18:00:02 #startmeeting keystone 18:00:03 Meeting started Tue Mar 28 18:00:02 2017 UTC and is due to finish in 60 minutes. The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:04 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:00:06 The meeting name has been set to 'keystone' 18:00:10 ping agrebennikov, amakarov, annakoppad, antwash, ayoung, bknudson, breton, browne, chrisplo, cmurphy, davechen, dolphm, dstanek, edmondsw, edtubill, gagehugo, henrynash, hrybacki, jamielennox, jaugustine, jgrassler, knikolla, lamt, lbragstad, kbaikov, ktychkova, morgan, nishaYadav, nkinder, notmorgan, portdirect, raildo, ravelar, rderose, rodrigods, roxanaghe, samueldmq, SamYaple, shaleh, spilla, srwilkers, 18:00:11 StefanPaetowJisc, stevemar, topol, shardy, ricolin 18:00:20 hi all 18:00:27 o/ 18:00:27 #link https://etherpad.openstack.org/p/keystone-weekly-meeting 18:00:32 o/ 18:00:34 o/ 18:00:37 o/ 18:00:43 o/ 18:00:46 lbragstad: turns out my schedule conflict is starting at 11:30 not 11 18:00:54 o/ 18:01:02 o/ 18:01:07 ehlo 18:01:20 o/ 18:01:49 o/ 18:01:52 notmorgan sweet - so we get you for a half an hour! 18:02:59 our attendee list is getting a little large, and my client is showing me most of the folks aren't in the room 18:03:09 figured its time for a roll call 18:03:18 #topic roll call 18:03:37 I've already recorded those who've already raised their hands 18:03:57 o/ 18:04:06 is anyone else here that wants a pre-meeting ping who hasn't raised their hand yet? 18:04:26 we'll be doing this next week, too 18:04:41 i'll aggregate the list together in a couple weeks 18:05:42 alright - moving on 18:05:50 #topic Boston Forum Brainstorming 18:05:58 #link https://etherpad.openstack.org/p/BOS-Keystone-brainstorming 18:06:13 I've started a list to see who is going to be at the forum for sure 18:06:19 and who is still tentative 18:06:23 that's a sad attendance list 18:06:32 o/ 18:06:52 knikolla: ++ 18:07:03 is anyone else planning on being in Boston at this point? 18:07:15 I will most likely be there* 18:07:15 i am 18:07:28 i understand a lot of this is based on corporate approval, i'm trying to get an early feel of who is going to be there 18:07:30 also most likely there 18:07:40 lbragstad: I'll be there 18:08:39 is there anything we specifically want to request sessions for? 18:09:12 (the whole concept of the proposal for projects bits is confusing to me, so i'm just kinda going with the flow based on what other projects are doing) 18:10:18 it sounds like nova is only proposing 3 sessions that are pretty cross-project oriented, which makes me think we should do the same if there is anything cross project wise we need from other folks 18:10:40 lbragstad: are those sessions like in the PTG ? 18:10:49 lbragstad: or user/deployer focused ? 18:10:56 samueldmq i have no idea 18:11:09 this is the information i have 18:11:10 #link http://lists.openstack.org/pipermail/openstack-dev/2017-March/114456.html 18:11:56 we will always have something to discuss 18:12:01 :) 18:12:05 lbragstad: looks like more general 18:12:14 topics to discuss with ops, with users, with the community-at-large 18:12:25 true - i'm more wondering what we need to know now so that we can propose sessions by April 1st 18:12:55 lbragstad: cool, so we need to brainstorm there, right ? 18:12:57 one of the big ones that keeps popping up for me is the policy work 18:13:01 samueldmq yeah 18:13:14 lbragstad: can we just get a room for some amount of time and decide how to use it later? 18:13:15 i can follow up with the nova folks to see if they'd be interested in a policy session? 18:13:28 lbragstad: sounds good to me 18:13:30 dstanek it doesn't sound like that's is the flow, we have to use proposals 18:14:02 topic1 - 1 hour, topic2 - 1 hour, etc. 18:14:29 #link http://lists.openstack.org/pipermail/openstack-dev/2017-March/114399.html 18:14:44 i will definitely not be at the forum 18:14:48 #link http://lists.openstack.org/pipermail/user-committee/2017-March/001856.html 18:15:03 that ^ note specifically requires abstracts 18:15:58 "We are looking for a good mix of project-specific, cross-project or 18:15:58 strategic/whole-of-community discussions, and *sessions that emphasize 18:15:59 collaboration between users and developers are most welcome!*" 18:17:51 is there anything other than policy that folks think we need a specific session for? 18:18:29 anything keystone-horizon-ish? 18:19:05 like domain-admin configuration? 18:19:16 and the support in horizon for it? 18:19:51 yeah, as well as adminness in general (e.g. recognizing is_admin_project) 18:20:24 henrynash would the intended direction be that developers from horizon and keystone are there describing it to operators? 18:20:41 henrynash which sounds more informative, or do we want feedback? 18:20:50 horizon as the classic example of how to interprest these things 18:21:00 yes, that’s probably true, howver 18:21:45 i can follow up with robcresswell to see what his thoughts are on a cross-project proposal 18:22:01 #action lbragstad to follow up with nova on a cross-project proposal for RBAC/policy 18:22:29 #action lbragstad to follow up with horizon on a cross-project proposal for Boston 18:22:38 lbragstad: limits maybe? 18:22:44 dstanek oo 18:23:03 yeah - that'd be another good cross-project one 18:23:56 #action lbragstad to follow up on limits session 18:24:11 nice 18:24:11 i assume we'll need nova, cinder, neutron, etc... in there too 18:24:26 yeah 18:24:39 dstanek good suggestion, 18:24:46 can anything think of anything else? 18:25:02 rderose and samueldmq are doing talks on PCI, so i feel like that will be pretty well covered 18:25:31 just samueldmq as I didn't get approval to go :( 18:25:32 lbragstad: ++ rderose won't be able to make it though 18:25:38 ^ :( 18:25:47 rderose ah! :( 18:25:52 samueldmq rderose thanks for the update 18:26:04 what about a "beat up keystone" session? or some sort of feedback thing 18:26:25 dstanek yeah - have that documented in the etherpad, but I don't know if that is something that we need a proposal for? 18:26:34 i can check with mrhillsman though 18:26:46 something tells me he'd be the guy to ask 18:27:34 #action lbragstad to check and see if operator feedback sessions need proposals 18:27:44 ok - sounds like i have some work to do 18:28:09 if anyone has additional ideas that fit the criteria, please ping me in -keystone 18:28:12 a PTLs job is never done 18:28:24 since we'll have to get things proposed this week 18:28:30 dstanek you're telling me 18:28:34 dstanek: ++ 18:28:45 alrighty - i think we're good to move on 18:28:51 #topic pike specs 18:29:08 #info 2.5 weeks until Spec Proposal Freeze 18:29:17 #info 10 weeks until Spec Freeze 18:29:31 we have several specs up for review and several of them are pretty indepth 18:29:58 #topic pike specs: persistent group membership in federation 18:30:02 breton o/ 18:30:14 breton you've been wanting to talk about this for a long time 18:30:26 yep 18:30:34 #link https://review.openstack.org/#/c/437533/ 18:30:44 so at the PTG we talked about federation 18:30:51 and that group membership was not persistent 18:31:06 we decided that we are just going to document it 18:31:11 yup - iirc the idea was to provide better documentation for operators to handle that case 18:31:27 but then at the next session i suggested to add an ability to make group membership persistent 18:31:38 by adding an option to a mapping 18:31:43 and we didn't really discuss it 18:31:48 so i wanted to get some feedback on the spec 18:32:09 breton does the latest version of the spec include the details about using mapping? 18:32:17 about using the mapping?* 18:32:38 looks like the last upload was Feb 23 18:32:42 lbragstad: not sure what you mean 18:32:47 persistent_membership is what i suggest there 18:33:20 breton: was there already a patch submitted for the doc update? 18:33:37 dstanek: no 18:33:51 although i thought i was relatively clear on the nature of groups when i overhauled that doc 18:34:16 this is the relevant bug report 18:34:18 * lbragstad #link https://bugs.launchpad.net/keystone/+bug/1589993 18:34:18 Launchpad bug 1589993 in OpenStack Identity (keystone) "cannot use trusts with federated users" [High,In progress] - Assigned to Boris Bobrov (bbobrov) 18:34:22 i really want to have persistent membership because role assignments from https://docs.openstack.org/developer/keystone/federation/mapping_combinations.html#auto-provisioning _are persistent_ 18:35:36 i thought they were not persistent, just the project was created. :/ 18:35:54 knikolla it depends on the mapping 18:36:11 if the mapping specifies a project *in* the mapping, the project reference must contain a role 18:36:29 which is then assigned directly from the shadow user to the project 18:38:00 breton in your approach - would the mapping change in order for keystone to make memberships persistent? 18:38:18 lbragstad: yes 18:39:08 it wouldn't be the default behavior? 18:39:14 ++ it has too for backward compatibility 18:39:34 it wouldn't be the default behavior 18:39:41 i'm 'o' happy, it seems 18:40:05 lbragstad: did a quick check in the code. you are right about the role assignment. 18:40:33 lbragstad: if you changed the default behavior then you break the expectations of existing mappings 18:40:39 knikolla if i wasn't right about it i would be worried since i wrote it ;) 18:40:54 dstanek right - that's one of my main concerns 18:40:59 #action dstanek to check the mapping documentation to make sure the ephemeral nature of the groups is clear 18:41:26 lbragstad: i forgot that :p 18:41:29 i can also see how operators would have a *ton* of stuff to clean up if they started using this feature 18:42:20 since groups is batch processing for users 18:42:30 lbragstad: it would be nice to know if people would use it rather than the default behavior 18:43:05 true 18:43:26 projects like heat would probably like it because it would require less things in order for them to consume federation 18:43:52 lbragstad: how so? 18:44:12 right now we are suggesting the operators place federated users in groups manually 18:44:20 also trusts 18:44:32 before they can use heat which uses trusts 18:44:46 which don't work with ephemeral group memberships 18:45:57 lbragstad: ah i see. it also adds effort to their user provising systems that they have to consider 18:46:06 right 18:46:18 they also have to clean things up manually 18:46:39 regardless, of if the mapping engine makes the group membership persistent or if they do 18:46:48 yeah, anytime a group change in AD (or whatever) they need to "manually" make that change 18:47:04 (which is totally another thing we need to document if we haven't already) 18:47:21 lbragstad: that's why it would be nice to just fix trusts so they don't have to do it at all 18:47:24 ok - so random tangent question, would this be a problem if heat used something like oauth? 18:47:35 instead of trusts 18:47:43 i suggested in the case of a federated trust that we don't do a group lookup, but i'm not sure it that feasible 18:48:17 lbragstad: i think with a little work on our side that would be entirely possible 18:48:35 is it a more appropriate solution? 18:48:37 ...or api keys? 18:48:54 i can ask the same question about api keys, too :) 18:49:03 i thought the underlying issue is that we can't know if the user still has that kind of group permissions. so everything persistent is sketchy 18:49:40 we'd still need to understand the tolerance for the risk of a user no longer being in a group 18:49:54 ok - so oauth might not help us here? 18:50:02 * lbragstad totally thought it might for some reason 18:50:20 knikolla: that's exactly the problem. until they auth again we won't know 18:50:46 lbragstad: it totally could. we just have to understand the tolerance for group membership changes 18:50:48 otherwise its a bunch of duplicated state across identity systems 18:51:23 so if heat wanted to use oauth for federated users, what would that look like? 18:52:17 lbragstad: i assume the user would auth and give heat a token. that token would then have roles back on groups that we can no longer verify 18:54:02 hmm 18:54:05 breton thoughts? 18:55:10 does an oauth idp have an api to check group mempership? 18:55:19 no matter what we run into the same problem. the question is what side is best for the solution or can we just assme the change-group risk for some period of time 18:55:48 dstanek i feel like that has to be a question answered by the deployer 18:56:00 if we provide both in keystone 18:56:16 I thought we talked about making concrete role assignments to solve this 18:56:42 rderose: that doesn't solve group membership changes 18:56:45 rderose i think this is more related to concrete role assignments 18:57:08 s/role assignment/group membership/ 18:57:32 dstanek: right, but it's about the roles 18:57:49 until create user with federated attributes is merged, users have to auth once before they can be assigned concrete roles. with the mapping that is automatic. 18:57:59 but not concrete 18:58:13 if i understand correctly, breton wants an option in the mapping to make it concrete 18:58:16 knikolla: right 18:58:22 rderose: right, that causes the issue of the operator needing to cleanup 18:58:41 information sprawl across identity systems 18:58:53 i think we need more input from operators on this 18:59:33 i'd really just like trusts to 'trust' the group membership (epheral groups) and make the operator responsible for kicking keystone when that changes 18:59:35 lbragstad: ++ 18:59:57 we probably can have it as an option and let ops decide. it's their tradeoff to decide. 19:00:14 alright - we can take this to -keystone 19:00:25 #endmeeting