18:02:18 #startmeeting keystone 18:02:19 Meeting started Tue Jan 15 18:02:18 2013 UTC. The chair is dolphm. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:02:20 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:02:20 full house today :) 18:02:22 The meeting name has been set to 'keystone' 18:02:35 #topic Team Membership Updates 18:02:43 official welcome to henrynash and gyee :) 18:02:51 thank you, kindly 18:03:02 look forward to do some serious damage 18:03:02 Good job on code reviews this past week. Much appreciated you two 18:03:14 keep it up :) 18:03:19 :) 18:03:26 #topic Test Coverage 18:03:30 ayoung: any updates? 18:03:34 topol, want to join the weekly Keystone meeting? 18:03:40 yes 18:03:57 this is it correct? 18:04:01 dolphm, no major changes in test coverage has happened this week 18:04:09 dolphm, going back one step 18:04:20 jorgew and myself are here too. : ) 18:04:23 topol is going to be helping out on LDAP support 18:04:30 yay! 18:04:41 topol, who is the other dev with you? 18:04:46 sahdev will be helping too 18:04:51 say hi sahdev 18:04:53 ayoung: hi Adam, I would like to join keystone weekly meeting as well. 18:05:20 cool 18:05:21 Hi all! 18:05:26 spzala: /salute 18:05:30 welcome 18:05:37 This is starting to feel like a real project. 18:05:39 Thanks 18:05:41 :-) thanks! 18:06:05 so, back to test coverage. Lets open a Jenkins bug to rerun the test coverage results 18:06:16 ayoung: a bug? 18:06:31 ayoung: i.e. we lost coverage on something? 18:06:34 dolphm, wasn't it there before and got removed? 18:06:48 I thought you said last week that we used to run coverage on each Jenkins run 18:06:58 otherwise RFE 18:07:32 Should be as simple as adding the flag to run_tests.sh, but maybe jenkins doesn;t use that 18:07:39 ah that kind of coverage 18:07:52 yeah, unit test coverage 18:08:00 i don't see the charting anymore on jenkins, but we have the infrastructure for it as far as i can tell 18:08:16 keystoneclient too 18:08:25 see tox.ini 18:09:19 dolphm, so, for example, http://logs.openstack.org/18519/5/check/gate-keystone-python27/2010/ 18:09:27 ayoung: want to tackle that? 18:09:34 dolphm, sure 18:09:56 #action ayoung get jenkins to generate unit test coverage report 18:09:57 #action ayoung to trace down jenkins coverage reporting 18:10:06 and do it twice! 18:10:09 ha 18:10:19 #topic critical issues 18:10:49 i know we have a security-related fix in the works, anything else on fire? 18:11:06 http://wiki.openstack.org/Meetings/KeystoneMeeting 18:11:36 ayoung: yeah, criticalness appears to have dissappeared from the agenda 18:11:54 For everyone new, Agenda is ^^ 18:12:05 i noticed yesterday that db_sync no longer supports specifying a migration number -- need to file a bug on taht 18:12:29 #action dolphm to file a bug on lack of db_sync migration number option 18:12:42 dolphm, I don't think it is critical, but the is an issue identified by tempest WRT roles that is coming up as a bug. I'll take it for now 18:13:11 #link http://paste.openstack.org/show/29472/ 18:13:24 jaypipes is opening/assigning 18:13:34 cool 18:13:52 i'll assume that's it for now 18:13:55 #topic "Default" domain migration 18:14:09 so, this is a topic i've only scratched the surface on, but i wanted to give everyone a heads up on what i'm doing 18:14:14 this is probably bp worthy, so... 18:14:22 #action dolphm to write default-domain blueprint 18:14:51 dolphm, how does that tie in with henrynash 's domain blueprint... 18:15:10 anyway, we'll be creating a data migration to create a Default domain (id=default, name=Default) that will contain user/tenant resources on the V2 API 18:15:10 #link https://blueprints.launchpad.net/keystone/+spec/domain-name-spaces 18:15:15 dolphm: I'm already monkeying around with domains, so feel free to assign it to me :-) 18:15:37 i assume it'll use private namespaces once that bp is implemented 18:15:47 +1 18:16:11 henrynash, I meant to response to your domain namespace proposal 18:16:12 any operation on the v2 API will automatically work with default domain resources (creating a new tenant on v2 will create a project in v3 in the default domain) 18:16:24 we may also need to special case the domain so that users can't accidentally delete it from the v3 api 18:16:52 and i'd also like to make the default_domain_id a configuration option so that users can override the behavior and delete the domain we create if they'd prefer 18:17:04 any objections? 18:17:08 or questions 18:17:14 dolphm, no. 18:17:20 dolphm, a suggestion 18:17:23 or suggestions 18:17:26 +1 on default_domain_id 18:17:30 dolphm: we need to also define what happens when (in v3) a user creates entities without specify a domain (e.ff. users) 18:17:34 we should probably gues the default domain from the DNS domain name. 18:17:39 But that is an install issue 18:18:00 do they go in the default domain? 18:18:04 henrynash: my thoughts-- automatically create the user in the creating user's domain 18:18:12 same for projects 18:18:16 +1 18:18:28 (autlo create the userin the creating user's domain) 18:18:56 why users domain and not "default" domain? 18:19:02 the same domain you plan to use for v2 tenants or are they separate? 18:19:12 Or, if there is more than one domain, why not force them to specify? 18:19:20 ayoung: as a v3 user, that doesn't seem intuitive to me 18:19:31 ayoung: as a v2 user, i don't care about domains, but the implementation has to 18:19:54 dolphm, so the question is how should the V2 API behave? 18:20:02 ayoung: in terms of..? 18:20:12 if no domain is specified. 18:20:22 ayoung: v2 api isn't domain-aware 18:20:22 V2 create user needs to guess the domain 18:20:29 OK, I can go with "same as user" 18:20:51 for V3, lets make it default if there is only one domain, and must be specified if there is more than one? 18:20:59 ayoung: that's an interesting thought... 18:21:07 ayoung: we can apply that behavior across both API's 18:21:19 ayoung: or, hrm 18:21:55 ayoung: can users not in the default domain authenticate on the v2 api? they absolutely can't with a privately namespaced domain 18:22:02 dolphm, I'm ok with guessing for V2. We don;t want to break existing tools, and matching the existing user seems to make the most sense 18:22:07 ..without using ID's 18:22:18 FYI - jorgew and i have a hard stop at 12:30 and would like to discuss multi-project/token scope 18:22:35 i'll write the BP and ping the list 18:22:50 dolphm: +1 18:22:56 #topic multi-project tokens in V3 18:23:06 dolphm - thank you 18:23:23 joesavak, any change in your thinking from last discussion? 18:23:31 #link https://review.openstack.org/#/c/19014/ 18:23:53 We've updated to include the roles under tokens per your suggestion ayoung 18:24:17 joesavak, +1 18:24:19 so I think the proposal hangs together fine….as long as we are convinced we need the capability…sorry for keeping on asking about that... 18:24:41 henrynash: the rax use case may be unique but it could happen again. We had a swift product runnning under 1 tenant. We acquired a company (mosso) that is the compute product running under a different tenant structure 18:24:41 So we have two major reasons for the feature 18:24:44 henrynash, it should not be a general use thing, but only for specific use cases that span multiple tenants 18:24:59 and joe just mentioned one of them :-) 18:25:13 so to do a back up of a compute instance and to store in a swift instance, we need a token capable of seeing 2 projects 18:25:13 ayoung, +1 18:25:15 the question is how to consume them 18:25:35 The other is to keep in mind that V2 supported the feature at least in the contract 18:25:52 My thinking is that we should make a multi-project token look like a single project token, but provide the data to the application from the middleware 18:26:11 ayoung, I agree. 18:26:14 auth_token will just say "yep, this is OK" 18:26:32 the unmarshalled token data should then be in the context 18:26:41 in fact because a resource can belong in a single project, then and the validate call can check for that the change is minimal 18:26:44 Now, RBAC will come into play 18:27:08 joesavak: v2 supported this feature in the XML contract, but the feature was lost in the JSON interpretation of that contract 18:27:31 dolphm, I think our implementation went ahead and added the support in JSON :-) 18:27:52 +1 on adding support for JSON schema :-) 18:28:00 seems the obvious answer, fix JSON 18:28:01 +1 ; ) 18:28:10 ayoung: we don't have a way to provide multiple projects to services underlying auth_token today, i wrote a comment in the review about how to go about supporting that 18:28:45 dolphm, right. 18:29:02 any questions on the use cases presented? 18:29:30 dwchadwick: which will immediately break all clients written against the current implementation; it's too late to go back and match the intent at this point on v2 18:29:34 We have an alternative use case based on federated identities 18:29:35 dolphm, my point is that it should be possible to use a multi-project token like a single project token, perhaps based on the ordering of the projects requested. Some projects are more equal than others. 18:29:42 dwchadwick: please share 18:30:16 When you present a set of identity attributes from the federated infrastructure, then these are mapped into local tenants/domains/roles 18:30:16 dwchadwick, that uses a different middleware, correct? 18:30:20 joesavak:…so once we different services based on different trees, I think I get the need 18:30:20 yes 18:30:42 so the client is presented with a set of tenants to choose from 18:30:55 ayoung, I am not sure about the ordering 18:31:01 currently he picks just one, but can swap to another one later if he wants to 18:31:25 depending on ordering is too easy for implementations to screw up 18:31:36 so the client has a set of accounts he can use from his single authentication session. Thus it should be possible to support this with keystone tokens 18:31:42 simply migrating a resource from ownership by project A to ownership by project B requires authz on both projects (which is a use case requested on the mailing list recently) 18:32:08 that is a different case to the one I am talking about 18:32:15 granted you could implement it with multiple tokens 18:32:25 dolphm, I have to say, I really don't like the _build_user_headers aspect of auth_token middleware. It feels wrong 18:32:45 But, if we must... 18:32:59 X_TENANT_IDS, X_TENANT_NAMES ... 18:33:02 comma separated 18:33:15 X_ROLES...ugh 18:33:16 ayoung: what if the name includes a comma? 18:33:35 or in chinese? :) 18:33:47 gyee: right 18:33:58 This deal is getting worse all the time! 18:34:05 i think you need to JSON encode a list of strings (w/ unicode support) 18:34:43 dolphm, and, since this is all consumed by the WSGI app after the auth_token middleware, it should all be in the context, and not in custom headers 18:35:34 I think various context are built from the headers right now 18:35:38 ayoung: i'm not aware of another way to communicate between middleware layers except through the environment 18:36:20 we can stash the entire token access into the env 18:36:27 gyee, yeah 18:36:29 * dolphm runs 18:36:43 gyee, change "we can" to "we should" 18:36:50 amen 18:37:02 we are diving quite deep into the implementation for multi-projects/token. Is that needed to agree on https://review.openstack.org/#/c/19014/ ? 18:37:08 then you're expecting underlying services to understand identity api v2, v3, v4, etc 18:37:17 which is not their responsibility 18:38:00 we version the tokens 18:38:03 might as well :) 18:38:05 joesavak: the only snag i see is that we'll also need to support multi-domain tokens since we're also going down the domain-scoped route 18:38:06 You need to move to an extensible design for the API if you can, so that new features can be added without changing the api 18:38:11 dolphm, multi project tokens are breaking the xcontract regadless of who we break it 18:38:15 dolphm, really it's the middle ware that needs to understand this. Note that a resoruce still exists in a single project 18:38:36 the attribute type-value approach solves at least part of this 18:38:58 so domains would have just become yet another attribute in the set, and the API would not have needed to change to cater for domains 18:39:15 +1 dwchadwick 18:39:31 dwchadwick, what does the attribute for project_ids like? 18:39:45 jorgew1: the implementation spans client + server + middleware though 18:39:49 project-ID=11324 18:39:54 services still need to be aware of the attributes right? 18:40:02 project-ID=456578 18:40:13 for multi-project scoping? 18:40:21 yes they do, but that then becomes a config issue of the service 18:40:35 so I think we may be getting off in the weeds here…. 18:40:36 dwchadwick, the question is not whether we can solve this in the general case. The question is can we solve this with the existing contract. I'm all for attribute based, but that still means changing the other projects consumption of the tokens 18:40:43 how does that different from X-Project-IDs? 18:41:19 We've left the weeds behind. We are in the woods, crossing a stream 18:41:23 ;) 18:41:27 and I think I spotted a deer tick 18:41:27 lol 18:41:45 alright... 18:41:48 #topic SQL Testing 18:41:58 #link https://review.openstack.org/#/c/18519/ 18:42:05 joesavak, I'm OK with the concept of multi-proejct tokens, but I don;'t think the existing projects can consume them yet. Any thing consuming them needs to be a one off. 18:42:08 ayoung: ^ 18:42:24 OK, so the review above again has a test fix 18:42:28 ayoung: don't think = can't :) 18:42:33 ayoung, a great topic for the next summit 18:42:36 ayoung - ok. thanks for everyone's attention on it. 18:42:45 https://review.openstack.org/#/c/18519/5/keystone/common/sql/migrate_repo/versions/009_normalize_identity_migration.py 18:42:55 This downgrade was not tested 18:43:10 my only realy issue with https://review.openstack.org/#/c/18519/ is that it's effectively stepping on the toes of tempest, which is already built for this 18:43:14 it probably should have its own unit test, but it gets run as part of the downgrade 18:43:17 dolpm: fyi ,we missed the v3 token discussion topic on the agenda 18:43:36 dolphm, disagree 18:44:01 ayoung: done: https://bugs.launchpad.net/keystone/+bug/1099966 18:44:03 Launchpad bug 1099966 in keystone "Race condition when rapidly deleting and creating tokens" [Undecided,New] 18:44:11 tempest should be feeding us test that we should be working into the unit test framework, but we should be able to run against live DBs as part of development 18:44:27 henrynash: ah, i'll hit that next/last 18:44:29 A developer shouldn't need to know about Tempest to check that Keystone works 18:44:40 ayoung: lemme know if the information in the bug isn't enough... happy to provide more. 18:44:50 and while sqlite is a good first approximateion, We should be able to test against a RDBMS 18:45:15 jaypipes, would you say it is a critical? 18:45:26 I have bad experiences where stuff appeared to work in sqlite but blow up in mysql 18:45:47 gyee, and I don;t trust MySQL. I want PostgrSQL 18:45:56 so be able to test against different DBs is definitely useful 18:46:08 ayoung: meh.. I'm just ignoring the failures in my local tempest env. But it would be nice to fix. 18:46:09 ayoung, that's the point 18:46:15 It was essential for LDAP, too 18:46:17 ayoung: I could give it a go myself. 18:46:24 ayoung: also, has nothing to do with MySQL. 18:46:38 ayoung: i don't disagree, but the same issue applies to all of openstack... hence, it's a project-wide initiative... ergo, tempest 18:46:40 jaypipes, nah, that is part of the ongoing discussion, not on that bug 18:46:42 ayoung: and we do run tempest against an env with a PG backend. 18:47:33 ayoung: https://jenkins.openstack.org/view/Tempest/job/gate-tempest-devstack-vm-postgres/ 18:47:45 dolphm, so the remaining changes in that bug (other than the fix to 009) are just to use teardown instead of assuming a blank database. We could make that conditional on the URL, and assume blank fro sqlite, use teardown otherwise 18:48:00 dolphm, somebody's going to do it 18:48:11 jaypipes, we are discussing https://review.openstack.org/#/c/18519/ 18:48:49 dolphm, I think that the same approach (check the URL) probably makes sense for the rest of the unit tests. But that will be a separate commit. It has other issues to work through. 18:48:50 ayoung: oh, sorry man. 18:49:03 * jaypipes goes back into his hole. 18:49:33 dolphm, should I move https://review.openstack.org/#/c/18519/5/keystone/common/sql/migrate_repo/versions/009_normalize_identity_migration.py into its own review like I did the other fix? 18:50:38 jaypipes: lol your input is appreciated 18:51:26 ayoung: i would say so 18:51:40 ayoung: not that it has backport potential, but it'll still merge faster as a discrete fix 18:51:47 dolphm, OK, will do so. Then I can redo the above for both upgrade test and unit tests. 18:52:51 ayoung: cool 18:52:56 #topic v3 tokens/authn/authz etc. 18:53:12 i didn't add this, but i assume this was the API discussion in gyee's thread? 18:53:12 guang: I added this so you had a chance to discuss 18:53:28 good idea 18:53:34 excellent 18:53:53 OK, so I still don't really want to build multiple auth support into Keystone if we get it from Apache for free, but... 18:54:03 I do want to be able to use basic_auth and HTML 18:54:12 gyee: vested interest…since I need to make changes to this for both domain-scoping and name-spaces 18:54:23 ayoung: not everyone runs behind apache 18:54:26 And we need a V3 API for Authentication 18:54:33 dolphm, not yet they don't... 18:54:48 ayoung, they said you can get java for free before oracle comes in :) 18:54:51 * ayoung twirls mustache 18:55:50 the use case I can see as most important is 18:56:02 keep ID in Mysql but auth against LDAP 18:56:16 I'd like that to be the first supported 18:56:34 assume that syncing users from LDAP to MySQL is done externally somehow... 18:56:37 ayoung: how does that impact the API? 18:56:49 dolphm, that makes LDAP the first supported Auth Mechanism 18:56:58 instead of Google whateveritis 18:57:02 with auth plugin, I don't care where you store LDAP users 18:57:10 Keystone can just be a proxy for all I care 18:57:12 gyee: +1 18:57:30 gyee, right. just understand that this is the single most demanded feature right now 18:57:32 since we are going to abstract auth, token issuance, and token validation 18:57:36 gyee: have you worked on a python API for authentication plugins? 18:57:58 you can effectively have your own backends 18:58:20 dolphm, not formally 18:58:30 just have a bunch of brain farts so far 18:58:36 gyee: {'auth': {'password'}} x.authenticate(**contents_of_object_x) 18:58:38 whoops 18:59:20 one question: how are we going to decide which auth mechanism to use for a given request? 18:59:26 dolphm, I'll send out a proposal for the interfaces this week, assuming we all agree on the direction 18:59:30 gyee: {'auth': {'password': {'username': 'a', 'password': 'b'}} -> password_plugin.authenticate(username='a', password='b') 18:59:31 Domain is the most viable option 18:59:49 something like, **explode the contents of hte request that map to the name of the plugin 19:00:05 yep 19:00:14 ayoung: according to gyee's proposal, it depends on the contents of the request 19:00:37 dolphm, that is too wide open 19:00:42 mechanism maps to the plugin seem simple enough 19:01:00 plugins[plugin_name].authenticate(**credentials) -> resulting in -> plugins['password'].authenticate(username='a', password='b') 19:01:08 ayoung: what is too wide open for what 19:01:15 dolphm, "based on the request" 19:01:22 that implies a whole policy like rules engine 19:01:45 I'd prefer it to be something more implementable\ 19:01:48 I am not seeing any problem 19:02:05 if we don't support a given auth mechanism, we return a 401 19:02:09 like list the auth mechanisms in the config file, and then the domain entry has an auth mechanism specified in it 19:02:27 ah, we're over time 19:02:31 switch to #openstack-dev ;) 19:02:34 #endmeeting