18:00:31 #startmeeting keystone 18:00:32 Meeting started Tue Jul 2 18:00:31 2013 UTC. The chair is henrynash. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:33 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:00:35 The meeting name has been set to 'keystone' 18:00:36 ahh! 18:00:57 dolphm is off, so is ayoung, I think 18:01:25 who's the commanding officer??? Ain't it you Henry? 18:01:34 I believe 'tis me 18:01:35 is anyone know if Malini still working on key manager? 18:01:50 #link https://wiki.openstack.org/wiki/Meetings/KeystoneMeeting#Agenda_for_next_meeting 18:02:16 ( some of this is hang over from last time, not updated i expect) 18:02:17 gyee: I dropped her an email did not get any response 18:02:42 Reminder: Havana milestone 2 cut & API-level feature freeze July 16th 18:02:56 Reminder: Start using the SecurityImpact tag in gerrit 18:03:02 dolph seemed to indicate API freeze is only for core, not extensions 18:03:18 bknudson: yeah, i was under the same impression, saw that in his email 18:03:27 bknudson, I thought he meant both 18:03:37 at least from the last meeting 18:03:39 bknudson: so originally he told me that it DID include extensions, but recent email suggest that this is replaced 18:03:48 maybe he's finally resigned to reality. 18:04:04 total recall 18:04:20 #topic High priority bugs or immediate issues? 18:04:27 he probably thinks he's involved in a plot on mars right now. 18:04:57 any burning issues? 18:05:19 code review? I need to catch up on that too 18:05:45 #topic High priority code reviews - aimed at H2 18:06:23 its already on the list, but delegated_auth is ready for code review 18:06:41 so I have one for sure that I am trying to get in https://review.openstack.org/#/c/34611 18:06:43 stevemar, that includes both keystone and keystone client right? 18:06:46 gyee ^ if you have free time 18:06:55 henrynash I will review it today 18:07:13 stevemar: it's an extension, right? 18:07:17 gyee: yeah, just search for stevemar as owner: or ping me and i'll give you links. 18:07:21 henrynash: yes 18:07:32 k, will get on them 18:08:02 catalog opt out: https://review.openstack.org/#/c/33188/ 18:08:02 steveamr: so great for H2 if we can, but would be allowed for H3 (according to latest guidance) 18:08:57 henrynash: yeah, hoping for H2 18:09:00 fabio: is there an api spec change that goes with that? 18:09:13 stevemar: H2 is always better than H3 1 18:09:15 ! 18:09:28 spec changes: https://review.openstack.org/#/c/34478/ 18:09:46 I also have done the spec change and code for the endpoint filtering bp 18:10:04 specs: https://review.openstack.org/#/c/34489/ 18:10:21 code: https://review.openstack.org/#/c/33118/ 18:10:35 fabio: we really need the api's agreed asap if this is going in to H2 18:10:47 I agree 18:11:08 so far I incorporated all the suggestions 18:11:09 fabio: I don't see a new version of the api posted after comments from Brant 18:11:24 I will push them in the early aft 18:11:47 are we ok in using the query string? 18:11:55 for opting out of the catalog? 18:12:04 #action review new versions of https://review.openstack.org/#/c/34478/ and https://review.openstack.org/#/c/34489/ 18:12:29 +1 for query string 18:12:33 seems weird to use a query string but I'm ok with whatever others want. 18:12:54 for a GET function, query string is RESTi 18:13:04 it's not GET, it's POST 18:13:17 oh 18:13:47 we've already got the body to provide all the options, so why spread them around to the query string. 18:13:52 wait, that authenticate or validate? 18:14:11 there's no validate... https://blueprints.launchpad.net/keystone/+spec/catalog-optional 18:14:49 unless we were discussing another use of query options something else? 18:15:11 bknudson, yeah, I am ok with having it in the request body 18:15:29 gyee: +1 18:16:00 +1 on request body 18:16:05 #action fabio: wok with bknudson and gyee to update api 18:16:19 #action fabio: work with bknudson and gyee to update api 18:16:50 ok, any other key H2 api changing reviews needed? 18:17:09 any thought about https://blueprints.launchpad.net/keystone/+spec/serviceid-binding-with-role-definition 18:17:17 for H2 18:17:42 I like the service-role relationship 18:18:00 atiwari: so if it is going to be accepted for H, it must be in for H2… 18:18:21 ok 18:18:22 unless we provide it an extension in H? 18:18:30 "it as an extension" 18:18:32 bknudson: agreed! 18:18:44 I am fine with extension 18:18:45 no, I am looking for core 18:18:54 It can be core in I 18:18:54 please see my comments in etherpad 18:19:36 atiwari: link? 18:19:45 #link https://blueprints.launchpad.net/keystone/+spec/serviceid-binding-with-role-definition 18:19:59 #link https://etherpad.openstack.org/serviceid-binding-with-role-definition 18:20:46 atiwari: what about the comment about: How is this exposed to auth_token (and similar clients)? 18:21:29 auth_token or auth middle ware ? 18:21:42 I added my response over there 18:21:44 atiwari: both 18:21:44 service_id is in the roles 18:22:12 and the token with have the service_id: role info 18:22:14 ok, so right now we return a list of role_names in a token 18:22:24 correct 18:22:39 later it will be ({service_id:"Swift","role":"Admin"} 18:22:57 Swift === 1234 18:23:03 atiwari: so every project will have to change how it process tokens to pass them to their policy engines? 18:23:30 henrynash, no, policy engines only knows role names 18:23:31 no 18:23:40 service ID is a filtering mechanism 18:23:52 there will abosolutly no change for service 18:24:06 auth_token -> filtered by service ID -> RBAC 18:24:19 gyee: any who does the filtering? 18:24:29 henrynash, middleware/client 18:24:44 service will consume roles the way they do it right now 18:25:37 gyee, antiwar: so I am just nervous about changing our token format 18:25:54 define nervous :) 18:26:04 (antiwar->atiwari !) 18:26:16 nervous = people coming after us with torches and pitchforks 18:26:39 may be we can un touch the token for H time frame 18:26:49 topol, in that case, all you have to do is change your username, like lopot :) 18:27:01 lets make it in core and in I time we will change token 18:27:11 yeah, that'll keep me safe. no one will see thru that 18:27:16 gyee: so I'll admit I don't have the history to fully understand how all the projects extract info from the token 18:27:20 unless you username is bob 18:27:25 people around here know how to find topol 18:27:57 henrynash, service ID used to be part of role definition, prior to KSL 18:27:59 gyee: udneratnd how auth middleware works, sure 18:28:18 gyee: KSL? 18:28:27 Keystone Light 18:28:28 ahh, keystone liygt 18:29:20 still not sure why this can't be an extension for H 18:29:34 henrynash: auth middle ware will filter only those roles which are need to the service which middle ware is serving to 18:29:38 bknudson: I'd certainly lean that way 18:30:08 atiwari, any reason why it can't be an extension to start with? 18:30:28 it would certainly make henrynash feel less nervous 18:30:45 gyee: and I always appreciate that :-) 18:30:59 I don't see any side effect of having it in core 18:31:10 as it is backward compatible 18:31:37 what I am saying is in first phase let s not touch our token 18:32:11 atiwari, but can it be an extension, rather than it must be core 18:32:11 how do we not change the token? 18:32:15 atiwari: I also see the issue that as core you have 14 days to get it all agreed, implemented, merged with all the other high priority items hitting in the next 14 days 18:32:28 +1 on starting as an extension 18:32:48 yes, that is the real challenge 18:32:58 auth_token isn't going to know what to do if there's nothing new in the token. 18:33:38 let's take it for ext 18:33:51 how about that ? 18:33:55 ok, I think tha's the best approach 18:33:56 +1 18:34:22 good 18:34:31 #action antiwar to re-propose serviced role extensions as an extension for H 18:35:39 fyi on other H2 items, I do plan to try and get the OS-INHERIT extension in, but if it slips to H3 then so be it 18:35:59 anything else on H2? 18:36:40 #topic client unification and identity v3 support 18:37:03 this is ensuring we have support for our v3 apis in other cli clients 18:37:25 the keystone client v3 auth stuff is all in now 18:37:35 do the other clients have the same policy to use unified cli as keystone? 18:37:57 bknudson: you mean use openstackclient? 18:37:59 I tried using openstack cli the other day and couldn't figure it out. 18:38:13 henrynash: yes, the openstackclient. 18:38:31 I should have said the other projects (nova, glance, etc) 18:38:41 bknudson, but what about at the lib level 18:38:50 bknudson: so I'd hope so….but have to admit I don't see much action in that direction 18:38:57 are we talking about the lib or the clis ? 18:39:20 both I suppose 18:39:26 we're probably going to need the libs to use keystoneclient auth first... 18:39:26 have to be consistent 18:39:29 bknudson: so we need clis that support v3 (which means we wan them to use our v3 libs, of coriuse) 18:39:55 the libs seems like the place to start. 18:40:07 yes 18:40:15 bknudson:…and I think our libs are in good shape now, no? 18:40:45 is keystoneclient fully implemented the V3 API set? 18:41:04 seems like this is something the core members of keystone should know... 18:41:08 but I don't. 18:41:14 gyee: I believe so…we pushed a bit change in a week or tow ago 18:41:28 ..pushed a big change... 18:41:41 support for v3 auth was the recent change. 18:41:48 seems important for keystone 18:42:14 but this is what the other client APIs would need to use. 18:42:23 lets comb through the keystoneclient code to see if we have all the core APIs at least 18:42:28 bknudson: exactly 18:43:18 bknuson: there was some uncertainly last time I raised this as to whether the other clis (nova, dance) etc, use our client libs….I was told they did 18:43:48 my understanding is that they don't, but I didn't look into it. 18:44:03 wasnt there an email that did an inventory of this? 18:44:04 …in which case the task for them is sot switch to the v3 client libs and update the cli options so users can specify things like domains 18:44:10 they were like all different 18:44:52 the clis should also all use the same "library" for the auth options. 18:45:10 (provided by python-keystoneclient, maybe) 18:45:24 glanceclient implements keystoneclients, the others dont 18:45:25 #action cores: to do a quick check of the keystoneclient lib…see if you can spot anything missing 18:45:33 bknudson, looking at novaclient code, they seem to support auth plugins 18:46:26 gyee, timar: i would think nova and glance would be our #1 and #2 targtes 18:46:36 henrynash, make sense 18:47:09 tiamar: do you work with the glance client? 18:47:46 At the end of this, we would expect to be able to do something like "nova --user-domain=mydomain --user=bknudson --password=mypassword list" , for example 18:47:48 tiamar: as in familiar with the code and contributors 18:47:58 bknudson: yep 18:48:13 henrynash, we did an internal job to the clients authenticate using keystone v3 18:48:16 that bakes a question, why keystoneclient not part of oslo then? 18:48:29 if that's a common integration point 18:48:37 gyee +1 18:48:40 henrynash, : i'm not familiar 18:49:33 gyee: interesting 18:49:56 python-keystoneclient is already a library... not sure why it needs to be an oslo libarary? 18:50:23 bknudson, what is oslo then? 18:50:38 https://pypi.python.org/pypi/python-keystoneclient 18:50:55 https://pypi.python.org/pypi/oslo.config/1.1.1 18:51:12 I mean functionally 18:51:23 oslo provides their common libraries, and then there's oslo-incubator 18:51:33 "common" 18:51:47 like oslo.config is a common library 18:51:48 so pretty sure for H, we won't change this 18:51:57 the path we were on was: 18:52:23 1) we would release new version of python-keystone client that contained the new v3 auth 18:52:49 2) we would work with the other project clis to use the client lib 18:52:57 £ 18:53:17 join the euro-zone already 18:53:26 :-) 18:53:29 #action henry-nash to follow up on status of this and discuss with other cli leads 18:53:43 (oops, not sure where the money came from!) 18:53:44 so just the v3 auth apis, not the whole shebang 18:54:07 I could use some sterling guvnah 18:54:11 gyee: well would the other apis ever get used by another cli? 18:54:27 probably not 18:54:37 the openstack cli uses the libs 18:54:40 so does it make sense for v3 auth to be in oslo? 18:55:02 gyee, why wouldnt it? 18:55:16 its common right? Or we want it to be common 18:55:23 topol, it should 18:55:36 the common crypto stuff is already there 18:55:46 gyee: that would makes some sense, just the v3 auth part 18:56:01 https://review.openstack.org/#/c/28471 18:56:05 auth should be there as well 18:56:57 anyone have a reason why v3 auth shouldn't be in oslo 18:57:04 that's a good candidate for the SecurityImpact tag. 18:57:31 I don't see what we gain by putting it in oslo... they can already access it in python-keystoneclient. 18:57:53 are we saying oslo-incubator ? 18:58:17 If we put it in oslo-incubator, now we have to go through the work of importing it into all the other projects 18:58:18 openstack.common.auth 18:58:41 consistency, common integration point, stable interface (hopefully) 18:58:50 gyee: hmm, so that's different 18:58:55 OK, 2 mins to go 18:59:04 There's probably other keystoneclient function that should go in a common location... 18:59:09 service catalog handling 18:59:14 #topic open discussion (!) 18:59:20 bknudson, sure 18:59:30 I think catalog should be there as well 18:59:35 catalog parsing 19:00:19 I think we'll have to continue that discussion elsewhere 19:00:24 #endmeeting