15:05:21 #startmeeting keystone 15:05:21 Meeting started Wed Apr 17 15:05:21 2024 UTC and is due to finish in 60 minutes. The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:05:21 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:05:21 The meeting name has been set to 'keystone' 15:05:41 #topic roll call 15:05:43 o/ 15:05:49 o/ 15:05:51 🙋‍♂️ 15:05:56 admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, knikolla[m], lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], mharley, jph, gtema 15:06:05 \o 15:06:07 o/ 15:06:43 #topic review past meeting work items 15:07:33 no updates from me 15:07:45 #action d34dh0r53 Look into adding/restoring a known issues section to our documentation 15:08:03 #action d34dh0r53 add https://bugs.launchpad.net/keystone/+bug/1305950 to the known issues section of our documentation 15:08:08 next up 15:08:23 #topic liaison updates 15:08:32 nothing from VMT 15:08:35 nor releases 15:09:07 moving on to specifications 15:09:25 #topic specification OAuth 2.0 (hiromu) 15:09:27 #link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext 15:09:29 #link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability 15:09:31 External OAuth 2.0 Specification 15:09:33 #link https://review.opendev.org/c/openstack/keystone-specs/+/861554 15:09:35 OAuth 2.0 Implementation 15:09:37 #link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls 15:09:39 OAuth 2.0 Documentation 15:09:41 #link https://review.opendev.org/c/openstack/keystone/+/838108 15:09:43 #link https://review.opendev.org/c/openstack/keystoneauth/+/838104 15:10:16 did anyone see hiromu or anyone from Tacker at the PTG? 15:10:26 Tacker did not have a session that I saw 15:12:21 welp, if you see hiromu or anyone from Tacker online have them ping me 15:12:25 next up 15:12:48 #topic specification Secure RBAC (dmendiza[m]) 15:12:50 #link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_ 15:12:52 2024.1 Release Timeline 15:12:54 Update oslo.policy in keystone to enforce_new_defaults=True 15:12:56 Update oslo.policy in keystone to enforce_scope=True 15:12:58 #link https://review.opendev.org/c/openstack/keystone/+/902730 (Merged) 15:13:00 #link https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/903713 (Merged) 15:13:02 #link ttps://review.opendev.org/c/openstack/tempest/+/912489 15:13:15 Things are looking good 15:13:24 most of the patches I've submitted have merged 15:13:49 I want to say we are again enforcing the SRBAC job in Keystone which is great 15:14:01 The only outstanding patch I have is for Tempest where I enable SRBAC on Keystone 15:14:04 #link https://review.opendev.org/c/openstack/tempest/+/912489 15:14:13 I just reviewed that one 15:14:23 Got one +2 for now (thanks gmann!) 15:14:29 d34dh0r53: thanks! 15:14:35 I need to figure out the correct way to release keystone-tempest-plugin 15:14:36 That's all for now 15:14:46 thanks dmendiza[m] 15:14:53 I still have not caught up on SRBAC PTG things 15:14:53 next up 15:14:56 so maybe more next week 15:15:17 #topic specification Improve federated users management (gtema) 15:15:19 #link https://review.opendev.org/c/openstack/keystone-specs/+/748748 - waiting for reviews 15:15:40 I am stuck in a conflict with the spec author 15:16:05 I think the proposed API change is dangerous and error prone while he apparently not sees the problem 15:17:35 apparently someone from cores need to step up to decide 15:19:12 yeah, reading the thread now 15:20:43 we'll discuss this in the reviewathon this Friday 15:20:45 do i understand correctly, that the author proposes to get projects and assignments as a json from an IdP? 15:20:57 yes 15:21:01 but the point is HOW 15:21:08 there is "projects" field 15:21:26 and he proposes adding projects_json field which will be string and merged in Keystone 15:21:48 INSTEAD of making "projects" field being oneOf: [object, string] 15:25:54 I'm going to defer this to the reviewathon, I'd really like to hear the other cores opinion on this one 15:26:20 ok, thks. Just for reference: all OpenStack apis are relying on polymorphism 15:26:39 and here it is proposed to go back to "counter_str" and "counter_int" style 15:27:26 that's a good point 15:27:39 and especially splitting user data between static config on the Keystone side and data coming from external IdP and merge it is especially dangerous 15:28:33 purpose of the changes in the ephemeral users mgmt is to have 1 system (external IdP) responsible for the data 15:29:23 splitting it feels like a knife in the back during the security audits 15:30:36 ok, we can go on 15:31:41 food for thought 15:31:44 moving on 15:32:07 #topic specification OpenAPI support (gtema) 15:32:09 #link https://review.opendev.org/c/openstack/keystone-specs/+/910584 15:32:47 i checked, stephenfin linked my spec for PTG, so we are really talking about singe thing and single spec 15:33:15 ack, this spec is the only one now, correct? 15:33:20 right 15:33:35 cool 15:34:38 means: spec is there and needs reviews 15:34:59 will do 15:35:05 thks 15:35:13 np 15:35:28 #topic open discussion 15:35:50 passlib update 15:35:52 The maintainer responded to the bug, and one of the top priorities is to fix the bcrypt version bug 15:35:54 #link https://foss.heptapod.net/python-libs/passlib/-/issues/190 15:35:56 Targeted to 1.7.5 15:36:17 I pinged on the bug again last week for an update on 1.7.5 and we still don't have one 15:36:34 The maintainer really needs to hand over the reigns to someone 15:36:56 yupp 15:37:11 I'll continue to ping in the issue 15:37:32 internet_infrastructure_and_overworked_maintainer.jpg 15:37:38 domain manager (mhen) 15:37:40 https://review.opendev.org/c/openstack/keystone-specs/+/903172 15:37:42 addressed review comments 15:37:44 rebased on 2024.1, renamed to domain-manager-persona (from "...-role") 15:38:09 as mentioned in the PTG this one needs new reviews 15:38:22 I rebased it and also cleaned up existing comments 15:38:48 ack, I didn't look but it failed some checks 15:38:51 today I looked at it and I feel like it again talks about ...-role 15:39:09 wait ... did I mess up? 15:39:16 i think so 15:39:28 the file got renamed, but the content tells different 15:39:50 oh shoot 15:39:57 thanks for bringing this up 15:40:17 something got rolled back during my git-review commands it seems 15:40:18 sure 15:40:23 will clear this up asap 15:41:12 yea sorry about that, I will fix it - we can move on 15:42:01 thank you mhen 15:42:07 next up 15:42:18 domain list scoping fix (mhen) 15:42:20 the main fix was merged a while ago: https://review.opendev.org/c/openstack/keystone/+/900028 15:42:22 Q: is https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/900545 still applicable? 15:42:24 it would have been a necessary adjustment to the tempest tests after the above merge but tests have been restructured in the meantime (mentioned at PTG) 15:42:30 this is a question for dmendiza[m] 15:45:13 he might not be around, I still need to talk with him about the next topic so I'll raise this as well 15:45:29 policy API and OS-ENDPOINT-POLICY 15:45:31 policy API is deprecated 15:45:33 OS-ENDPOINT-POLICY depends on it 15:45:35 what is the status? 15:45:58 as I mentioned dmendiza[m] and I need to talk about this question, I'll have a meeting with him this afternoon 15:46:12 all right! 15:46:15 Enforcing scope in keystone breaks heat (and probably magnum) (tkajinam) 15:46:17 https://bugs.launchpad.net/keystone/+bug/2059780 15:46:19 https://review.opendev.org/c/openstack/keystone/+/914759 15:46:56 I'm unsure if this was covered in the past meeting, but I wanted to make sure you are aware of this problem since you were talking about enforcing scope by default 15:47:52 I started testing heat with new defaults/scope enforcement enabled in all services and this is the first problem I'm hitting now. I suspect there can be a few more domain admin rules we have to fix but I'll test the scenario further to catch these 15:49:22 fyi. This is the problem I raised during the RBAC session during the last ptg, in case you were there. 15:49:28 thank you for the awareness tkajinam 15:49:34 I missed the RBAC session 15:49:49 unfortunately, really kicking myself for missing that 15:49:57 Markus Hentsch proposed openstack/keystone-specs master: Add identity spec for Domain Manager persona https://review.opendev.org/c/openstack/keystone-specs/+/903172 15:50:11 no problem :-) 15:50:52 I've added dmendiza[m] as a reviewer 15:51:13 moving on for the sake of time 15:51:16 #topic bug review 15:51:25 #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 15:52:31 looks like a new bug about password length notifications 15:52:35 #link https://bugs.launchpad.net/keystone/+bug/2061922 15:52:59 that is a cover bug for my spec 15:53:07 oh 15:53:07 no 15:53:08 sorry 15:53:13 disregard that 15:54:07 ahh, ok 15:54:20 this one is 15:54:28 #link https://bugs.launchpad.net/keystone/+bug/2060972 15:54:56 re https://bugs.launchpad.net/keystone/+bug/2061922 - the uncertainty around these numbers and password length is one of the factors preventing me from upgrading from Zed 15:55:36 noted, I'll make sure it's consistent and correct 15:57:08 finally in keystone 15:57:14 #link https://bugs.launchpad.net/keystone/+bug/2060452 15:57:55 it's being worked and will need reviews 15:58:01 next up 15:58:03 #link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=0 15:58:09 no new bugs there 15:58:29 #link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=0 15:58:36 keystoneauth has no new bugs 15:59:00 keystonemiddleware is also good 15:59:05 #link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=0 15:59:31 sorry, link would be helpful for middleware ;) 15:59:48 #link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=0 15:59:53 nothing new for pycadf 16:00:13 #link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=0 16:00:18 ldappool is also good 16:00:28 that does it for bug review 16:00:35 #topic conclusion 16:00:55 Good to see folks at the PTG and I'm looking forward to this cycle 16:01:12 Reviewathon on Friday, please let me know if you'd like a calendar invite 16:01:22 That's it for me, anything else? 16:01:43 Thanks folks! 16:01:47 #endmeeting