Monday, 2015-04-20

*** stanzi has joined #openstack-barbican00:18
*** stanzi has quit IRC00:25
*** stanzi has joined #openstack-barbican00:26
*** stanzi has quit IRC00:32
*** woodster_ has quit IRC01:00
*** zz_dimtruck is now known as dimtruck02:00
*** woodster_ has joined #openstack-barbican02:28
*** david-lyle has quit IRC02:55
*** jamielennox is now known as jamielennox|away02:58
*** jamielennox|away is now known as jamielennox03:03
*** dave-mccowan has quit IRC04:16
*** stanzi has joined #openstack-barbican04:38
*** dimtruck is now known as zz_dimtruck05:00
*** stanzi has quit IRC05:03
*** stanzi has joined #openstack-barbican05:04
*** stanzi has quit IRC05:09
*** woodster_ has quit IRC06:30
*** jamielennox is now known as jamielennox|away06:52
*** jaosorior has joined #openstack-barbican06:58
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/17488007:03
*** tkelsey has joined #openstack-barbican07:09
*** tkelsey has quit IRC07:23
*** tkelsey has joined #openstack-barbican07:27
*** chlong has quit IRC07:29
*** tkelsey has quit IRC07:39
*** tkelsey has joined #openstack-barbican08:00
*** tkelsey has quit IRC08:20
*** chlong has joined #openstack-barbican08:50
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/17488008:53
*** tkelsey has joined #openstack-barbican09:05
*** chlong has quit IRC09:20
openstackgerritJuan Antonio Osorio Robles proposed openstack/python-barbicanclient: Use keystoneclient to get endpoint if it's empty  https://review.openstack.org/17295809:32
*** chlong has joined #openstack-barbican09:33
thervejaosorior, It's unfortunate that it takes so much time to get a critical fix in...10:09
jaosoriortherve: it only needs a workflow10:10
jaosoriorI'll poke the other cores for it as soon as they log in10:10
therveFWIW that's one reason I think revert was the proper fix here. Revert quickly, and discuss how to actually fix it later on.10:11
therveHopefully the new client functional tests will make it so we don't have to decide in the future :)10:12
jaosoriorwell, I was being optimistic. Thought it was an easy merge10:12
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: Migrate to oslo_context  https://review.openstack.org/17533810:17
openstackgerritJuan Antonio Osorio Robles proposed openstack/python-barbicanclient: Use keystoneclient to get endpoint if it's empty  https://review.openstack.org/17295810:22
jaosoriortherve: where are you based on? By the way11:25
*** woodster_ has joined #openstack-barbican11:46
thervejaosorior, France11:50
jaosoriorwoodster_: ping11:52
*** chlong has quit IRC11:58
*** dave-mccowan has joined #openstack-barbican12:14
*** jamielennox|away is now known as jamielennox12:31
*** jamielennox is now known as jamielennox|away12:32
woodster_jaosorior: hello12:42
jaosoriorwoodster_: Hey man,good... I guess it's morning there? :P12:43
woodster_jaosorior: ha! yep, 7:44 am to be exact12:44
woodster_jaosorior: is it lunch time over there?12:44
*** zz_dimtruck is now known as dimtruck12:46
*** joesavak has joined #openstack-barbican12:47
*** everjeje has joined #openstack-barbican12:52
jaosoriorwoodster_: Anyway, this CR https://review.openstack.org/#/c/172958/ fixes a pretty annoying regression. Do you think the -1 provided is a stopper for that CR?12:53
jaosoriorwoodster_: haha, nah, past lunch time, or at least people eat a bit earlier here (at about 11am)12:55
*** dimtruck is now known as zz_dimtruck12:56
woodster_jaosorior: jamielennox|away works from Australia, so I'd be better to wait until he looks at it again in a few hours. Is this something to land for Kilo though?13:00
jaosoriorwoodster_: yeah, preferably.13:01
woodster_jaosorior: I'm not sure when redrobot was wanting to cut Kilo.13:03
jaosoriorwoodster_: Well, if that CR is not merged, then the endpoint becomes a mandatory field for using the barbicanclient, since that bug means that we don't have capability to get the endpoint from keystone. And that will annoy some users13:03
woodster_jaosorior: yeah for sure. Worst case Douglas leaves a comment to that effect on the CR and workflows it.13:05
dave-mccowanarunkant ping13:11
*** zz_dimtruck is now known as dimtruck13:28
jaosoriortherve: by the way, I guess in the meantime you can work around the bug by always specifying the endpoint13:30
*** rellerreller has joined #openstack-barbican13:56
dave-mccowandoes someone have a couple minutes to answer a question about ACLs and Orders?13:57
*** paul_glass has joined #openstack-barbican14:15
*** rellerreller has quit IRC14:34
*** kebray has joined #openstack-barbican14:35
*** kebray has quit IRC14:37
woodster_dave-mccowan: no changes to order access policy, but the creator id of the order is stamped on generated containers/secrets14:40
*** kebray has joined #openstack-barbican14:40
dave-mccowanwoodster_ I’m thinking about the used case “Order a Certificate based on a stored container”.  If a container is restricted by an ACL, then that should be enforced if a user tries to order a certificate based on that container. (but it's not)14:41
*** xaeth_afk is now known as xaeth14:41
woodster_dave-mccowan: good point, yeah should be rejected at post time, and then at worker time if the ACL changes after the order is initiated14:42
dave-mccowanA fix could go in validators.  Should it be as easy as adding @controllers.enforce_rbac(‘container:get’) to OrdersController:on_put()?  The actual container_rep.get() is done several call deep through that function.14:43
woodster_dave-mccowan: worth putting a Launchpad bug in for14:43
dave-mccowanwoodster_ i'll do that.  i have a TODO(dave) in the code, but the fix is not obvious to me.  if this is kilo worthy, i need some help, or need to hand it off.14:44
woodster_dave-mccowan: I'd prefer not to change access modifiers on the controller method, keeping the policy engine in control of access decisions14:45
woodster_dave-mccowan redrobot I'm thinking this is a Liberty bug14:46
woodster_dave-mccowan: I think we'd need to get the stored key by the same project as order...if not found reject it. If found but has ACL assigned, reject it. A similar check on worker side would be needed too14:49
dave-mccowanwoodster_ is anything similar done currently, or is this a brand new use case?14:51
woodster_dave-mccowan: all of this ACL stuff is new, and the stored key stuff is not that much older14:52
dave-mccowanwoodster_  ok, i'll open the bug.   you can add your comments there, so they can be saved.14:54
dave-mccowanwoodster_ thanks!  https://bugs.launchpad.net/barbican/+bug/144626614:59
openstackLaunchpad bug 1446266 in Barbican "RBAC needs to be checked for stored-key orders" [Undecided,New]14:59
redroboto/15:03
dave-mccowangood morning, redrobot.  woodster_ and i were just discussing https://bugs.launchpad.net/barbican/+bug/1446266 and if it's needed for kilo, and if so how to address it.15:06
openstackLaunchpad bug 1446266 in Barbican "RBAC needs to be checked for stored-key orders" [Undecided,New]15:06
redrobotdave-mccowan woodster_ if I'm understanding the bug correctly, no RBAC is done, so I could, for example, order a cert signed by any stored key in Barbican regardless of who owns it?15:08
dave-mccowanredrobot, woodster_, that's my guess, but i have not tested it.  (are there any ACL functional tests in the repo or otherwise?)15:10
woodster_ redrobot that's correct, so we'd need to add that in release notes for kilo15:10
redrobotwoodster_ sounds like a major security hole in Barbican.  Why would we want to release Kilo with it?15:10
*** igueths has joined #openstack-barbican15:11
redrobotdave-mccowan woodster_  I'd be ok with maybe having the Order go into error state instead of getting a 401 right away if the policy stuff gets hairy.15:12
woodster_redrobot: the entire ACL feature is new and I don't believe had much functional testing behind it. There might be other security issues as we think thru all the use cases. IMHO I would say it is experimental for kilo.15:13
redrobotwoodster_ dave-mccowan  ACL feature aside, can I order a cert and have Barbican sign it with someone else's key for which I have no access?15:14
woodster_redrobot: if you think otherwise though then I'd say we are not ready for kilo release15:14
woodster_redrobot: it seems for the stored key case that is correct15:15
dave-mccowanwoodster_, redrobot.  i think the signing key is owned by the CA.  you could order a certificate to be made with someone else's key, but not have access to that user's key.  so, the certificate should be worthless.15:15
redrobotdave-mccowan ack, yeah, that's not as bad as I originally thought.15:16
woodster_redrobot: dave-mccowan so not a security issue then, just usability it seems?15:16
dave-mccowanwoodster_, redrobot:  i'm sure the most paranoid would disagree.15:17
redrobotwoodster_ dave-mccowan it seems we need to cut RC1 now to unblock the release manager15:18
woodster_redrobot: I am a concerned that this critical ACL feature is so new, I'd be more comfortable noting it as experimental in our docs15:18
woodster_redrobot: oh wow, well what else needs to go in then?15:19
*** darrenmoffat has quit IRC15:19
redrobotwoodster_ just waiting on dave-mccowan's CR to merge.  I workflowed it a few minutes ago.15:19
*** darrenmoffat has joined #openstack-barbican15:20
woodster_redrobot: cool, like delivering my first kid this was :)15:20
openstackgerritMerged openstack/barbican: Refactor and Fix Translation Code for PER and DER Formats  https://review.openstack.org/17472415:30
*** SheenaG has joined #openstack-barbican15:31
arunkantwoodster_, redrobot, there is no ACL enforcement logic on orders. Initial change was only for secrets and containers15:36
redrobotarunkant yes, that part is correct.  The problem is with orders that use a container, e.g. when you Order a certificate to be signed with a key that was previously stored in barbican.15:37
openstackgerritMerged openstack/python-kiteclient: Uncap library requirements for liberty  https://review.openstack.org/17453715:38
arunkantredrobot, yes..that was something discussed during code review as well..we will need to add support for that. may be get API (not only REST facing) calls to have rbac enforce kind of logic.15:40
dave-mccowanredrobot, arunkant, small clarification: the signing key belongs to the CA.  Pedantically, the use case is "order a certificate containing a public key that was previously made part of a container stored in barbican"15:44
redrobotdave-mccowan I thought it would be the private key used to sign the CSR?15:44
redrobotdave-mccowan ie, I store my private key, and then tell Barbican to use it to sign a CSR to be used to generate a Cert?15:44
*** gyee has joined #openstack-barbican15:45
dave-mccowanredrobot, ok, the CSR is signed by the stored private key, but the Certificate is not.  the generated certificate should not be useful to anyone without the original stored private key.15:47
openstackgerritMerged openstack/barbican: Open Liberty development  https://review.openstack.org/17210615:49
*** rm_work is now known as rm_work|away15:52
dave-mccowanredrobt, arunkant has restated the problem nicely: we need an API to call to do the enforcement.  the @enforce_rbac decorator only with at the REST level.  there are probably some other use cases too, e.g. a user asking to create a container with secrets he doesn't own.15:53
redrobotdave-mccowan yep, I think that nails down the problem.16:03
arunkantjaosorior, can you please let me know your comments on https://review.openstack.org/#/c/172533/1/barbican/tests/api/test_resources_policy.py,cm . I will make that change accordingly.16:20
jaosoriorarunkant: sure man, will check it out once I'm home16:23
openstackgerritDave McCowan proposed openstack/barbican: Refactor RSA Functional Smoke Tests  https://review.openstack.org/17472216:26
openstackgerritMerged openstack/python-barbicanclient: Uncap library requirements for liberty  https://review.openstack.org/17452716:27
*** rm_work|away is now known as rm_work16:31
*** arunkant has quit IRC16:34
*** nkinder has quit IRC16:38
*** ChanServ sets mode: +o redrobot16:46
*** redrobot changes topic to "OpenStack Barbican development"16:47
*** arunkant has joined #openstack-barbican16:48
jvrbanacredrobot, do you know why I can't +2 https://review.openstack.org/#/c/175473/ ?17:04
*** igueths has quit IRC17:05
kragnizjvrbanac: because it's on the stable branch17:14
kragnizjvrbanac: it doesn't look like barbican-core have access to that for some reason17:16
jvrbanackragniz, interesting... ok17:17
kragniz(acls for access: https://github.com/openstack-infra/project-config/blob/master/gerrit/acls/openstack/barbican.config)17:18
jvrbanacredrobot, ^^17:19
jvrbanackragniz, thanks!17:19
kragnizjvrbanac: least I could do!17:20
*** alee has joined #openstack-barbican17:27
*** crc32 has joined #openstack-barbican17:54
jaosoriorarunkant, ping17:54
arunkantyes17:56
jaosoriorarunkant: The thing is, in an unauthenticated context you would actually have a context17:56
jaosoriorwhat you could check is if there is a policy enforcer in that context17:56
jaosoriorso you could check if that's None17:56
jaosoriorBut I still don't see a case where first you would get a context, and suddenly it would be None17:57
arunkantthat's because context check is done in eforce logic..but if the method in question is called from some other flow, it may not have barbican context set17:58
arunkantlike earlier in barbican channel, there was discussion to invoke acl logic from orders logic..17:59
jaosoriormaybe my confusion is because I'm only considering the case where it will be called from a Controller17:59
jaosoriorOK18:00
arunkantyes. If there is need to invoke acl logic from orders, that means..it may need to be invoked "outside of controller" flow18:00
jaosoriorso, if that function can be called from outside the controller, meaning, outside the enforce logic18:01
jaosoriorlets mark it as such18:01
jaosoriorthe req then should be set as optional18:01
jaosoriorreq=None18:01
jaosoriorand it would be nice to have some relevant documentation18:01
jaosoriorabout that behaviour18:01
jaosoriorso it doesn't cause other confusion18:01
jaosoriorthen, it's good to have some tests there18:01
*** tkelsey has quit IRC18:01
jaosoriorarunkant: is that alright with you?18:02
arunkantI tried to add that in test around it..will try to make it clear as it does not to be the case18:02
arunkantjaosorior, do you want me to document that in controller code, or documenting it only in test works ?18:03
*** rellerreller has joined #openstack-barbican18:03
jaosoriorI would think that adding documentation about the 'req' parameter here https://github.com/openstack/barbican/blob/master/barbican/api/controllers/__init__.py#L187 would be nice18:04
arunkantokay..will do that18:04
jaosoriorthen, if the function will be called outside of the enforcer logic. I guess that req will not have the barbican.context at some points, so something mentioning that18:05
jaosorioradding that, I would be happy18:05
jaosoriorif you want to add stuff to the test, hey! the less confusion the better :D18:05
jaosoriorsorry for the confusion man, I didn't know about the plans to call that code outside the enforcer logic18:05
arunkantokay. Let me make those changes.18:05
jaosoriorthat, the docstring change, and it's a +2 from my side18:06
jaosorioralee:18:06
jaosoriorping18:06
*** everjeje has quit IRC18:06
aleejaosorior, pong18:07
jaosorioralee: haven't had much time to look at the dogtag stuff, but, there seem to be two weird things going on18:07
*** igueths has joined #openstack-barbican18:08
jaosoriorI added more verbosity to the pkispawn logs, and dirtily injected some printing there, and it seems that: 1. for some reason the deployment/pkihelper.py is getting JSON when it actually expects XML18:08
jaosoriorand 2. it seems it tries to contact the CA and eventually gets this error18:09
jaosorior"ClassName":"com.netscape.certsrv.base.PKIException","Code":500,"Message":"Error in obtaining certificate chain from issuing CA: java.io.IOException: org.mozilla.jss.ssl.SSLSocketException: Unable to connect: (-5961) TCP connection reset by peer."18:09
jaosorioryou can see the logs here: http://logs.openstack.org/80/174880/4/experimental/gate-barbican-dogtag-devstack-dsvm-f21/6ff6836/console.html18:09
aleejaosorior, thanks -- most likely we're seeing a bug from that version of dogtag then. I'll need to check and make sure the latest is there.18:11
jaosorioralee: the latest version seems to have the same code expecting XML18:11
aleejaosorior, unfortunately, I'm pretty swamped with dogtag code right now.  we have some realeases due.18:12
aleejaosorior, amd I'm deep into java code right now.  I'll have to get back to this later this week.18:12
jaosorioralee: fair enough18:12
aleejaosorior, thanks fo rlooking into it though18:13
jaosorioralee: no prob18:14
redrobotjvrbanac interesting...  I wonder why the "refs/heads/*" section doesn't apply to kilo?18:14
*** igueths has quit IRC18:15
*** redrobot sets mode: +v alee18:25
*** redrobot sets mode: +v rellerreller18:25
*** redrobot sets mode: +v jvrbanac18:25
*** redrobot sets mode: +v hockeynut18:25
*** redrobot sets mode: +v jaosorior18:26
*** redrobot sets mode: +v woodster_18:26
*** redrobot sets mode: +v reaperhulk18:26
*** redrobot sets mode: +v codekobe18:27
*** SheenaG has left #openstack-barbican18:28
*** tkelsey has joined #openstack-barbican18:30
*** tkelsey has quit IRC18:34
*** everjeje has joined #openstack-barbican18:44
openstackgerritJohn Vrbanac proposed openstack/python-barbicanclient: Excluding tests from coverage report  https://review.openstack.org/17553518:59
chellygelhey guys ^ this fixes test coverage report -- its a 1 line change and  a quick plus 219:00
chellygelif you dont mind :)19:00
reaperhulkpsssh19:01
*** igueths has joined #openstack-barbican19:01
reaperhulkwhy am I voiced :o19:01
chellygelcore reviewer19:01
chellygelwas my guess19:01
reaperhulkopenstack channels auto-voice core people now?19:02
chellygelnooo mr. redrobot was doing that19:02
reaperhulkah19:02
*** rellerreller has quit IRC19:03
*** rellerreller has joined #openstack-barbican19:06
*** kebray has quit IRC19:19
*** kebray has joined #openstack-barbican19:24
*** tkelsey has joined #openstack-barbican19:28
*** tkelsey has quit IRC19:32
*** rellerreller has quit IRC19:41
redrobotweekly meeting is starting in #openstack-meeting-alt20:00
*** tkelsey has joined #openstack-barbican20:04
chellygelhttps://review.openstack.org/#/c/175535/ --- just needs a workflow -- quick review points20:05
redrobotchellygel I refuse to workflow until Jenkins votes :-P20:07
chellygelfair20:08
openstackgerritArun Kant proposed openstack/barbican: Improving the code coverage for ACL related changes  https://review.openstack.org/17253320:09
*** joesavak has quit IRC20:13
*** tkelsey has quit IRC20:13
*** tkelsey has joined #openstack-barbican20:15
*** joesavak has joined #openstack-barbican20:18
*** kebray has quit IRC20:34
openstackgerritAmy Marrich proposed openstack/barbican: Adds improved error code handling for pkcs11 errors returned from HSM.  https://review.openstack.org/17556820:40
openstackgerritAmy Marrich proposed openstack/barbican: Adds improved error code handling for pkcs11 errors returned from HSM.  https://review.openstack.org/17556820:52
*** tkelsey has quit IRC21:04
openstackgerritAmy Marrich proposed openstack/barbican: Adds improved error code handling for pkcs11 errors returned from HSM.  https://review.openstack.org/17556821:45
openstackgerritMerged openstack/python-barbicanclient: Excluding tests from coverage report  https://review.openstack.org/17553521:46
*** joesavak has quit IRC22:07
*** ccneill has joined #openstack-barbican22:16
*** xaeth is now known as xaeth_afk22:16
ccneillhey all, question for ya22:17
ccneillI'm trying to get the project ID in a functional test, and I was curious if there was a "blessed" way to do so22:17
ccneillright now I'm doing this: `self.project_id = self.client._auth.auth_client.project_id`22:17
ccneillbut I get errors about auth_client being None on all but the final test case that I run22:17
ccneillthis is in the setup() method for the test class22:18
chellygelping redrobot22:19
chellygelredrobot, nvm22:20
*** igueths has quit IRC22:28
*** kebray has joined #openstack-barbican22:35
openstackgerritJohn Vrbanac proposed openstack/python-barbicanclient: Cleaning up Keystone auth tests  https://review.openstack.org/17559722:37
ccneillzigo: just put up a bug for the signing_dir issue you brought up recently22:38
ccneillhttps://bugs.launchpad.net/barbican/+bug/144640622:38
openstackccneill: Error: malone bug 1446406 not found22:38
ccneillhmm.. although it appears to be marked "private"22:38
*** SheenaG has joined #openstack-barbican22:40
openstackgerritJohn Vrbanac proposed openstack/python-barbicanclient: Adding support for token based authentication  https://review.openstack.org/17559922:44
*** kebray has quit IRC22:47
*** paul_glass has quit IRC22:52
*** chadlung has joined #openstack-barbican23:00
*** ccneill has quit IRC23:08
openstackgerritJohn Vrbanac proposed openstack/python-barbicanclient: Cleaning up validate_ref()  https://review.openstack.org/17560523:11
*** dimtruck is now known as zz_dimtruck23:14
*** SheenaG has quit IRC23:28
*** rm_work is now known as rm_work|away23:31
*** chlong has joined #openstack-barbican23:34
*** chadlung has quit IRC23:41
*** jaosorior has quit IRC23:42
*** crc32 has quit IRC23:43
*** david-ly_ has joined #openstack-barbican23:44
*** jamielennox|away is now known as jamielennox23:45
*** david-ly_ is now known as david-lyle23:46
*** openstackgerrit has quit IRC23:58
*** openstackgerrit has joined #openstack-barbican23:58
jamielennoxwoodster_: yea that's fine to merge (been done), my suggestion is probably the 'more correct' way but it's not going to be a compatibility problem to change it later so that's fine23:59

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!