Thursday, 2015-07-16

*** rm_work is now known as rm_work|away00:07
*** zz_dimtruck is now known as dimtruck00:11
*** yuanying_ has joined #openstack-barbican00:36
*** yuanying has quit IRC00:40
*** alee has quit IRC00:40
*** yuanying_ has quit IRC00:42
*** yuanying has joined #openstack-barbican00:45
*** yuanying has quit IRC00:52
*** mikeymeitbual has joined #openstack-barbican01:08
*** yuanying has joined #openstack-barbican01:12
*** openstack has joined #openstack-barbican01:23
*** openstackgerrit has joined #openstack-barbican01:23
*** yuanying has joined #openstack-barbican01:23
*** alee has joined #openstack-barbican01:59
*** dave-mccowan has joined #openstack-barbican02:05
*** diazjf has joined #openstack-barbican02:28
*** diazjf has left #openstack-barbican02:50
*** kfarr1 has joined #openstack-barbican02:56
*** dave-mccowan has quit IRC02:56
*** xaeth_afk is now known as xaeth02:57
*** crc32 has quit IRC03:10
*** yuanying_ has joined #openstack-barbican03:16
*** yuanying_ has quit IRC03:18
*** yuanying has quit IRC03:18
*** yuanying_ has joined #openstack-barbican03:18
openstackgerritMerged openstack/python-barbicanclient: Added secret type command line option  https://review.openstack.org/20176703:28
*** yuanying_ has quit IRC03:30
*** yuanying has joined #openstack-barbican03:32
*** yuanying has quit IRC03:37
*** yuanying has joined #openstack-barbican03:38
*** lisaclark has quit IRC03:45
*** briancurtin has quit IRC03:45
*** jraim has quit IRC03:45
*** woodster_ has quit IRC03:45
*** codekobe has quit IRC03:46
*** lisaclark_ has quit IRC03:47
*** lisaclark has joined #openstack-barbican03:49
*** rm_work|away has quit IRC03:52
*** codekobe has joined #openstack-barbican03:55
*** briancurtin has joined #openstack-barbican03:56
*** jraim has joined #openstack-barbican03:56
*** yuanying has quit IRC04:00
*** yuanying has joined #openstack-barbican04:01
*** yuanying has quit IRC04:02
*** kfarr1 has quit IRC04:06
*** yuanying has joined #openstack-barbican04:07
*** alee has quit IRC04:09
*** lisaclark_ has joined #openstack-barbican04:18
*** woodster_ has joined #openstack-barbican04:32
*** rm_work has joined #openstack-barbican04:40
*** rm_work is now known as rm_work|away05:23
openstackgerritMerged openstack/barbican: Added opaque data support to KMIP secret store  https://review.openstack.org/20069205:24
*** alee has joined #openstack-barbican05:29
*** rm_work|away is now known as rm_work05:56
*** rm_work is now known as rm_work|away05:58
*** shohel has joined #openstack-barbican06:19
*** xaeth is now known as xaeth_afk06:38
*** DTadrzak has quit IRC07:28
*** DTadrzak has joined #openstack-barbican07:42
*** tkelsey has joined #openstack-barbican09:09
*** dimtruck is now known as zz_dimtruck09:27
*** jaosorior has joined #openstack-barbican09:41
*** mmdurrant has quit IRC10:09
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214610:20
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214610:33
*** mmdurrant has joined #openstack-barbican11:59
*** darrenmoffat has quit IRC12:30
*** darrenmoffat has joined #openstack-barbican12:31
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214612:31
*** alee has quit IRC12:56
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214613:11
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214613:16
*** gyee has joined #openstack-barbican13:27
cbaderrm_work: take a look at this pastebin, http://paste.openstack.org/show/380787/ it show running the mv command for devstack13:36
jaosoriorcbader: what's up there? Seems to me like that's the way it's supposed to be, you try to move that directory without the proper permissions13:43
cbaderjaosorior: I did do it with sudo the second time. What I am saying is the command didn't create the devstack directory for the move.13:44
cbaderjaosorior: I tried to run the setup.sh for barbican and it fails in a number a places. I am having an issue getting barbican to start with nova, cinder, glance and other services.13:45
jaosoriorwhat do you mean it didn't create the devstack directory for the move? What happened there is that it moved the devstack directory to a new directory called stack in the opt directory13:46
jaosoriorsetup.sh? Where is that script?13:47
cbaderjaosorior: it is on the https://gist.github.com/rm-you/6feacb91182f5c01101813:48
jaosoriorcbader: In that case what you want is to create the /opt/stack directory first, and then do the mv13:49
cbaderjaosorior: thank you for the help yes I did that. I was just commenting on the script that didn't work the way the author intended.13:50
jaosoriorcbader: Oh, alright. Sorry, that's the only thing I saw about that and was a bit out of context13:50
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214613:51
cbaderjaosorior: I am trying to get barbican to run with my devstack if I load the other services it fails to stack.13:52
jaosoriorweird13:54
*** alee has joined #openstack-barbican13:56
*** Kevin_Bishop has joined #openstack-barbican14:00
*** pglass has joined #openstack-barbican14:04
*** kfarr has joined #openstack-barbican14:08
*** woodster_ has quit IRC14:11
jaosorioralee, hockeynut: I had already a workflow for this one https://review.openstack.org/#/c/199142/ but I had to change it because of the issues with the new mock. So basically only changes are in the testing code14:13
*** kfarr has quit IRC14:15
aleejaosorior, you have been re-acked14:20
jaosorioralee: Awesome, thanks dude14:21
*** SheenaG has joined #openstack-barbican14:24
*** SheenaG has left #openstack-barbican14:24
*** silos has joined #openstack-barbican14:32
*** kfarr has joined #openstack-barbican14:33
*** zz_dimtruck is now known as dimtruck14:34
jaosoriorredrobot: ping14:41
*** xaeth_afk is now known as xaeth14:55
openstackgerritJuan Antonio Osorio Robles proposed openstack/barbican: ** DO NOT MERGE **  https://review.openstack.org/20214614:58
*** chadlung has joined #openstack-barbican15:01
*** diazjf has joined #openstack-barbican15:22
*** gyee has quit IRC15:34
redrobotjaosorior pong15:38
*** gyee has joined #openstack-barbican15:39
jaosoriorredrobot: hey man, I was looking into the porting of the dogtag patches. I was just wandering if there's a kilo/stable branch for project-config changes. Since if there is, I will also need to port those15:39
*** ig0r_ has quit IRC15:40
redrobotjaosorior I don't think so15:40
redrobotjaosorior why is why moving the job to voting will affect both master and stable/kilo15:41
jaosoriorredrobot: Alright15:41
redrobotjaosorior but there's always a chance I have no idea what I'm talking about and they do support different configurations across branches...15:41
jaosoriorAt the moment the dogtag gate is not working. Not sure if it's because some changes were introduced in dogtag itself, or somewhere else. But I'm fixing that before doing the backporting15:41
*** jorge_munoz has quit IRC15:44
*** jorge_munoz has joined #openstack-barbican15:45
openstackgerritMerged openstack/barbican: Updated from global requirements  https://review.openstack.org/20181715:49
silosIs there a consensus for either merging or rebasing a branch with master after is hasn't been synced with master in a while? Just wondering what everyone else has been doing.15:50
redrobotsilos I usually let gerrit merge whatever I have.  I only rebase if gerrit finds a merge conflict.15:58
redrobotsilos unless I notice the merge conflict before I submit15:59
redrobotsilos so I guess the short answer is "no consensus" :)15:59
silosredrobot: haha thanks.15:59
silosIt isn't a big problem now cause I haven't even made any commits on the local branch yet but I was just wondering for future reference. thanks.15:59
*** silos1 has joined #openstack-barbican16:07
*** silos has quit IRC16:09
*** crc32 has joined #openstack-barbican16:11
*** woodster_ has joined #openstack-barbican16:20
*** spotz_zzz is now known as spotz16:26
*** SheenaG has joined #openstack-barbican16:29
*** gyee has quit IRC16:35
*** crc32 has quit IRC16:38
*** crc32 has joined #openstack-barbican16:39
*** alee is now known as alee_lunch16:42
*** crc32 has quit IRC16:56
openstackgerritOpenStack Proposal Bot proposed openstack/barbican: Updated from global requirements  https://review.openstack.org/20269616:59
*** chadlung_ has joined #openstack-barbican17:04
*** chadlung has quit IRC17:04
*** chadlung has joined #openstack-barbican17:06
*** chadlung_ has quit IRC17:06
*** shohel has quit IRC17:07
*** chadlung has quit IRC17:12
*** chadlung has joined #openstack-barbican17:12
*** rm_work|away is now known as rm_work17:13
*** chadlung has quit IRC17:17
*** chadlung has joined #openstack-barbican17:17
*** chadlung_ has joined #openstack-barbican17:20
*** chadlung has quit IRC17:20
*** chadlung_ has quit IRC17:22
*** chadlung has joined #openstack-barbican17:22
*** chadlung has quit IRC17:26
cbaderI am getting error in bringing up barbican on stable/kilo I have a pastebin of the error here. http://paste.openstack.org/show/381347/ any help appriciated.17:29
*** shohel has joined #openstack-barbican17:33
*** vivek__ has joined #openstack-barbican17:36
*** kfarr has quit IRC17:40
*** vivek__ has quit IRC17:44
rm_workcbader: yeah, you did the command differently in your paste17:46
rm_workcbader: that would fail17:46
rm_work[stack@carl-stack1:~]↥ 1 $ sudo mv devstack/ /opt/stack17:46
rm_work^^ that is wrong17:46
rm_workmv /tmp/devstack /opt/stack/17:46
rm_workTHAT is correct17:46
rm_workthe stack user needs to exist first17:47
cbaderrm_work: I am trying to get barbican to work stable/kilo moved off master17:47
rm_workwhich happens via:17:47
rm_work /tmp/devstack/tools/create-stack-user.sh17:47
rm_workwhich is the line right before it17:47
rm_worknotice the extra / at the end17:47
cbaderrm_work:thank you for info17:47
rm_workthat explains why you were seeing weird results :)17:48
cbaderrm_work: great thanks can you look at the pastebin and see if you have seen that error.17:48
rm_workwhich pastebin17:48
rm_workhttps://gist.github.com/rm-you/6feacb91182f5c011018 ?17:49
rm_workerr17:49
rm_workhttp://paste.openstack.org/show/380787/17:49
rm_work?17:49
cbaderrm_work:yes 38078717:49
rm_workno17:49
rm_workthat should not happen17:49
rm_workif you ran the script, it would create the user17:49
rm_workso the /opt/stack directory would exist17:49
cbaderrm_work: thanks for help17:49
rm_workthen the mv command (which you typed incorrectly in that paste) would run properly and move the directory into /opt/stack/devstack17:50
cbaderrm_work: in my group we don't run devstack out of the /opt/stack directory is there some requirement that I do. I have it off the /home/stack directory.17:52
rm_workah, no17:52
rm_workyou don't have to17:52
rm_workbut that is non-standard17:52
rm_workjust change the lines:17:52
cbaderrm_work: oh just following group practices.17:52
rm_work11-1317:53
rm_workall of the copy lines17:53
rm_workjust change /tmp/devstack to /home/stack/devstack17:53
rm_workassuming you already have a devstack install17:53
cbaderrm_work: I need to edit the local.conf to add my blade enviromentals do I need the rabbit mysql and key in the service enble line of local.conf17:54
rm_workso from barbican/contrib/devstack/local.conf17:55
rm_workhttps://github.com/openstack/barbican/blob/master/contrib/devstack/local.conf17:55
rm_workyou will need all the services17:55
rm_workso yes make sure rabbit mysql key barbican17:56
rm_workbecause barbican will need rabbitmq, mysql, and keystone17:56
cbaderrm_work:they are already started as part of the rest of the keystone, cinder, nova, glance and other services. Ok thanks17:57
*** gyee has joined #openstack-barbican17:57
*** kfarr has joined #openstack-barbican17:57
rm_workyeah so they should already exist in your enable services line?17:57
cbaderrm_work: thanks will try.17:58
*** kfarr has quit IRC18:02
*** alee_lunch is now known as alee18:09
*** xek has quit IRC18:10
*** DTadrzak has quit IRC18:10
*** vivek_ has joined #openstack-barbican18:11
*** DTadrzak has joined #openstack-barbican18:12
*** xek has joined #openstack-barbican18:13
*** kfarr has joined #openstack-barbican18:17
*** tkelsey has quit IRC18:22
*** crc32 has joined #openstack-barbican18:24
*** shohel has quit IRC18:30
*** kfarr has quit IRC18:40
*** rm_work is now known as rm_work|away18:45
*** jaosorior has quit IRC18:46
*** kfarr has joined #openstack-barbican18:55
kfox1111redrobot: alive?19:43
redrobotkfox1111 o/19:43
kfox1111:)19:43
kfox1111any discussion hapen with the designate folks yet?19:43
kfox1111we have a need for a feature that crosses both designate and barbican. not clear which it kind of belongs to. if I need a spec in barbican, designate, both, or crossproject.19:44
kfox1111do you have a preference?19:45
*** nkinder has quit IRC19:45
redrobotkfox1111 I think maybe both?  With a description of the problem, and a focus on the changes needed in each one?19:45
redrobotkfox1111 not sure what the crossproject specs are for?19:46
kfox1111so, basically, designate provides dns for *.*.cloud.pnnl.gov.19:46
kfox1111I need ssl certs that are signed by one ca that match those dns names.19:46
kfox1111so barbican can provide the one ca, and the signing api,19:46
kfox1111but designate's the source of ownership truth.19:46
kfox1111so its not clear, does the user interact with designate and it proxies parts over to barbican,19:47
kfox1111or the other way around.19:47
redrobotkfox1111 what's the use case?19:47
kfox1111the most common one strangely. :)   user launches a web server, and wants https to work. :)19:48
kfox1111self signed is really really bad. :/19:48
kfox1111each tenant having its own ca, having to load it into the browser of everyone else is a no go either. :/19:48
kfox1111each tenant gets their own subdomain under their own control in designate. so project foo gets *.foo.cloud.pnnl.gov19:49
kfox1111so we don't want to just allow anyone to create certs for subdomains they don't own.19:50
kfox1111designate maintains those permissions.19:50
redrobotkfox1111 RE: "self signed is really really bad" so you need x.509 certs to be issued by a public CA?19:50
kfox1111we have a CA at the lab, and I'm thinking we write a plugin to make that ca available to barbican.19:51
kfox1111that ca's cert is already loaded into every browser at the lab.19:51
redrobotkfox1111 so not necessarily a public CA, but you want to define what the trusted root is?19:51
*** dave-mcc has joined #openstack-barbican19:52
kfox1111need a way to issue certs to that shared ca, but not allow one tenant to create a cert in a domain not registered to them.19:52
kfox1111I'm not too familior with ca's. I was under the impression a ca could sign certs for all sites, not just subdomains.19:53
kfox1111if you can create subca's that can be restricted to a particular subdomain, and the ca's chain of trust works without loading anything but the root ca into the browser, that would work too.19:53
redrobotDesignate knows which tenant owns which subdomain?19:55
kfox1111correct. you end up creating a subdomain in the primary domain, and then you can "transfer" it from one tenant to another.19:55
kfox1111so our mgmt tenant owns cloud.pnnl.gov, we create foo.cloud.pnnl.gov in it for the foo project, and then transfer it to them.19:55
kfox1111then can further subdomain it and transfer bits if they like.19:56
kfox1111very cool in some ways. :)19:56
kfox1111makes for getting valid ssl certs a bit tricky though, without some kind of integration with designate.19:57
redrobotkfox1111 does Designate have an API that exposes which subdomains belong to a tenant?19:58
kfox1111not sure. I'll go look. If not, I'm sure it could be part of the blueprint.19:59
redrobotkfox1111 so the tricky part is going to be making the subdomain determination...  that should be handled by the CA.  Barbican is not a full CA itself, but rather defers the actual provisioning of the cert to a 3rd party CA.20:00
redrobotafaik, DogTag does have support for private roots20:00
redrobotso you could run dogtag as your CA20:00
redrobotwith a self signed root that you mark as trusted in your clients20:00
redrobotthe tricky part is going to be configuring the auth piece based on the DN of the cert request.20:01
kfox1111yeah.20:01
kfox1111http://designate.readthedocs.org/en/latest/rest/v2/zones.html20:01
redrobotfrom barbican's point of view, we just forward the request to the CA and then store it when it's ready20:01
kfox1111There isn't a get zone by name, only by id. but I'm sure it coudl be added.20:02
kfox1111the question is, does the user go to designate to fetch the cert, since it already knows if the user is allowed or not, and proxy the call over to barbican,20:02
kfox1111or does the call go to a barbican api, and barbican calls over to designate for subdomain ownership verification?20:03
redrobotkfox1111 I think that would be the easiest way to do this, since Designate knows whether the DN is allowed or not.20:03
redrobotkfox1111 barbican doesn't know anything about which DNs are allowed or not, so we would have to develop a smart CA that can make that determination, and then plugin that newly developed CA into barbican.20:04
redrobotfor public CAs, they have processes to determine if your DN is valid or not... but I have no idea how to automate that with a self signed root.20:04
kfox1111ok. so designate would basically have its own tenant, manage barbican keys in there, and deal with the DN's itself? The user would only request a cert from designate?20:04
kfox1111in that case, barbican would simply just be a CA/secret store.20:05
kfox1111which sounds about right...20:05
redrobotkfox1111 yeah, for the user it could be as easy as checking a box that says they need TLS20:05
kfox1111yeah. thats my hope. :)20:05
redrobotthen designate can craft the CSR with the correct DN, and Barbican would just trust the request because it came from Designate.20:05
kfox1111ok. I'll raise it as a designate spec, since it would be driven by them, and see how it fly's.20:06
redrobotkfox1111 with the per-project CAs, we could even make that self-signed root private and available only to the designate service user20:06
kfox1111yeah, I think that part would be critical.20:06
*** rm_work|away is now known as rm_work20:07
redrobotkfox1111 yep, sounds like the correct approach to me.  ping me when you have the spec up for review.20:07
kfox1111ok. will do. thanks for the help. :)20:07
*** nkinder has joined #openstack-barbican20:34
kfox1111where's the barbican api docs?20:40
redrobotkfox1111 http://docs.openstack.org/developer/barbican/api/index.html20:40
kfox1111thx.20:40
kfox1111one more thought on the designate thing.20:41
*** dave-mccowan has joined #openstack-barbican20:41
kfox1111user creates an octavia lb thats hosting the dns entry the tenant owns, and wants to do ssl termination in the lb.20:41
openstackgerritDave McCowan proposed openstack/barbican: Add RBAC Functional Test for ACL Opeations  https://review.openstack.org/20069620:41
kfox1111that currently goes to barbican directly, I think. woudl that get changed to talk to designate instead?20:42
redrobotkfox1111 so octavia does not have the DN restrictions you have.  They assume the user either has a valid cert, or they can request one from Barbican.  They also assume public CA is being used20:43
redrobotrm_work does that sound right? ^^20:43
redrobotkfox1111 a customer could bring their own domain, for example.  as I understand your use case, they are very limited on what that domain can be.20:44
*** dave-mcc has quit IRC20:44
kfox1111yeah.20:44
kfox1111hmm...20:45
kfox1111idea... do secret acl's support tenant's?20:45
kfox1111if so, you could have designate put in the order for the correct/restricted DN'ed cert, then add the tenant who own's it to that secret's acl.20:46
kfox1111the user could then fetch it via barbican as normal.20:46
dave-mccowanby default RBAC, access to secrets is limited to a project(tenant) and only to users with a role of [admin,creator,observer] in that project.20:48
dave-mccowanso any secret created for project1 could not be accessed by a user of project 2.  no ACL needed.20:48
kfox1111yeah, so designate would own a project/tenant. have a private ca, create certs in there,20:48
kfox1111but would want to hand out specific certs to their owners. so would need a tenant level acl on jus the secret,20:49
redrobotkfox1111 I'm not sold on tenant level acl.  it seems like a reimplementation of rbac20:49
redrobotkfox1111 what about this:20:49
redrobotDesignate requests the cert from their project-specific CA.  Barbican trusts the request because it came from Designate, and routes it to the predefined self-signed root.20:50
kfox1111or some how transfer a secret from the designate tenant to the projects?20:50
dave-mccowanthen ACLs could appy.  secret would be created in designate's project, and access defined to a list of users in the tenant's project.  but, it would have to be a list of specific users.20:50
redrobotthen Designate uploads the cert to the users' project.20:50
redrobotyeah...  I'm not sure if/when keystone will support impersonation.20:50
redrobotwe can do it now in Rackspace cloud... where a token looks like a user token, but in reality is a service level user impersonating the customer.20:51
redrobotDesignate -> barbican to provision cert20:51
kfox1111barbican concern's itself with users too often in my opinion. tenants are the unit of ownership in openstack.20:51
redrobotkfox1111 agreed.  by default all our access is scoped to the project (aka tenant)20:52
kfox1111users go on vacation, and another needs to work in his/her place (I'm going on vacation next week. :)20:52
redrobotkfox1111 ACLs were added because there was a strong push for an alternative way of segregating secrets.20:52
kfox1111yeah. because tenants -> roles mappings are very corse grained.20:52
redrobotkfox1111 I still don't like ACLs to be honest, but I was outvoted for adding the support20:52
kfox1111tenant A may need one secret from tenant B.20:53
redrobotkfox1111 you mean a user in poroject A needs a secret from project B?  then the user should be granted a new role in Project B20:53
kfox1111Yeah, I like the way amazon did it. :/20:53
kfox1111but then that gives user access to all of project b's secrets. thats too much.20:54
redrobotso you add a new project C, where you add just the secrets you want to share...20:54
kfox1111the only way to really secure things then is to have one secret per project so you cna assign them. :/20:54
kfox1111Yeah. :/ painful.20:54
kfox1111We don't allow users to create their own projects today.20:54
redrobotit's the way Keystone set up everything... a lot of people don't like it and we end up having to add things to other services to work around it, like ACLs :(20:55
kfox1111There be draggons there I think. :/20:55
kfox1111yeah. the problem is it implies too much to too many projects.20:55
kfox1111say you create all those tennants for barbican secrets.20:55
kfox1111each has a nova default quota.20:55
kfox1111way way too many reasources are now given out on the compute side.20:56
kfox1111and worse, giving user A access to tenant b's secret via a tenant may give them access to launch vm's in that space.20:57
kfox1111bleh.20:57
kfox1111keystone tenants work fairly well as an idea when looked at only from one project's silo, but starts to break down in the big tent. :/20:57
redrobotkfox1111 so that could be mitigated with namespaced roles, I think20:58
redrobotgrant "barbican:read" role on project b20:58
redrobotdoes not give teh user permission to launch vms for example20:59
kfox1111yes, but that also means all other keystone supporting projects have to have roles that are required before something can work.20:59
kfox1111so nova-compute role, and glance and sahara, etc.20:59
kfox1111none of those exist today. :/20:59
redrobotthere was talk at the summit about adding them20:59
redrobotpart of the dynamic policy talks20:59
kfox1111yeah. I think they will get there eventually. I'm looking forward to it. but I think its at least a year out. :/21:00
*** gyee has quit IRC21:02
kfox1111so yay or nay on tenant acls? I don't think they are very different then user acl's.21:03
*** SheenaG has quit IRC21:03
kfox1111they would let designate continue to own the secret, and delete it when ownership of the subdomain changes.21:03
kfox1111it would still need to revoke it, and the user might have a copy, but still one less thing to trip over.21:04
kfox1111another bonus is designate would never have to handle the actual secret then. it would just create it and allow the user to directly fetch it.21:05
redrobotI'm not a fan of tenant acls.  we can add it to the agenda next week though.  other folks might find it interesting.21:06
kfox1111k.21:06
kfox1111thx.21:06
kfox1111does the order api for a stored key certificate order allow you to specify the DN?21:09
kfox1111oh... its 2 orders.21:11
kfox1111so.... hmm....21:11
redrobotkfox1111 you (the client) crafts the CSR21:11
redrobotCSR includes the DN21:12
kfox1111designate would have to have some workflow manager of its own... :/21:12
redrobotkfox1111 yeah... public CAs can take up to a couple of weeks before a cert is issued... so we have to have an async api21:12
kfox1111so, designate-api gets a request for a ssl cert. validates user owns it. looks in its db, doesn't have a container or order url. generates a certificate, stores it in barbican. sets the container in the db. then creates the barbican order and returns "try again"21:13
kfox1111on contact, while order url is set, it checks on the order first, fetches the other container url when the order's ready, then clears the order url from the db?21:15
kfox1111"looking at the stored key certificate order" section of http://docs.openstack.org/developer/barbican/api/quickstart/certificates.html21:16
kfox1111it would be nice if the private key could be generated in barbican too rather then generate and transfer it in.21:16
kfox1111but I'd have to set the dn in the request somehow. can that be stuck in the "meta" section?21:16
redrobotkfox1111 we do support that.  that's what the "stored key" case is all about21:16
redrobotthe key is "stored" in barbican already21:16
redroboteither by you storing it, or by sending an order to generate it21:17
rm_workkfox1111: yeah, stored key create21:17
rm_workisn't DN part of the CSR?21:17
rm_workhow could you have a cert request WITHOUT a DN?21:17
rm_workor am i really confused21:17
kfox1111oh. your right. its in the second order. I see it.21:17
redrobotrm_work you may be confused. :-P21:17
kfox1111"subject_dn"21:18
kfox1111so does the second order create a second container?21:18
redrobotkfox1111 not every order creates a container21:18
redrobotkfox1111 only orders which result in multiple secrets21:18
redrobotkfox1111 like ordering a public/private keypair21:19
redrobotkfox1111 or a certificate, which also includes intermediates.21:19
kfox1111ok, in this specific workflow? :)21:19
rm_workredrobot: when I make a CSR, the DN is essentially 90% of the data I put in21:19
redrobotrm_work yes, CSR does contain the DN21:19
kfox1111so the initial private key order creates the container, and the certificate order just drops the cert into the same container?21:19
rm_worki thought21:19
redrobotinitial order creates an RSA container... it has a ref to the private part.  second order includes that secret ref (to the private key only)21:20
redrobotie. the Cert order does not need the public rsa bits21:21
kfox1111and where does the cert go then? Another container?21:22
*** kfarr has left #openstack-barbican21:22
kfox1111I guess it would have to, since it doesn't have a reference to the container.21:23
redrobotkfox1111 yep.  cert order creates a cert-type container21:23
redrobotkfox1111 rsa key order creates an rsa-type container21:23
kfox1111so if we did the acl thing, we'd need tenant acl's on both containers.21:25
kfox1111or...21:25
kfox1111the designate api could take in the rsa key container id, generate the cert, and then acl just the cert container.21:26
kfox1111the formers' more work for designate. the latter's more work for the user.21:26
kfox1111got a meting I gota go to. thanks for the discussion.21:27
*** Kevin_Bishop has quit IRC21:39
*** vivek_ has quit IRC21:51
*** silos1 has left #openstack-barbican21:55
*** SheenaG has joined #openstack-barbican21:57
*** diazjf has left #openstack-barbican21:57
*** vivek_ has joined #openstack-barbican21:58
*** xaeth is now known as xaeth_afk22:14
*** vivek__ has joined #openstack-barbican22:15
*** vivek_ has quit IRC22:15
*** pglass has quit IRC22:16
*** SheenaG has quit IRC22:25
*** spotz is now known as spotz_zzz22:34
*** SheenaG has joined #openstack-barbican22:41
*** alee has quit IRC22:42
*** shohel has joined #openstack-barbican22:57
*** shohel has quit IRC23:05
*** zigo has quit IRC23:21
*** zigo has joined #openstack-barbican23:22
*** dimtruck is now known as zz_dimtruck23:25
*** vivek__ has quit IRC23:26
*** openstackstatus has joined #openstack-barbican23:33
*** ChanServ sets mode: +v openstackstatus23:33
*** SheenaG has quit IRC23:43
*** SheenaG has joined #openstack-barbican23:46
*** vivek_ has joined #openstack-barbican23:52
*** barra204 has joined #openstack-barbican23:54

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!