15:00:38 #startmeeting keystone 15:00:38 Meeting started Tue Jul 12 15:00:38 2022 UTC and is due to finish in 60 minutes. The chair is dmendiza[m]. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:38 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:38 The meeting name has been set to 'keystone' 15:00:47 #topic Roll Call 15:01:01 o/ 15:01:06 Courtesy ping for admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek 15:01:13 As usual teh agenda is over here 15:01:21 o/ 15:01:29 #link https://etherpad.opendev.org/p/keystone-weekly-meeting 15:01:49 o/ lurking, in another meeting 15:02:46 Cool, let's get started 15:03:00 #topic Review Past Meeting Action Items 15:03:55 #link https://meetings.opendev.org/meetings/keystone/2022/keystone.2022-07-05-15.11.html 15:04:04 I'm still kicking this can down the road 15:04:16 #action 15:04:16 dmendiza[m] to try to run keystone from a fresh clone 15:04:49 #action dmendiza[m] to try to run keystone from a fresh clone 15:05:41 #topic Liaison Updates 15:05:52 This week is milestone Zed-2 week 15:06:32 #link https://releases.openstack.org/zed/schedule.html 15:07:08 I haven't seen any automatic patches come through for the release 15:07:19 but I haven't looked very hard 15:07:25 I'll make sure we get a release out this week. 15:07:38 #action dmendiza[m] to make sure we get a Zed-2 release out 15:07:53 Any questions/comments about Zed-2 ? 15:10:22 OK, moving on 15:10:24 #topic OAuth 2.0 15:10:30 h_asahina: any updates this week? 15:10:46 yes, i've updated the patch. 15:10:55 https://review.opendev.org/c/openstack/keystone-specs/+/843765 15:11:08 according to the comments you all given me. 15:11:23 Oh great. 15:11:35 We didn't have a reviewathon last week, but I'm happy to see xek_ was able to review it 15:11:46 We'll look at it again this week for the Reviewathon hopefully 15:12:04 thanks 15:12:15 do you have any comments now? 15:12:21 or questions 15:13:14 I don't have any yet ... (haven't had a chance to dig into the spec) 15:13:17 knikolla: ? 15:14:43 no unfortunately 15:15:32 okey. please do it on the gerrit if you have. I'll update the patch asap after you comment on it. 15:16:10 Thanks h_asahina 15:16:17 #topic Secure RBAC 15:16:49 #link https://review.opendev.org/c/openstack/governance/+/847418 15:16:58 Just making sure y'all keep an eye out for this review 15:17:22 Looks like gmann is working through another set of refinements for the SRBAC goal 15:19:54 OK moving on 15:20:17 #topic Gate inherited assignments from parent (bbobrov) 15:20:31 #link https://review.opendev.org/c/openstack/keystone-specs/+/334364 15:20:34 bbobrov: around? 15:22:19 Looks like a no 15:22:21 le'ts move on 15:22:34 #topic Keystone identity mapping to support project definition as a JSON 15:22:43 #link https://review.opendev.org/c/openstack/keystone-specs/+/748748 15:23:02 rafaelweingartner: around? 15:24:55 Looks like also no 15:25:03 OK, let's move on to the bug review 15:25:09 #topic Bug Review 15:25:54 There's a downstream bug I wanted to get your opinion on knikolla 15:26:32 The use case is: User has an application credential that expires in 5 minutes 15:26:52 Within those 5 min the user uses the appcred to get a token 15:27:17 the token is issued with the default token duration in keystone.conf (default 1hr) 15:28:01 From the bug reporter's point of view, this is an issue because the user is able to extend their access by the default token duration 15:28:50 knikolla: is it reasonable to expect that tokens issued using an appcred should expire at the same time the appcred expires 15:28:52 ? 15:29:37 good question. 15:30:20 the application credential is an authentication method, therefore a user can authenticate until that method is valid. 15:30:40 a different question would be, does changing a user's password invalidate a user's tokens? 15:32:51 hmm 15:32:56 Gut feeling is yes 15:33:17 let's say you're changing the pw because you think the old pw might be compromised 15:33:38 yeah, you don't want old tokens being able to change the password again 15:33:43 in that case you'd want any outstanding tokens to be invalidated to make sure no one else is using your account 15:34:11 d34dh0r53: you also need the old password to change the password, just a token is not enough IIRC 15:34:38 ahh, I was just thinking about that, but regardless what dmendiza[m] said also applies 15:35:11 You kind of see it in some services that let you "sign out everywhere" when you change your pw 15:35:13 if changing a password (invalidating an old authentication method) revokes tokens, then i think there is a good argument for expiring app creds to revoke tokens. 15:35:29 (less about the general case, and more about the keystone case) 15:35:49 Yeah, that's a good argument. 15:36:00 OK, I was on the fence on this one, but you've convinced me that we should probably fix that 15:37:18 Moving on to upstream bugs ... 15:37:20 #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 15:39:20 #link https://bugs.launchpad.net/keystone/+bug/1981365 15:39:46 > Do not allow updating ephemeral users attributes via API 15:40:20 Seems pretty straightforward 15:40:47 seems expected behavior to me 15:40:52 idp is the source of truth 15:41:22 This could be a good one for d34dh0r53 since he's our Federation guy. 15:41:38 ack 15:41:57 i'm against it 15:42:44 🤔 15:43:01 i think a documentation fix is more appropriate. the linked spec also proposes changing the api in a non backwards compatible way. 15:43:32 the fundamental thing to understand is that the IdP is the source of truth, it SHOULD overwrite 15:44:00 the CRUD API for federation is there mostly to provide a way to create users ahead of time and query them. 15:44:57 Hmm... I need to look into the API more to have an educated opinion. Is the API sued for both regular users and federated users? 15:45:24 yes 15:45:41 you can modify a users' "federation attributes" 15:45:48 hence turning a normal user into a federated user 15:46:15 there is no practical difference between an ephemeral user and a normal user created from the API with federated attributes. 15:55:57 > changing the api in a non backwards compatible way 15:55:57 Is that because there would be a new response status? 🤔 15:56:46 yes, for a specific type of API call the behavior would change 15:57:16 but outside of that, i disagree with the direction 15:59:19 K, 15:59:35 Can you leave a comment on the bug? 15:59:40 And that's all the time we have 15:59:42 will do 15:59:46 Thanks for joining, y'all! 16:00:04 #endmeeting