15:01:01 #startmeeting keystone 15:01:01 Meeting started Tue May 10 15:01:01 2022 UTC and is due to finish in 60 minutes. The chair is dmendiza[m]. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:01:01 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:01:01 The meeting name has been set to 'keystone' 15:01:06 o/ 15:01:19 #topic Roll Call 15:01:22 o/ 15:01:44 henlo 15:02:11 Hi y'all! 15:03:02 As usual the agenda is over here: 15:03:17 #link https://etherpad.opendev.org/p/keystone-weekly-meeting 15:03:25 Courtesy ping for admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe 15:03:41 o/ 15:03:46 #topic Review Past Meeting Action Items 15:03:48 #link https://meetings.opendev.org/meetings/keystone/2022/keystone.2022-05-03-15.26.html 15:03:49 lurking today, conflict with another meeting 15:03:55 We didn't have any 🎉 15:04:23 #topic Liaison Updates 15:04:34 I don't have any updates this week 15:05:11 ... 15:05:15 Although now that I think about it 15:05:22 Zed-1 Milestone is next week 15:05:32 #link https://releases.openstack.org/zed/schedule.html 15:05:42 I'm not sure if we have any deadlines for Zed-1? 15:06:43 I'm guessing probably not 15:09:17 OK, moving on 15:09:21 #topic OAuth 2.0 15:09:27 Do we have any updates this week? 15:09:57 From us no update. 15:11:01 We are planning to apply comments within this month. 15:11:08 thanks h-asahina 15:11:52 thank you too for your review :) 15:12:21 #topic Secure RBAC 15:12:44 We had a pop-up meeting this morning right before this meeting. 15:13:05 We discussed the "service" role spec, and gmann will be updating some comments there with the discussion points. 15:13:25 We also agreed to enable the new defaults in Keystone this cycle 15:13:39 enabled by default, that is 15:13:48 new defaults by default. :D 15:14:00 So we'll work on a patch for that. 15:14:28 The next pop-up will be in 2 weeks on May 24th @ 1400 UTC 15:15:10 Any questions/comments about Secure RBAC? 15:17:31 OK, moving on 15:17:42 #topic Gate inherited assignments from parent (bbobrov) 15:17:49 hi 15:17:50 #link https://review.opendev.org/c/openstack/keystone-specs/+/334364 15:17:59 this spec is from 2016, so we can send it to school soon 15:18:07 haha 15:18:11 originally it was proposed by Henry Nash when he was working on his hierarchical-everything project 15:18:21 i reworked the spec and simplified it 15:18:30 the tldr version is that some projects in the hierarchy need to be exempt from inherited role assignments 15:18:45 my current proposal is to make it as simple as possible. The project has a tag -> it is exempt. Its subtree is not affected 15:19:16 we can also affect the subtree. It should not be much harder, but i do not have a usecase for that - we use an almost-flat hierarchy in my company 15:19:34 please comment and review 15:20:02 i will implement it when if accepted 15:20:54 thanks! makes sense to me 15:23:09 yeah, we'll review the spec and go from there 15:24:06 Anything else on this topic for now? bbobrov ? 15:24:13 nope, thanks 15:24:31 Cool, I'll add the spec to the Reviewathon this Friday 15:25:28 #topic bandit seems to be broken, cannot build keystone from git 15:25:39 I think this is admiyo 's topic 15:25:49 I have not tried to build a fresh clone 15:25:56 so I'm not sure if this is currently an issue? 15:27:46 I'll try to reproduce it this week and see what happens 15:27:52 #topic Bug Review 15:27:58 Let's start with the one that bbobrov added 15:28:07 #link https://bugs.launchpad.net/keystone/+bug/1950325 15:29:03 thank you 15:29:10 i added it on top because it is not new 15:29:13 Past discussion about this bug: https://meetings.opendev.org/irclogs/%23openstack-keystone/%23openstack-keystone.2021-11-09.log.html#t2021-11-09T15:29:30 15:29:25 I am hitting the bug more and more often and would like to fix it 15:29:43 What was the agreement on the way to fix it? Do we return the domains the user has access to? Do we return only 1 domain (the one the token is scoped to)? Do we return all domains? 15:29:54 In my company domain list is basically public, so i do not have a preference 15:31:31 if it's domain scoped it should probably only return the domain in the token 15:32:20 or at least follow the same behavior of listing projects with a project scoped token (?) 15:33:09 hmm, i wonder what the behavior will be 15:33:13 let me try real quick 15:35:57 i think my comment from back then makes sense. if /projects returns the domain in the unfiltered list, then /projects?is_domain=true should also return it 15:36:24 since it's weird to provide a subset that gives you a result not included in the larger set 15:37:07 oh, the flag doesn't act as a filter. 15:37:12 i need more coffee 15:38:17 it does not return the domain 15:38:54 quoting "redrobot sounds like GET /v3/projects?is_domain=true should be the same as GET /v3/domains" 15:39:17 this is also something i was thinking about 15:40:11 also "project list" seems to return projects that i do not have access to 15:40:38 if you are scoped to the domain, you can query the projects in the domain IIRC 15:40:56 i am scoped to a "is_admin" project 15:41:12 (old setup, no system-scope yet) 15:41:30 if you are admin, you can query everything 15:41:43 oof 15:42:16 ok, at least nobody thinks that 40x or empty list is the way to go, right? 15:43:11 it depends on what /v3/domains returns. 15:43:28 i think v3/projects?is_domain=True should be equal to that 15:44:24 ^^^ I still think this too 15:44:26 i don't know if having a role on a domain allows you to query that domain, so empty list may be a valid response. 15:44:30 * dmendiza[m] is formerly known as redrobot 15:45:11 ok. I will then propose a change that will make that request behave the same way as a request to /v3/domains, and we can go from there 15:45:32 sounds good bbobrov 15:45:41 thanks, i have nothing else about this topic 15:45:50 Cool, thanks 15:45:58 Moving on to the rest of the bug review 15:46:06 if you're looking for domains a user can scope to, we also have this https://docs.openstack.org/api-ref/identity/v3/?expanded=get-available-domain-scopes-detail#get-available-domain-scopes 15:46:11 #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 15:47:00 I don't think we've looked at this one yet: 15:47:05 #link https://bugs.launchpad.net/keystone/+bug/1970932 15:47:18 > 15:47:18 Domain Admins possibility for privilege escalation 15:49:37 looks like expected behavior with the current state of the policy world 15:50:08 Yeah, title seems way scarier than it actually is 15:50:19 sounds like is_admin_project is kicking in and just checking the name 15:50:29 oof 15:51:08 so this is most probably solved by the new policy defaults 15:51:39 Yup. I'll comment on there 15:51:49 next 15:51:50 #link https://bugs.launchpad.net/keystone/+bug/1971691 15:52:05 > Support application credentials as a source for EC2 auth 15:52:42 it feels more like a feature request 15:52:54 Yep, sure does 15:53:03 interesting feature idea. extends what we did for oauth 2.0 client credentials using app creds 15:53:18 we could use app creds as an engine for those too. 15:53:36 the reporter and i work in the same company, so i am interested in the feature too, but i do not have a direct understanding the usecase 15:54:02 but the idea is indeed that app creds are used as an engine for ec2 creds 15:54:53 This definitely needs a spec 15:55:58 Yeah, I'll leave a comment to please write a spec with a link to our spec doc 15:56:42 That's it for keystone bugs 15:56:44 moving on 15:56:45 #link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=0 15:56:56 No new python-keystoneclient bugs 15:57:12 #link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=0 15:57:34 No new keystoneauth bugs 15:58:01 #link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=0 15:58:09 No new keystonemiddleware bugs 15:58:19 #link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=0 15:58:25 and no new pycadf bugs 15:58:35 #link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=0 15:58:39 and no new ldappool bugs 15:58:41 ... 15:58:49 And we're just about out of time. 15:58:56 Thanks for joining, y'all! 15:58:59 #endmeeting