probably more correct 18:30:34 setup cell/tenant access 18:30:40 ayoung: cell/project* 18:30:51 why a ccell to a project ? 18:30:59 zykes-: v2 tenants = v3 projects 18:31:00 isn't a cell kinda a zone today ? 18:31:13 domain? 18:31:29 zykes-, a project needs access to the resources scoped within a zone. THen, users assigned to that project can use those resources 18:31:35 zykes-: i believe they just chose a new name for zones, right? 18:32:27 ah 18:32:37 dolphm: isn't that a "Cell" ? 18:32:50 zykes-: i think so 18:35:05 I did want to discuss the topic I posted on the meeting wiki when you guys are done with this topic 18:35:12 the topic I posted was "Pluggable authN: Apache proxy vs pluggable python handlers -- which to support (or both)." 18:35:50 boden, pluggable authN separate from the identity database? 18:35:59 I can understand pluggable authZ 18:36:16 OK, I have that backwards 18:36:25 authZ authorization 18:36:40 should be driver from Identity backend 18:36:54 ayoung we had kicked this one around quite a bit on the email list... 18:36:56 pluggable authN...why try to do something more than apache for starters 18:37:01 authz is the policy driver 18:37:08 and I formulated the following blueprint: https://blueprints.launchpad.net/keystone/+spec/pluggable-identity-authentication-handlers 18:37:36 however the direction in some of the emails indicated we should add HTTPD support instead and use authorization via apahae 18:37:51 s/apahae/apache/g 18:37:57 so I would almost see this as mod_auth_x for eventlet. Why put in that effort? 18:38:40 I know nothing about mod_auth_x for eventlet, so I can't really provide my 2 cents until reading about it 18:38:42 boden, I'm not saying "no" I am just looking for the justification 18:39:06 btw -- my background is mainly in J2EE... so I've only been pythonic for about 4 months (FYI) 18:39:21 boden, I mean it sounds like implementing the various apache HTTPD mod_auths but for Eventlet 18:39:35 boden, yeah, I come from a similar background 18:39:54 so in JEE the auth is done by the container, separate from the application 18:40:03 Tomcat Realms etc 18:40:22 ayoung -- so in the email list both myself and someone else responded to the thread stating we thought there is benefit in having 'basic' authN handlers via python.. let me find the thread 18:40:29 in HTTPD, it is done by modules. You can do the same thing where you front Tomcat with Apache, and let it do the authN for you 18:41:26 so if you read this response http://lists.openstack.org/pipermail/openstack-dev/2012-October/001491.html 18:41:32 ayoung: boden: the ultimate goal is just to support http basic/digest, correct? 18:41:57 i feel like we're talking about solutions when we never talked about the problem 18:42:00 but maybe i missed that 18:42:15 boden, yes, but still looking for justification. That just says "we want it" 18:42:23 dolphm, +1 18:42:38 so I think the problem was stated in the blueprint to some degree 18:42:54 so, what I would suggest is that whatever code we write in this effort, it is with an eye to upstream eventlet 18:43:22 there are 3 bullets in the bp which describe what I see as the main problem 18:43:29 it should not be Keystone specific, and it shouldbe usable by other people that want eventlet, such as the other Openstack projects 18:44:41 boden: are we talking about bypassing the rest api? or putting something in front of the rest api that speaks http basic/digest and translates that into regular api requests? 18:44:42 ayoung, I guess I'm not following why other OS projects need support for authentication -- they do that based on the token in the users request 18:44:45 boden, there is a good argument for basic-auth done in eventlet, if only as a testing mechanism for keystone 18:45:06 what's a entity ? 18:45:15 zykes-: v3 spec? 18:45:19 boden, just because we tie people to keystone doesn't mean people might not want to use it. 18:45:27 dolphm: looking there yes :p 18:45:37 zykes-: "The examples in this section utilize a resource collection of Entities on /v3/entities which is not actually a part of the Identity API, and is used for illustrative purposes only." 18:45:56 ok 18:46:34 boden, so I don't see a need for the keystone code to know about anything other than REMOTE_USER/external, but I can see a use for eventlet specific code for authN. Is there a need for anything beyond that? 18:46:38 ayoung so your're suggesting if its done in python land (rather than via Apache auth) it might be something like a python paste middleware? 18:46:42 zykes-: are you reading my github, or openstack's? 18:46:47 boden, yes 18:47:20 dolphm: the one you linjked :() 18:47:28 zykes-: i linked both 18:47:32 zykes-: is my name in the url? lol 18:47:39 13 minutes left. 18:47:56 boden, feel free to continue this discussion with me after, if you still need clarification 18:48:00 ok :) 18:48:00 ayound I can see a case for a pluggable authN handler to want a reference to the actual identity driver... however there are a number of solutions to that 18:48:27 dolphm, last open topic: should I push to have the schedule changed, or just accept my fate? 18:48:42 ayoung: totally your call 18:48:45 ayoung -- discussion here in RTC, or you mean off-line via email 18:48:52 ayoung: sooner the better for schedule changes though 18:49:04 boden, yeah, basic-auth + SQL basic-auth+LDAP would work in middleware pieces, 18:49:13 boden: i'd like to at least follow the conversation, however ya'll proceed 18:49:18 boden, openstack-dev or pm, either is fine 18:49:35 sorry... pm == ? 18:49:39 private message 18:49:45 irc direct message? 18:49:56 openstack-dev is fine 18:50:05 #openstack-dev that is 18:50:32 ok -- we might have to take this up tomorrow... I have a hard stop at the top of the hour 18:51:08 ayoung: review some identity-api stuff for me when you get a chance :) i have a stack of commits i need to propose after those merge 18:51:20 zykes-: you too ^ :P 18:51:30 dolphm, in the V3 code base? Sure 18:52:05 ayoung: https://review.openstack.org/#/q/is:watched+status:open+project:openstack/identity-api,n,z 18:52:11 ayoung: identity-api repo 18:52:23 dolphm, everything on my todo list is reviewed. Nothing on the link you just posted 18:52:43 ayoung: add openstack/identity-api to your watch list 18:52:45 ayoung: https://review.openstack.org/#/q/status:open+project:openstack/identity-api,n,z 18:53:47 dolphn, we use md in identity-api, but rst in keystone? 18:53:48 dolphm, you can always add me as a reviewer. That will help me prioritize, too 18:53:58 dolphm 18:54:03 dolphm: sorry ? 18:54:08 gyee: yeah... apparently its easier to publish 18:54:13 i c 18:54:38 gyee: *shrug* i didn't have a preference between them, but i hate switching back and forth... i end up writing md in rst docs, and rst in md docs lol 18:54:48 dolphm, OK, I'm a watching 18:54:53 haha, same here 18:54:53 ayoung: will do 18:54:56 ayoung: thanks 18:55:37 dolphm: what you wanted me to do ? 18:55:41 dolphm, Imma -2 anything in passive voice, just so you know. 18:55:47 ayoung: awesome 18:55:52 no, not really./ 18:55:57 ayoung: for serious 18:56:24 dolphm, Users can be associated with zero or more projects 18:56:35 This attribute is provided by the 18:57:02 you sure you want me to do that? 18:57:17 What is "facing" ? 18:57:19 ayoung: absolutely, let's make it consistent 18:57:29 zykes-: that's been renamed to "interface" 18:57:41 zykes-: "admin" "internal" or "public" 18:57:53 zykes-: essentially the network interface the endpoint sits on 18:58:11 hmm k 18:58:54 zykes-: the analog in the current api is 19:00:12 #endmeeting