*** ministry is now known as __ministry | 00:06 | |
dmendiza[m] | #startmeeting keystone | 15:01 |
---|---|---|
opendevmeet | Meeting started Tue Jan 25 15:01:36 2022 UTC and is due to finish in 60 minutes. The chair is dmendiza[m]. Information about MeetBot at http://wiki.debian.org/MeetBot. | 15:01 |
opendevmeet | Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. | 15:01 |
opendevmeet | The meeting name has been set to 'keystone' | 15:01 |
dmendiza[m] | #topic Roll Call | 15:01 |
dmendiza[m] | Courtesy ping for ayoung, bbobrov, crisloma, d34dh0r53, dpar, dstanek, gagehugo, hrybacki, knikolla, lamt, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, spilla, ruan_he, wxy, sonuk, vishakha,Ajay, rafaelweingartner, xek | 15:02 |
knikolla | o/ | 15:02 |
d34dh0r53 | o/ | 15:02 |
dmendiza[m] | As usual, the agenda etherpad is over here: https://etherpad.opendev.org/p/keystone-weekly-meeting | 15:02 |
dmendiza[m] | OK, let's get started | 15:03 |
dmendiza[m] | #topic Review Past Meeting Action Items | 15:03 |
xek | o/ | 15:03 |
dmendiza[m] | #link https://meetings.opendev.org/meetings/keystone/2022/keystone.2022-01-18-15.00.html | 15:03 |
dmendiza[m] | We didn't have any | 15:04 |
dmendiza[m] | #topic Liaison Updates | 15:04 |
dmendiza[m] | knikolla: any updates this week? | 15:04 |
knikolla | no updates, need to catch up | 15:04 |
dmendiza[m] | You need some help with that? | 15:04 |
dmendiza[m] | I need to catch up on Oslo stuff | 15:04 |
dmendiza[m] | for Barbican | 15:04 |
dmendiza[m] | I could definitely keep an eye out for Keystone stuff too | 15:05 |
knikolla | thanks! we used to have a rotating bug duty position which involved keeping up with mailing list, bugs, etc. we can bring that back. | 15:06 |
dmendiza[m] | Yeah, that sounds interesting. I'm sure d34dh0r53 would want to help out too | 15:07 |
* dmendiza[m] nudges d34dh0r53 | 15:07 | |
knikolla | the etherpad is linked in the meeting agenda https://etherpad.opendev.org/p/keystone-l1-duty | 15:08 |
d34dh0r53 | yeah, that sounds like something I can help with | 15:08 |
dmendiza[m] | Let's try to do that this week. | 15:09 |
dmendiza[m] | I'll take this week, and we can do a handoff next week | 15:10 |
dmendiza[m] | during this meeting | 15:10 |
dmendiza[m] | #info dmendiza[m] is on L1 duty this week | 15:10 |
dmendiza[m] | OK, moving on ... | 15:11 |
dmendiza[m] | #topic Specs | 15:11 |
dmendiza[m] | Let's start with OAuth 2.0 | 15:11 |
dmendiza[m] | #link https://review.opendev.org/c/openstack/keystone-specs/+/813152 | 15:11 |
dmendiza[m] | Looks like knikolla has a +2 review on it | 15:12 |
dmendiza[m] | maybe we can get gagehugo to take a look this week | 15:12 |
dmendiza[m] | it would be awesome to get that landed so h_asahina can start work on that | 15:12 |
dmendiza[m] | Moving on to S-RBAC | 15:14 |
dmendiza[m] | #link https://review.opendev.org/c/openstack/governance/+/815158 | 15:14 |
dmendiza[m] | looks like the follow-up to the Yoga goals is still under review | 15:14 |
dmendiza[m] | I need to go review this myself | 15:14 |
dmendiza[m] | There's also two more specs that need review | 15:16 |
dmendiza[m] | related to S-RBAC | 15:16 |
dmendiza[m] | #link https://review.opendev.org/c/openstack/keystone-specs/+/818603 | 15:16 |
dmendiza[m] | > Describe the need for a default manager role | 15:17 |
dmendiza[m] | and also | 15:17 |
dmendiza[m] | #link https://review.opendev.org/c/openstack/keystone-specs/+/818616 | 15:17 |
dmendiza[m] | > Describe the need for a default service role | 15:17 |
dmendiza[m] | Both will be needed for S-RBAC | 15:17 |
dmendiza[m] | There's one more spec that is < 90 days old | 15:18 |
dmendiza[m] | #link https://review.opendev.org/c/openstack/keystone-specs/+/618144 | 15:18 |
dmendiza[m] | > Reparent Projects | 15:19 |
dmendiza[m] | I have not looked into that last one at all. I'll try to catch up on specs this week | 15:20 |
dmendiza[m] | #topic Open Discussion | 15:21 |
dmendiza[m] | Any other topics before we move on to the Bug Review? | 15:21 |
dmendiza[m] | OK, moving on ... | 15:26 |
dmendiza[m] | #topic Bug Review | 15:26 |
dmendiza[m] | #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 | 15:26 |
dmendiza[m] | Hmm... Not sure how far back we need to look | 15:28 |
dmendiza[m] | let's start with mid-december | 15:28 |
dmendiza[m] | since it's been a while | 15:28 |
dmendiza[m] | #link https://bugs.launchpad.net/keystone/+bug/1954425 | 15:28 |
dmendiza[m] | > Administrator can't create trusts on behalf of users | 15:28 |
dmendiza[m] | Interesting case | 15:32 |
dmendiza[m] | I don't have any historical context to answer why admins are not allowed | 15:32 |
knikolla | I know there are limitations with system scoped tokens when the operation requires a project_id in the context, but this bug seems to mention that this wouldn't be the case since all required parameters are in the request. | 15:34 |
knikolla | I don't have a strong opinion whether to allow admins to create trusts for users, or not. | 15:35 |
dmendiza[m] | Yeah, I was going to say, in the context of S-RBAC, a project-admin would be a persona that is used by an operator | 15:35 |
dmendiza[m] | so it would make sense for an operator to allow the creation of trusts | 15:35 |
dmendiza[m] | *to allow an operator to create them | 15:35 |
dmendiza[m] | and maybe it also makes sense for a project-manager to be able to create trusts for users in their project? | 15:36 |
dmendiza[m] | I'll take this bug | 15:39 |
dmendiza[m] | Next | 15:39 |
dmendiza[m] | #link https://bugs.launchpad.net/keystone/+bug/1954665 | 15:39 |
knikolla | i'm a bit hesitant, just because a trust delegates permissions from a user to another user, and my spider sense is tingling when you're delegating someone else's permissions, even if you're an admin. | 15:39 |
dmendiza[m] | perhaps a better option would be to move the hard-coded deny to a policy | 15:40 |
dmendiza[m] | then someone who wants to do it can create a custom policy for that trust endpoint | 15:41 |
knikolla | I delegate to people with more of a security background than I have on this. | 15:42 |
knikolla | You can accomplish a lot of what they're trying to do by using other mechanisms already. | 15:42 |
knikolla | Groups, new users, application credentials, etc. | 15:43 |
knikolla | I think this also the only mechanism that we have that allows impersonation, with the token actually getting the user_id of the trustor. | 15:44 |
dmendiza[m] | Hmmm... good points | 15:45 |
dmendiza[m] | Maybe we can talk about it some more for the Friday reviewathon | 15:46 |
knikolla | sounds good | 15:47 |
dmendiza[m] | OK, moving on to | 15:47 |
dmendiza[m] | > default opt out from non-existing event (authenticate.failed) | 15:47 |
dmendiza[m] | (linked above) | 15:48 |
dmendiza[m] | Seems pretty straightforward | 15:48 |
dmendiza[m] | looks like there may be a mismatch in queue names | 15:48 |
knikolla | even though there was a typo, we're still changing default behavior | 15:51 |
knikolla | At the very minimum it requires a release note | 15:51 |
knikolla | On the other hand of the spectrum we can update the config text to mention that only authentication failures are sent. | 15:52 |
dmendiza[m] | I think the issue is that we're using the string as defined in pycadf | 16:00 |
dmendiza[m] | #link https://opendev.org/openstack/keystone/src/branch/master/keystone/notifications.py#L587-L589 | 16:00 |
dmendiza[m] | which is defined as "failure" | 16:00 |
dmendiza[m] | #link https://opendev.org/openstack/pycadf/src/branch/master/pycadf/cadftaxonomy.py#L76 | 16:00 |
dmendiza[m] | so we will never emit an event called "failed" | 16:01 |
dmendiza[m] | In any case, we're out of time for the week | 16:01 |
dmendiza[m] | we can pick this again next week | 16:01 |
dmendiza[m] | thanks for joining, y'all! | 16:02 |
dmendiza[m] | #endmeeting | 16:02 |
opendevmeet | Meeting ended Tue Jan 25 16:02:14 2022 UTC. Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4) | 16:02 |
opendevmeet | Minutes: https://meetings.opendev.org/meetings/keystone/2022/keystone.2022-01-25-15.01.html | 16:02 |
opendevmeet | Minutes (text): https://meetings.opendev.org/meetings/keystone/2022/keystone.2022-01-25-15.01.txt | 16:02 |
opendevmeet | Log: https://meetings.opendev.org/meetings/keystone/2022/keystone.2022-01-25-15.01.log.html | 16:02 |
*** colleen1 is now known as cmurphy | 19:59 |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!