18:01:20 #startmeeting keystone 18:01:20 Meeting started Tue Feb 2 18:01:20 2016 UTC and is due to finish in 60 minutes. The chair is stevemar. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:01:21 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:01:23 The meeting name has been set to 'keystone' 18:01:29 #link https://wiki.openstack.org/wiki/Meetings/KeystoneMeeting#Main_Agenda 18:01:37 light-ish agenda today 18:01:54 #topic DocImpact 18:02:02 o/ 18:02:15 there's going to be a change in the way docImpact works now 18:02:31 oh good i wont ever use it now >.> 18:02:33 oh wait... 18:02:33 we'll be opening bugs against the keystone project, not the docs team 18:02:36 j/k 18:02:48 \o/ 18:02:59 will we be responsible for the docs repo? 18:03:03 stevemar: does it auto tag the bug as "Doc"? 18:03:05 are we supposed to clean it up and reassign it to docs? 18:03:18 stevemar: because if it just randomly create doc bugs, i think they'll get lost-ish 18:03:23 (hi) 18:03:39 i figured there were going to be a bunch of questions, i dont have the answers, but i can forward to lana 18:03:41 bknudson: no we're supposed to do the documentation i think or verify... it 18:03:53 but to be fair, i don't see a benefit for a docimpact bug. 18:03:57 never did see the benefit 18:04:15 yes, who needs accurate docs. 18:04:20 notmorgan: bknudson i think the plan is have them auto tagged with 'docs' 18:04:23 or doc 18:04:33 bknudson, just buy the O'Reilly book 18:04:40 bknudson: opening a random bug that says "hey this is a docimpact" vs before merging require the docs to be written 18:04:55 notmorgan: which is what we've been doing 18:04:57 I could write my own orieilly book to cash in on the lack of community involvement in docs. 18:05:00 bknudson: if the bug was in a team not keystone, it made sense, but this seems like it's pointless. 18:05:45 anyway, just my $0.02, if we already enforce docs written, the DocImpact flag is fine... but i wouldn't wnat it to open a bug 18:05:52 notmorgan: plus, we've been enforcing reno now, which is nice 18:06:25 i can see the flag as useful to look at the log and see what was doc impacting. but anyway... i've voiced my opinion 18:06:36 notmorgan, so, I could see there being a benefit if the workflow was something like this: 18:06:45 1. Docimpact, assign bug to origianly developer 18:07:03 2. Dev fills in the necessary info into the bug and assignes to the doc team to integrate in the right place 18:07:06 i think the only question is the identity upgrade and install bits that are owned by the docs team 18:07:18 ayoung: i don't think anything goes to the doc team here. 18:07:32 lets try it for a while and see what happens. I've never built the docs myself. 18:07:46 o/ 18:07:46 maybe we'll like it. We seem to enjoy writing anyway 18:07:51 I think at the last summit (or maybe last 2 summits) the docs team was saying they'd like to move the docs to the dev teams. 18:07:57 bknudson: right. 18:08:16 But I haven't heard that that's happened 18:08:17 bknudson: hence the reason i don't see a benefit for a bug to be opened. but *shrug* 18:08:37 bknudson: and if the bug is opened and the docs team still owns it all, i don't see a win for us to have bugs against keystone. 18:08:42 notmorgan: i think it's just a way to migrate for folks that were using the tag in the first place 18:08:43 bknudson: what docs ? api-ref ? 18:09:05 stevemar: anyway my $0.02 of input 18:09:12 samueldmq: all the docs -- admin guide, user guide, config guide, install guide, ... whatever else we have 18:09:20 yep 18:09:21 once it's all over to us i'd like to revisit disabling the "auto open a bug against keystone". 18:09:27 bknudson: got it 18:09:36 and just make sure we have docs when we merge the stuff. 18:09:37 (has always thought we should be writing our docs anyway, but hey….) 18:09:51 Where are our docs anyway? 18:10:02 ayoung: almost 100% in our repo atm 18:10:02 henrynash: your wish is now coming true 18:10:12 just not the admin/upgrade guides 18:10:17 notmorgan, openstack/keystone/docs 18:10:20 fwiw the thing i like about have docs owned by a separate team is that it ends up being more consistent across projects 18:10:22 ayoung: yeah. 18:10:24 http://docs.openstack.org/ 18:10:27 (oh yes, I remember the saying now: be careful for what you wish for….) 18:10:30 repo? 18:10:38 ayoung: in the main keystone repo. 18:10:46 and specs repo for the cannonical specification [as you know] 18:11:07 lbragstad: I think that’s a good point…I’ve also though that sperate team should craete the style, order etc….but not the content 18:11:10 ayoung: tox -e docs! 18:11:14 lbragstad: i think we'll see a drastic reduction in doc consistency and quality, but i know the doc team doesn't scale 18:11:21 http://git.openstack.org/cgit/openstack/openstack-manuals/ 18:11:31 ayoung: that is all being shuffled around afaik 18:11:39 http://git.openstack.org/cgit/openstack/openstack-manuals/tree/doc/install-guide/source/keystone.rst 18:11:46 ayoung: so, let steve ask lana 18:11:50 ++ 18:11:55 notmorgan agreed - but from an u-x perspective, it's nice to see the consistency when referencing docs from different projects 18:12:04 put a follow up item for next weeks meeting...next topic? 18:12:14 yep 18:12:20 #topic ISO27001 Compliance 18:12:23 ayoung: g'head 18:12:59 I can't afford access to ISO standards 18:13:06 OK...so, do we need to comply ? 18:13:07 bknudson: lol 18:13:11 ayoung: long term, yes 18:13:13 And is there any way to avoid it 18:13:18 bknudson: me either 18:13:19 I think I agree 18:13:27 ayoung: but this will follow into the HIPPA/PCI-DSS type convos 18:13:38 I think we need to have a set of requirements for the SQL backend, because you cannot deploy without them 18:13:55 which i'm headed to Seattle to start collecting info on thursday. 18:14:05 there will always be service users in the SQL backend, and I think a best p[ractice there is to try and not do password for those users 18:14:20 it's all similar vein and requires concerted effort to move that way/document/etc 18:14:20 why can't service users go in the LDAP backend? 18:14:20 notmorgan: PCI stuff Thursday? 18:14:20 the use case, though, that I think clinches it is Public Cloud Customers 18:14:38 bknudson, for some cases, you don't have write access 18:14:42 dstanek: going to talk w/ bluebox on what they're doing 18:14:55 bknudson, but they could go in a deployment specific LDAP 18:14:57 dstanek: and what they've had to change / are changing to meet the requirements 18:15:06 notmorgan: nice, i can't wait to hear 18:15:17 so, could we do a deployment with all users in LDAP, only if we don't care about adding new customers, I think 18:15:35 so, let me throw this in the Lap of the RAX folks: how do you need this to look? 18:15:46 bknudson: many enterprises are not willing / able to let you touch their LDAP server just to deploy openstack 18:16:00 My assumption has been that provisioning on new customers is done through a systemn outside OPenStack. 18:16:37 dolphm, so, two distinct things. You are right about Corporate LDAP, but if a place need compliance today, they could run a separate LDAP server (with compliance guaranteees) just for service users 18:17:04 YOu could, in theory, run OpenStack with no users in SQL at all. 18:17:11 lazy customers are king, I guess. 18:17:21 but that avoids a real use case: how do I add customers to my cloud? 18:17:35 if somebody signs up to do the work then let's go ahead. 18:17:56 bknudson, well, I am more asking from a "it was proposed and Adam kneecapped it. Was Adam right?" 18:18:00 perspective 18:18:23 I think you are right, doesn't mean we can't support it now. 18:18:24 what I am saying is, I think I am not longer opposing compliance in the SQL backend, provided we can show it is required.... 18:18:29 just for fun 18:19:10 gyee is not here, this was his issue. Lets move on. 18:19:19 I also agree. We tried pushing onto ldap / saml but that didn't work. 18:19:36 ayoung: ++ agreed, I think we look at the requirements…if it is needed to hel to continue accelerating momentum of OpenStack, we shoudl do it…..it is perspiration, not inspiration to do this 18:19:36 who's signing up to do the work? 18:19:44 adding users to a sql backend, in the same of a public cloud, doesn't seem outrageous 18:19:48 what has to be done to support it? 18:20:14 stevemar, the thing is, the user abstraction in Keystone does not seem to be sufficient for an actual user database 18:20:19 since nobody can afford the standard it's tough to tell. 18:20:25 There is no contact info ,etc 18:20:43 dstanek: ++ is there a spec that outlines the impact on / proposed changes to keystone? 18:20:45 bknudson, forget the actual standard, I'm also referring to the request for passwrod rotation etc 18:21:17 dolphm: true, at cern our ldap is a single source of truth about users, shared accross many services. our cloud is just one of many. 18:21:37 i like the SQL backend and don't want it to become a forgotten step child 18:21:38 marekd, and you do not add new users via Horizon 18:22:13 ayoung: not really 18:22:14 dstanek: a lot of people like the sql backend, and i think would just like to see more capability in it 18:22:30 ayoung: most of the password "features" are trivial to implement and maintain 18:22:32 dstanek, So I think that it has the potnetial to be "used because it is there" which is not a great option 18:22:42 so i have a real case I was asked about 18:22:47 domain admin in SSO / IDP 18:22:51 i wrote many of them in 2014 :( 18:22:56 each user for the domain after that is SQL based 18:22:59 ayoung: users will have projects created given they are in a specific e-group but it requires manual interaction (somebody validating request and running the script) 18:23:03 dstanek, do you guys need that? 18:23:03 * lbragstad thanks dstanek 18:23:04 dstanek: restore patch 18:23:33 is this for M? We could probably get it done. 18:23:43 if dstanek has the code all ready 18:23:50 stevemar: sure. was planning on doing that on to of rderose's work 18:23:54 dstanek: how does this play witht he shadowusers 18:24:14 notmorgan: looks like dstanek has already thought about that :) 18:24:16 bknudson: lots of rut, but should not be terrible to revive 18:24:20 hehe 18:24:33 I'm less worried about the complexity of the Password code than giving the wrong impression. I think a lot of people use SQL because they think they are supposed to, and then have this silo of identity. My real question is whether there is a must have use case for SQL Identity, and, if so, what are the requiremetns 18:24:45 dstanek https://review.openstack.org/#/q/status:abandoned+project:openstack/keystone+branch:master+topic:bp/password-rotation 18:25:15 ayoung: I’m not so sure they use it because they think they are supposed to…. 18:25:16 ayoung: if we run a public cloud, and have customers that aren't huge enterprises, how do they sign up? 18:25:19 lbragstad: there are a few other patches too that i showed Ron at the Midcycle 18:25:28 Identities as a Service 18:25:29 stevemar, and that is the $1000000 question 18:25:32 ayoung: if they have a corpaorate directory already, they’ll use that 18:25:34 because you can't bill from Horizon 18:25:41 dstanek gotcha - those seemed to be the ones with a common topic 18:25:43 ayoung: if they don’t, then they’ll use SQL 18:25:44 henrynash, and yes to that, too 18:26:03 public cloud seems to be the use case 18:26:04 ayoung: setting up LDAP is hard compared to our SQL backend 18:26:17 ayoung: they don't want to federate, and they dont have an ldap handy... sql is the only option 18:27:02 ayoung: there are a lot more sql admins than there are LDAP admins in enterproses 18:27:04 there will be bugs and they'll probably be security vulnerabilities, but whatever. 18:27:12 stevemar, we show how to do LDAP with devstack. THat is not a real barrier to acceptance 18:27:13 and SQL is already needed for most of openstack 18:27:16 and keystone 18:27:25 so, it's a tech they have the resources to maintain internally 18:27:27 and consume 18:27:29 henrynash, but the SQL admins know nothing about passwords or compliance ,either\ 18:27:35 adding LDAP or SSO is often harder. 18:27:40 seems like any org already has a way to do identities 18:27:56 can I just create users with POST /v3/users on rackspace? 18:27:57 but public cloud tends to be the main driving use-case 18:28:00 bknudson: yes 18:28:06 ayoung: no….but they are comforatble running and maintaining an SQL server…and backing it up, restoring it when disaster strikes etc. 18:28:11 My position thus far has been SQL for Proof of concept, LDAP for enterprise deployments 18:28:20 keystone now has three difficulty levels, easy:sql, medium:ldap and hard:sso 18:28:32 now, with Writable LDAP gone, we have no story for secure creation of new identities 18:28:40 stevemar: med-hard, multi-ldap with SQL 18:28:50 hehe 18:28:55 notmorgan: :-) 18:29:04 ayoung: i think public cloud has a use case here 18:29:27 stevemar, I suspect that it is the case, but I also suspect that, if you push at it, they are really using a more complex customer management system 18:29:43 this is mostly a public cloud use case... or an org that uses cloud-local users except for domain admin 18:29:55 where domain-admin is locked down to things like LDAP or SSO 18:29:56 and isolated private clouds 18:29:59 ayoung: like a different ldap? 18:30:19 henrynash: this is basically what domain-specific backends support in a context of public cloud 18:30:20 stevemar, there are CRM apps out there, Some LDAP, some SQL 18:30:31 some opensource, and many, I suspect, custom 18:30:37 henrynash: you can attach an LDAP server if you have one, or just share SQL if you don't have anything 18:30:39 samueldmq: yep 18:30:44 CRM= Customer Relationship Management 18:31:10 ok... does anyone think we must not improve the identity SQL backend to support stronger passwords/etc.? 18:31:15 My unstated assumption thus far is CRM is another WebSSO integration 18:31:21 henrynash: maybe we should allow mapping SQL backends (vc only LDAP backends ) ? 18:31:21 It would be nice if there was a spec saying all that was being added. 18:31:23 bknudson, I'm still not sold 18:31:29 bknudson: there was a spec 18:31:37 bknudson: dolph has a spec up 18:31:37 bknudson: "make SQL a full Identity manager" or some such 18:31:42 bknudson wouldn't that fall under the pci-dss spec? 18:31:44 so, in that spec, please justify Why the SQL backend needs to be improved 18:31:44 was abanded a while ago...or something 18:31:55 #link https://review.openstack.org/#/c/272396/2/specs/newton/pci-dss.rst 18:31:55 why not allowing mapping SQL backends (for domain-specific backends) as we do for LDAP ? 18:31:59 because I need to that to turn around and explain it to my org, which is very Enterprise Focused 18:32:03 ayoung: ^ 18:32:05 samueldmq: I’d love to support mapping multiple SQL backends, but our current sqlamlchemy support doesn’t support it (last time I checked) 18:32:18 henrynash: I think that should be doable 18:32:19 henrynash, I bet we can make that happen 18:32:26 henrynash: i have some improvements around that i plan on working on shortly 18:32:27 henrynash: true 18:32:37 ayoung, samueldmq: me too….and I think we should try and do that 18:32:41 OK...lets move on to policy 18:32:42 ayoung: send your org this link: https://review.openstack.org/#/c/272396/2/specs/newton/pci-dss.rst 18:32:45 henrynash: it's all based around moving to the new-sql-[non-old-style] facades 18:32:55 #topic Policy and RBAC 18:33:05 ayoung is on a tear today! 18:33:06 henrynash: ayoung: yes and if we get it, no need to make our sql schema more powerful right ? 18:33:09 typing up a storm 18:33:24 we provide the basics and if you want more power, make your own and map it to keystone 18:33:45 OK...so, jamielennox and dolphm have been moving the discussion along on a standard set of roles 18:33:54 i need to make a tally for all the times we've talked about policy in keystone meetings :) 18:33:55 please read the X proj spec, 18:34:11 stevemar: every meeting always 18:34:23 #link https://review.openstack.org/#/c/245629 18:34:28 the spec in X proj ^ 18:34:29 Thanks 18:34:43 so...I want to talk about the ramifications of this and the is_admin_project change 18:35:12 and then i threw together an example to show the impact on keystone's policy, which needs some work: 18:35:14 #link https://review.openstack.org/#/c/274168/ 18:35:17 I tried adding an is_admin_project check to cloudsample, no problem 18:35:33 dolphm, thanks. 18:35:50 ayoung: yep, and it works…I added tests to show that it does (test_v3_protection) 18:36:00 and you can see that our unit tests will need tsome massaging to accept dolph's changes 18:36:13 henrynash, so the question is, what do we do about default policy 18:36:22 and samueldmq had an ideaa..... 18:36:35 (drum roll) 18:36:36 move scope checks to the code 18:36:50 and only leave role checks in the policy, i.e true RBAC there 18:36:52 (readies the gong for the big finale) 18:37:00 samueldmq: ok, so can you be more explicit…. 18:37:01 hehe 18:37:11 So, this will work for Keystone, because in the code we can read the keystone config 18:37:24 so we could check in code to see if admin_porjecr_id is even set 18:37:31 but this won't work for, say, Nova or Glance 18:37:34 and for that... 18:37:42 samuedlmq, ayoung: I still want some more clarity on this…even for keystone 18:37:48 henrynash: project_id:%(project_id)s is removed from policies, they will live in the code, when a request arrives, always check scope 18:37:48 https://review.openstack.org/#/c/242852/ 18:38:09 henrynash, agreed, but I think the short is that is clarification, but all the options are technically feasable 18:38:12 henrynash: if you need global, use project_admin option ayoung implemented 18:38:37 so thingee just pinggedmee with a request to be at the X proj meeting abouit that 18:38:37 samuedlmq, ayoung: so how does a policy line like: rule:cloud_adomin or (role:xyz and project_id:%(project_id)s) work in this new arrangemnt? 18:39:05 henrynash, so, lets define cloud_admin first 18:39:08 I think that is 18:39:18 role:admin and proejct_id=admin_project_id right? 18:39:29 ayong: ok 18:39:31 so we would be checking a separate role based on the scope of the token? 18:39:52 the last comment on the spec from dhellmann indicated he expected to have a global administrator 18:40:08 if we want global admin, use admin_project 18:40:10 henrynash, yeah, global admin is kindof a firm requirement 18:40:16 I've been told that a few times 18:40:19 ayoung: but the scope might be different in the different clauses of the poliy line….matched to a different role 18:40:27 right.. 18:40:28 i wish we had named it root 18:40:32 ayoung: I don’t understand how we do that in code and not lose flexibility 18:40:40 henrynash, How about this 18:40:52 dolphm: then you've have people asking for a sudo command 18:40:52 we perform the role check only on the proejct specific 18:40:59 henrynash: define something like global_roles=[], those ignore scope checks ? 18:41:04 stevemar: fine by me 18:41:06 dolphm: hehe 18:41:16 when we get to the scope check, we can say "don't care if the role check failed" and then make that check both is_admin+_proejct and role 18:41:28 role:admin 18:42:22 actually, the scope check could also accept and "is_cloud_admin" param set earlier, and we could do the whole cloud_admin check in the role layer 18:42:26 that probably makes more sense 18:42:35 samuedlmq, ayoung: and this makes it all easier? 18:42:47 henrynash, it makes it easier to customiZE AND TO SCALE 18:42:59 henrynash: I think this makes our policy more consistent with what others do (eg nova) 18:43:28 (remains unconvinced until sees examples of v3cloudsample, not our niddy policy.json) 18:43:36 henrynash: and is a necessary step towards policy 18:43:39 henrynash, we 've coded what "cloud_admin" means in the policy file, but that has to be run after the database call to fetch objects. I'd like the role check to preceed that, and be customizable by end deployers 18:44:24 so cloud_admin could be soemthing that we check in the role, still, and we then just need to let the scope check have enough information to process either with or without cloud admin 18:44:31 if you could put names in the policy file you wouldn't need to update cloud_admin. 18:44:42 bknudson, what kind of names? 18:44:51 usenames? 18:45:00 user 18:45:01 ayoung, samueldmq: you guys probably have this all thought out, but I’m not sure we even agree on the nomenclature in the things you are describing 18:45:26 henrynash: ++ 18:45:27 cloud_admin uses admin_domain_id -- so domain name 18:45:34 henrynash, so...I think we can duplicate the cloud_admin check in the role check and scope check and it will work. 18:45:50 bknudson, yeah, that was henrynash ' 18:45:51 what’s a role check? what’s a scope check? 18:45:51 henrynash: btw I thought we didn't want cloud_admins to be able to touch a given project without rescoping right ? 18:45:54 s origianl approach 18:45:56 and that still works 18:46:09 but people have asked us not to force them to edit upon deployment 18:46:15 henrynash: only the global admin which is available using the admin_project should be enough, shouldn't it ? 18:46:26 so we need 1) backwards compatible, 2)non editing 3)secure 18:46:33 if you're doing more than 1 deployment then automate it. 18:46:40 henrynash, I think for startes we duplicate the check 18:46:54 so, for, say, compute:create_server 18:47:10 henrynash: role check is 'role:service', scope check is 'project_id:%(project_id)s' 18:47:16 the role check would be role:compute_server_write or rule:cloud_admin 18:47:20 and the scope check would be 18:47:39 project_id:server.project_id or rule:cloud_admin 18:47:52 yes, and in nova the check is in the code 18:47:55 if we can find a way to make that clean.... 18:48:02 12 minute warning 18:48:04 deployers can only change the role part of the check, which is in the policy 18:48:14 the scope checks are likely to move into the code, as samueldmq suggested,. The Nova team is already moving this way 18:48:38 thanks lbragstad 18:48:42 ayoung: I think they've been always this way 18:48:47 gotta cut this one off in 2 18:48:53 ayoung: still don’t see how this works for complex ploicy rules where more than one role check is involved and needs to be matched top a specific scope check 18:49:24 ayoung: we need a real spec, with real reasons of why to do this, and explaining how we are not losing the flexibility we give deployers today 18:49:26 perhaps ayoung and I should work more with henrynashon this and come back next week 18:49:31 as we're running out of time 18:49:44 probably 18:49:47 and we still have another topic to cover 18:49:55 lets switch gears to devstack 18:49:58 henrynash: ++ 18:50:06 #topic Devstack, identity v3, and breaking the world 18:50:11 samueldmq, ayoung: happy to 18:50:16 ++ 18:50:26 so, we broke a lot of things on friday 18:50:27 henrynash, I can write that up. I only know realized the solution was to duplicate the admin override check at both layers, and I need to think through the ramifications 18:50:36 sdague covered it here: http://lists.openstack.org/pipermail/openstack-dev/2016-February/085497.html 18:50:37 I like the responses in the email that said "tough" 18:50:39 ayoung: ok 18:50:53 bknudson: yeah, gordc was representing :] 18:51:06 one last thing: please approve the Implied Role Spec 18:51:20 OK, I'm done 18:51:24 ayoung: thanks 18:51:25 I guess it's difficult to write scripts that work with v2 and v3. 18:51:41 since apparently things broke when the v3 change was reverted. 18:51:55 bknudson: almost all was clients [aka novaclient] and things that use tempestlib 18:51:55 bknudson: yeah - i was wondering / hoping, folks had any bright ideas on how we could make sure this doesn't happen again 18:52:18 i created an etherpad to jot down ideas: https://etherpad.openstack.org/p/v3-only-devstack 18:52:18 if we never change anything it'll never happen again. 18:52:30 doesn't a try v3, fail and fallback to v2 make sense? 18:52:30 so, let's require v3 every friday in the gate until people adapt? 18:52:31 basically we need to make changes (use http://codesearch.openstack.org/ ) to fix the issues 18:52:31 the first problem is that the tempest tests doesn't covered that behavior 18:52:44 and set a date where we flip over, knowing we'll have fallout/cleanup 18:52:45 bknudson: oh we'll keep that as a backup idea 18:52:47 before that change (and after the revert) do we even produce a V3 rc file? 18:52:56 ayoung: yep 18:52:59 we do so now 18:53:04 ayoung: we did 18:53:08 in the reverted change 18:53:09 devstack creates a cloud.yaml file 18:53:22 with different clouds -- one of them is v3 18:53:28 almost everything that broke is stuff not on KSA or things that encode bad habits directly 18:53:40 if we set a date for change over [early N?] 18:53:41 should be --os-cloud devstack-admin-v3 18:53:52 knowing we will break things, and will do clenaup 18:53:58 i think that is correct 18:54:07 and we do our best to cleanup the last things between now and then 18:54:22 coordinate with sdague and mtreinish on that front. 18:54:23 we should try and fix all the projects now so the switch over in early N is less kablamo 18:54:24 So, what was the actual change made? 18:54:32 cloud.yaml is like, newish 18:54:33 ayoung: devstack defaulting to v3. 18:54:43 there are a number of things not using OCC/KSA 18:54:52 ayoung: https://review.openstack.org/#/c/271508/ 18:55:08 getting everyone off ksc.session will be a big win 18:55:20 notmorgan: how is the migration to ksa going for all the projects? 18:55:21 notmorgan: ++ 18:55:34 getting the clients to use OCC/KSA for constructing is the other hurdle 18:55:42 i think some folks were interested in helping out? 18:55:44 so. nova is on KSA, neutron is on ksa, 18:55:47 stevemar: I've senn magnum, for example, and it has a bug saying that it should use ksa 18:55:51 seen* 18:56:00 htruta: assume the projects can't/wont do that change 18:56:19 because largely they don't have the bandwidth or time to ramp up on the internals to know how to make the change over non-painful 18:56:33 htruta: yeah, the other projects may not have the knowledge to do the change, we may have to do it for them 18:56:42 http://codesearch.openstack.org/?q=from%20keystoneclient%20import%20session&i=nope&files=&repos= 18:56:51 that is everything using keystoneclient.session 18:56:55 #link http://codesearch.openstack.org/?q=from%20keystoneclient%20import%20session&i=nope&files=&repos= 18:57:25 this is all pretty ridiculous -- why do you need to specify the version. 18:57:29 stevemar, can't we teach them too? Some blog post or stuff like that 18:57:43 ironic are doing this now.... https://review.openstack.org/#/c/236982/ 18:57:47 htruta: we've tried. if we want this, we need to do this 18:57:50 ourselves. 18:57:58 htruta: what he said ^ 18:57:59 some projects are going to beat us to the punch 18:58:15 notmorgan: heh. makes sense 18:58:24 bknudson: we can look into that 18:58:33 so, getting us to KSA everywhere and using OCC for client construction will mean version specification will become less of an issue 18:59:07 we're at time 18:59:14 thanks for attending everyone 18:59:15 and that will help aleviate problems excpet in cases like heat where the project needs v3 keystone APIs 18:59:22 but heat isn't a problem 18:59:29 (vs. just auth) 18:59:31 #endmeeting