15:00:38 #startmeeting keystone 15:00:38 Meeting started Wed Dec 13 15:00:38 2023 UTC and is due to finish in 60 minutes. The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:38 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:38 The meeting name has been set to 'keystone' 15:00:45 #topic roll call 15:00:55 admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla[m], lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m],mharley 15:01:45 o/ 15:01:46 o/ 15:01:51 o/ 15:03:04 #topic review past meeting work items 15:03:10 #link https://meetings.opendev.org/meetings/keystone/2023/keystone.2023-11-29-15.00.html 15:03:33 d34dh0r53 Look into adding/restoring a known issues section to our documentation 15:03:38 no update on this 15:03:41 #action d34dh0r53 Look into adding/restoring a known issues section to our documentation 15:03:48 d34dh0r53 Look into adding/restoring a known issues section to our documentation 15:03:51 nor this :/ 15:03:54 #action d34dh0r53 Look into adding/restoring a known issues section to our documentation 15:04:01 d34dh0r53 email gtema (artem.goncharov@gmail.com) a reviewathon invite 15:04:05 this has been done 15:04:12 d34dh0r53 add reviewathon information to the Keystone Meetings page on the Openstack Wiki 15:04:18 this one is done as well 15:04:27 That does it for the past meeting action items 15:04:28 o/ 15:04:37 thks 15:04:48 next up we have liaison updates 15:04:50 #topic liaison updates 15:04:53 Didn't know that meeting was now... so: o/ 15:04:56 nothing from release or vmt 15:05:07 o/ zigo, welcome 15:05:49 any other liaison updates? 15:06:06 cool 15:06:25 #topic specification OAuth 2.0 (hiromu) 15:06:36 #link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext 15:06:38 #link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability 15:06:40 External OAuth 2.0 Specification 15:06:42 #link https://review.opendev.org/c/openstack/keystone-specs/+/861554 15:06:44 OAuth 2.0 Implementation 15:06:46 #link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls 15:06:48 OAuth 2.0 Documentation 15:06:50 #link https://review.opendev.org/c/openstack/keystone/+/838108 15:06:52 #link https://review.opendev.org/c/openstack/keystoneauth/+/838104 15:07:08 hiromu: any updates or needs? 15:09:26 ok, moving on 15:09:37 #topic specification Secure RBAC (dmendiza[m]) 15:09:46 #link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_ 15:09:48 2024.1 Release Timeline 15:09:50 Update oslo.policy in keystone to enforce_new_defaults=True 15:09:52 Update oslo.policy in keystone to enforce_scope=True 15:12:30 🙋 15:12:34 o/ dmendiza[m] 15:12:35 Heya! 15:13:03 Sorry, only half paying attention. Currently also trying to listen to a company meeting. 15:13:25 Yeah, so I've been updating the policies to allow project-admin to do system things. 15:13:26 ack, me too 15:13:41 I've got a patch up that is (expectedly) failing tempest because of the policy change: 15:13:56 #link https://review.opendev.org/c/openstack/keystone/+/902730 15:14:18 Working on the tempest patch next, and then I'll update this to make the srbac job non-voting 15:14:31 then a follow up to make it voting again once the tempest patch lands 15:15:31 sweet, thanks for the work on that and good find :) 15:16:50 next up 15:17:00 #topic specification Add schema version and support to "domain" attribute in mapping rules (gtema) 15:17:08 #link https://review.opendev.org/c/openstack/keystone-specs/+/748042 15:17:11 this has merged 15:17:19 woot 15:17:23 thanks 15:17:50 I saw a follow on patch that I need to review 15:18:25 yes, now that spec needs implementation and Rafael revived old change 15:18:58 sweet, do you happen to have a link handy? 15:19:19 https://review.opendev.org/c/openstack/keystone/+/739966 15:19:31 thanks gtema ! 15:21:00 cool, moving on 15:21:08 #topic open discussion 15:21:19 domain scoping for "GET /v3/domains" (mhen) 15:21:21 bug: #link https://bugs.launchpad.net/keystone/+bug/2041611 15:21:23 patch: #link https://review.opendev.org/c/openstack/keystone/+/900028 15:21:25 looking for reviewers 15:21:27 Zuul tests fail 15:21:29 "keystone_tempest_plugin.tests.rbac" seems to be the culprit 15:21:31 how can patches of the keystone_tempest_plugin be integrated in a way that the patchset above incorporates it in its testing? (i.e. interlinked patchsets between keystone and keystone_tempest_plugin that depend on each other) 15:22:09 I think this may be an old open discussion item but I wanted to raise it just in case 15:22:51 i am actually not sure that it is a good thing to merge 15:23:08 I'm not either 15:23:17 it feels like a violation of an API stability contract 15:23:51 this is an old broadly used endpoint, and i am sure there are deployments that use the current response 15:24:25 i have a feeling that there was a discussion about this several years ago... 15:26:06 Is it time to talk about py3.12 ? :) 15:27:10 yeah, I think we can remove the previous topic from the open discussion list and see if mhen gets back to us on bbobrov's comments on the review 15:27:19 https://meetings.opendev.org/meetings/keystone/2021/keystone.2021-11-09-15.00.html - it was discussed here 15:27:53 zigo: i think we shall get to it during the bug review, i have filed https://bugs.launchpad.net/keystone/+bug/2046355 15:28:02 I tried building Keystone in Unstable, and this lead me to 2000+ unit test failures. 15:28:18 Most seem due to the way Keystone uses datetime. 15:28:40 For example utcfromtimestamp() is removed from Py 3.12. 15:28:46 See https://docs.python.org/3/whatsnew/3.12.html 15:28:52 previous discussion about the scope for listing domains: #link https://meetings.opendev.org/meetings/keystone/2021/keystone.2021-11-09-15.00.html 15:29:05 I unfortunately didn't have enough time to investigate it enough though ... 15:29:33 But if there's a bunch of you with enough time to try unit testing with 3.12, that'd be super useful. 15:29:45 See how many bugs I need to deal with: https://bugs.debian.org/cgi-bin/pkgreport.cgi?which=maint&data=team%2Bopenstack%40tracker.debian.org&archive=no&raw=yes&bug-rev=yes&pend-exc=fixed&pend-exc=done 15:29:56 zigo: i think that utcfromtimestamp is not removed, but deprecated 15:29:58 We're at 47, we were at 66 yesterday ... 15:30:14 bbobrov: Correctly, but that makes the unit tests fail... 15:30:25 So it got to be fixed. 15:30:30 well, we can probably mute it for now somehow 15:30:47 Why not fixing completely? It didn't seem that hard to do... 15:30:50 zigo we can start by adding a py312 gate, but it's not in scope for 2024.1 15:30:51 #link https://governance.openstack.org/tc/reference/runtimes/2024.1.html 15:31:18 atetime.datetime.utcnow() -> datetime.datetime.now(datetime.UTC) 15:31:36 zigo: well, first of all, they return different string representations 15:31:41 (this is an example from keystone/identity/backends/sql.py line 135, but there are more ...) 15:31:52 zigo: it also needs to be fixed in oslo.utils 15:32:16 Whatever you feel like works will work for me! :) 15:32:25 that's what I was looking for, thanks dmendiza[m] 15:32:27 I would think 2024.2 will have 3.12 as a tested runtime, and we'll likely run into all those issues then. 15:34:04 Once these 2000+ failures are silenced, I believe there will be more to fix, but I have no idea what and how much. 15:34:19 bbobrov: Are you volunteering to try fixing all py3.12 issues ? :) 15:34:57 where do i find py3.12 for that... 15:35:10 dmendiza[m]: It's always been the case that I've been annoying everyone early with interpreter versions, and fixing them early has always been good ... :) 15:35:19 bbobrov: In Debian Unstable for example. 15:35:26 Not sure of the Ubuntu status. 15:35:43 In Unstable, it's as "available version", ie not the default yet. 15:35:58 i am afraid to get out of my debian stable 15:36:12 Use a chroot then. 15:36:23 That works very well for testing. 15:36:30 zigo: i am volunteering, but i cannot promise you any timelines 15:36:52 That's very nice already. I'll see what I can do too. 15:37:02 I need to run, bye ! 15:37:12 thanks bbobrov and zigo, we'll track this in the bug and reviews 15:37:21 #topic bug review 15:38:42 #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 15:40:57 a few new bugs for keystone 15:41:12 #link https://bugs.launchpad.net/keystone/+bug/2044624 15:42:05 there is a fix proposed that looks good, but it's failing the checks 15:42:09 moving on 15:42:46 (please review the fix, the checks should be repaired now) 15:43:02 ack, will do 15:43:23 next up 15:43:26 #link https://bugs.launchpad.net/keystone/+bug/2045974 15:44:14 hmm 15:44:27 I like option 2 but that is indeed boiling an ocean 15:45:35 what if one gets a domain-manager role on a project? 15:45:57 oops, I was commenting on the wrong link :o 15:46:45 idea of domain-manager (domain-admin) is actually to bring roles allowing identity operations on the domain (in domain scope) 15:47:24 I was not seeing the proposed spec, but what I wrote is a gist of discussions on the topic I was participating in 15:47:33 it is a must for any public cloud 15:47:57 otherwise they end up hiding keystone apis from the end user 15:48:26 why not "manager" on a domain? 15:49:36 doesn't matter what the name is. Or do I get your question wrong? 15:50:33 the spec says manager 15:51:16 I see in the spec domain-manager role 15:51:20 i think the bugreport language could be a bit changed then: 15:51:25 and maybe in the spec 15:51:38 to: introduce a new "domain-manager" persona in Keystone 15:52:14 sounds reasonable 15:52:24 the specs talk about personas defined via policies, and propose to create them via a combination of a new role (manager) and a scope (project) 15:52:58 ack, we need to move on for time, but I'll add this spec to that section of the agenda 15:53:00 the bugreport kind of suggests to add "domain" as a potential scope for the role; 15:53:01 you are talking about the "alternatives"? 15:54:03 gtema: lets talk after the meeting 15:54:07 #link https://bugs.launchpad.net/keystone/+bug/2045995 15:54:11 ok 15:54:24 I prefer option 2 for this one but it's a lot of work 15:54:46 we're definitely missing tracebacks without that patch but I think we turned the volume up too high 15:55:45 although we miss them, we don't miss too many 15:56:19 we send them to sentry, and there are almost none 15:56:28 ack 15:57:19 i also don't understand how to make sure, that, if option 2 is taken, i have suceeded in fixing the issue 15:57:40 i could refer to tempest 15:57:47 I think it's whack-a-mole honestly 15:57:50 but how good is tempest in testing the negative scenarios? 15:58:00 I'm not sure 15:58:07 maybe we could somehow catch it in our unit tests... 15:58:58 maybe, let's discuss in the bug 15:59:01 anyway, i am experimenting with option 1 right now. 15:59:10 I'm open to option 1 15:59:13 let me know how it goes 15:59:24 finally for keystone 15:59:33 #link https://bugs.launchpad.net/keystone/+bug/2046355 15:59:44 this has been discussed earlier 15:59:45 we discussed this already 16:00:02 I checked the other projects and we don't have any new issues in any of them 16:00:06 #topic conclusion 16:00:23 Thanks for the lively discussion today, and for the heads up on py3.12 16:00:49 we'll get to work on that 16:00:57 anything else before we go? 16:01:21 next week will be the last weekly meeting of the year, have a great rest of your week folks! 16:01:27 #endmeeting