17:00:43 #startmeeting keystone-office-hours 17:00:44 Meeting started Tue May 28 17:00:43 2019 UTC and is due to finish in 60 minutes. The chair is cmurphy. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:46 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:49 The meeting name has been set to 'keystone_office_hours' 17:00:53 hi again o/ 17:01:04 Hello o/ 17:02:12 o/ 17:02:13 #topic bug triage 17:02:33 #link https://etherpad.openstack.org/p/keystone-office-hours-topics office hours topics 17:03:08 o/ 17:03:23 first up on my triage list is "RFE: Token returns Project's tag properties" 17:03:29 #link https://bugs.launchpad.net/keystone/+bug/1807697 17:03:31 Launchpad bug 1807697 in OpenStack Identity (keystone) "RFE: Token returns Project's tag properties" [Wishlist,In progress] - Assigned to Yang Youseok (ileixe) 17:03:59 ileixe seems to be satisfied with closing it but i wanted to get other eyes on the suggested solution 17:05:10 * lbragstad reads 17:10:23 makes sense 17:11:42 so - to clarify 17:12:12 we're going to keep the fix in the clients and have them query keystone for additional tags once they understand the token 17:12:20 er the project the token is scoped to 17:13:21 as opposed to exposing tags as a first-class attribute of tokens 17:13:55 right, except i think this isn't about a change to the clients but in how a service like neutron would use the keystone client to retrieve a project 17:14:06 aha 17:14:07 and also this is expected to happen during policy enforcement aiui 17:14:50 so - services are going to have to build their own credential and target information with tags in them? 17:15:17 in order for this to be useful in oslo.policy enforcement 17:15:20 right? 17:15:22 i think so 17:15:46 this kinda feels like dynamic policy and the issues we hit with that 17:15:49 but... 17:16:44 remind me what that means? 17:17:04 like an external policy engine? 17:17:37 we're enabling someone to be able to do fine-grained authorization via the api, but ultimately an operator has to tweak .yaml files to get policies to work depending on how people are modifying things in the API 17:18:43 e.g., if i tag a project 'gold' and another project 'platinum' and that affects authroization, then i probably have to supply my own overrides 17:19:54 unless they're using the http_check oslo.policy path 17:20:03 hmm 17:21:09 so what should we advise? this sounds unfun to implement 17:21:13 Maybe relevant to this discussion: https://review.opendev.org/#/c/658675/ 17:21:17 * bnemec saw http_check 17:21:44 sorry - i'm off in the weeds, we're probably advising the right thing 17:21:57 lol 17:22:18 i was just making the point that an underlying issue makes this whole thing a little strange because it can't be API driven completely 17:22:52 okay i'll close for now and invite them to talk to us again if they get stuck and we need a better solution 17:22:57 * lbragstad sits back down 17:22:59 sounds good 17:24:55 next is "[<= Queens] With token-provider='uuid', roles of dynamically obtained federated groups are not taken into account during token-based authentication (for project-scoped token creation)" 17:25:01 #link https://bugs.launchpad.net/keystone/+bug/1828126 17:25:02 Launchpad bug 1828126 in keystone (Ubuntu) "[<= Queens] With token-provider='uuid', roles of dynamically obtained federated groups are not taken into account during token-based authentication (for project-scoped token creation)" [Undecided,New] 17:26:31 another problem with federated groups, but only affects UUID tokens 17:27:09 so - federated users don't get tokens with the groups from the mapping with the uuid provider? 17:27:18 totally unrelated... i just ate some fresh pineapple i brought back from hawaii. holy crap it's good. 17:27:37 since uuid is dead in master, "won't fix, sorry" 17:27:40 lbragstad: ^ 17:28:01 they're going to need to get off uuid tokens anyway or implement their own provider 17:28:07 queens is still maintained so i told them we'd still accept a fix 17:28:34 honestly, i think that might be borderline when considering a stable patch. 17:28:48 my answer would be "really use fernet" 17:28:59 that might be true, it may be too big to fix in stable 17:29:47 i wonder if they have any issues just migrating to fernet? 17:30:08 i'd like to know if they have issues with fernet and if future releases solve them. 17:30:21 they might just be reporting it for the sake of completeness 17:30:24 my guess is key rotation sync issues (not wanting to develop tooling for it) 17:30:32 if anything 17:30:50 a lot of folks don't like dealing with fernet key rotation 17:32:57 asked on the bug report 17:33:08 ++ 17:34:22 next I have is "PY3 unicode text values change in ldap not taking care of py2 special charater unicode strings" 17:34:30 #link https://bugs.launchpad.net/keystone/+bug/1825867 17:34:31 Launchpad bug 1825867 in OpenStack Identity (keystone) "PY3 unicode text values change in ldap not taking care of py2 special charater unicode strings" [Undecided,New] - Assigned to Abhishek Sharma M (abhi.sharma) 17:34:50 there is a proposed fix but it doesn't work, i'm not totally sure this is really a bug 17:37:09 i guess i'd wait for the author to fix the patch 17:37:25 or bump it to see if they're still planning on fixing it 17:37:31 that's fair 17:38:21 ++ 17:38:35 bumped the patch 17:39:18 cmurphy: we have a "Removed as of Train" bug right? 17:39:28 kmalloc_away: yes we do now 17:39:44 ok going to close the bp out then 17:39:44 https://bugs.launchpad.net/keystone/+bug/1829453 17:39:45 Launchpad bug 1829453 in OpenStack Identity (keystone) "Removed as of Train" [Low,In progress] - Assigned to Vishakha Agarwal (vishakha.agarwal) 17:40:17 the last one i wanted to talk about was "no create time for project", since we actually discussed reviving an old spec related to that 17:40:25 #link https://bugs.launchpad.net/keystone/+bug/1822135 17:40:26 Launchpad bug 1822135 in OpenStack Identity (keystone) "no create time for project" [Undecided,Incomplete] - Assigned to XiaojueGuan (xiaojuegaun) 17:40:44 in the bug report we advised to use cadf notifications for this purpose 17:41:06 at the ptg we also decided to revive http://specs.openstack.org/openstack/keystone-specs/specs/keystone/backlog/model-timestamps.html 17:41:18 (this was saturday morning) 17:43:09 hmmm 17:43:43 so - are model times stamps going to be done for everything then? 17:44:23 looks like Project, Domain, Role 17:44:43 * lbragstad would be curious to hear if there is objection to the current advice? 17:45:01 me too 17:45:31 also wondering if we still want to do http://specs.openstack.org/openstack/keystone-specs/specs/keystone/backlog/model-timestamps.html given that we do have cadf notifications 17:45:56 i feel like we'd need more support for it 17:46:15 or more operators coming to us telling us that notifications aren't cutting it 17:46:22 but that's just my knee-jerk reaction 17:46:44 if feels like one of those features that would be a slippery slope to do for all things in keystone 17:47:09 agreed 17:47:24 i'll bump the bug and mention the spec and see if they can tell us whether cadf is sufficient 17:47:36 ++ 17:50:10 that was all i had on my list 17:50:17 any other bugs people want to look at? 17:50:52 looks good to me 17:51:04 not bug related but there's an interesting discussion happening in https://review.opendev.org/651790 17:51:37 wrt the admin endpoint in ksm 17:52:16 and what the default interface should be and whether to use warnings to alert people about it 17:56:15 weigh in on the patch if you have thoughts, i'm especially on the fence about whether to issue a warning or just do a cutover + release note 17:56:43 thanks for participating everyone :) 17:57:05 feel free to add topics to the etherpad for next office hours if you want to 17:57:08 #endmeeting