*** mhen_ is now known as mhen | 02:15 | |
opendevreview | James Page proposed openstack/keystone master: Switch to using oslo.utils secretutils https://review.opendev.org/c/openstack/keystone/+/939739 | 08:09 |
---|---|---|
opendevreview | James Page proposed openstack/keystone master: Drop the sha512_crypt module https://review.opendev.org/c/openstack/keystone/+/939778 | 10:16 |
d34dh0r53 | #startmeeting keystone | 15:03 |
opendevmeet | Meeting started Wed Jan 22 15:03:35 2025 UTC and is due to finish in 60 minutes. The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot. | 15:03 |
opendevmeet | Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. | 15:03 |
opendevmeet | The meeting name has been set to 'keystone' | 15:03 |
d34dh0r53 | Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct | 15:03 |
d34dh0r53 | #link https://openinfra.dev/legal/code-of-conduct | 15:03 |
d34dh0r53 | #topic roll call | 15:04 |
d34dh0r53 | admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe | 15:04 |
xek | o/ | 15:04 |
d34dh0r53 | and a special ding for dmendiza | 15:04 |
gtema | o/ | 15:04 |
d34dh0r53 | o/ | 15:04 |
dmendiza[m] | 🙋♂️ | 15:04 |
dmendiza[m] | I appreciate the special treatment 🥰 | 15:04 |
d34dh0r53 | :) | 15:06 |
d34dh0r53 | #topic liaison updates | 15:06 |
d34dh0r53 | nothing from VMT or releases | 15:06 |
d34dh0r53 | #topic specification OAuth 2.0 (hiromu) | 15:07 |
d34dh0r53 | #link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext | 15:07 |
d34dh0r53 | #link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability | 15:07 |
d34dh0r53 | External OAuth 2.0 Specification | 15:07 |
d34dh0r53 | #link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged) | 15:07 |
d34dh0r53 | OAuth 2.0 Implementation | 15:07 |
d34dh0r53 | #link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls | 15:07 |
d34dh0r53 | OAuth 2.0 Documentation | 15:07 |
d34dh0r53 | #link https://review.opendev.org/c/openstack/keystone/+/838108 (merged) | 15:07 |
d34dh0r53 | #link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged) | 15:07 |
d34dh0r53 | no updates from me on this | 15:07 |
d34dh0r53 | #topic specification Secure RBAC (dmendiza[m]) | 15:07 |
d34dh0r53 | #link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_ | 15:07 |
d34dh0r53 | 2024.1 Release Timeline | 15:07 |
d34dh0r53 | Update oslo.policy in keystone to enforce_new_defaults=True | 15:07 |
d34dh0r53 | Update oslo.policy in keystone to enforce_scope=True | 15:08 |
dmendiza[m] | I have to review the Domain Manager patches still 😅 | 15:08 |
dmendiza[m] | Not much in the way of updates this week. | 15:08 |
d34dh0r53 | Ack, thanks dmendiza | 15:09 |
d34dh0r53 | #topic specification OpenAPI support (gtema) | 15:09 |
d34dh0r53 | #link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone | 15:09 |
gtema | over the weekend I found one of the merged changes introduced bug. The fix is https://review.opendev.org/c/openstack/keystone/+/939583 | 15:09 |
gtema | schema was too permissive to capture the issue | 15:10 |
gtema | would appreciate a quick approval since it weirdly now block codegenerator due to that broken schema | 15:10 |
xek | +2 | 15:10 |
* gtema wonders why codegenerator test didn't catch this | 15:10 | |
d34dh0r53 | approved | 15:11 |
gtema | thks a lot | 15:11 |
d34dh0r53 | np | 15:12 |
d34dh0r53 | anything else regarding OpenAPI support? | 15:12 |
gtema | not this week | 15:12 |
gtema | thanks | 15:13 |
d34dh0r53 | 👍️ | 15:13 |
d34dh0r53 | #topic specification domain manager (mhen) | 15:13 |
d34dh0r53 | still unmerged are: | 15:13 |
d34dh0r53 | documentation: https://review.opendev.org/c/openstack/keystone/+/928135 | 15:13 |
d34dh0r53 | tempest tests: https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/924222 | 15:13 |
dmendiza[m] | I need to look through these | 15:14 |
mharley[m] | o/ | 15:14 |
d34dh0r53 | hi mharley! Welcome | 15:15 |
d34dh0r53 | thanks dmendiza | 15:15 |
d34dh0r53 | next up | 15:15 |
mharley[m] | Thanks, Dave Wilde (d34dh0r53) ! | 15:15 |
d34dh0r53 | #topic specification Include bad password details in audit messages (stanislav-z) | 15:15 |
d34dh0r53 | #link https://review.opendev.org/c/openstack/keystone-specs/+/915482 | 15:15 |
d34dh0r53 | #link https://review.opendev.org/q/topic:%22pci-dss-invalid-password-reporting%22 | 15:15 |
d34dh0r53 | 21-Jan update: review feedback incorporated, looking for reviews | 15:15 |
gtema | I had already a look and I indeed like naming config option "report_invalid_password_hash" | 15:16 |
d34dh0r53 | yeah, that's much better | 15:16 |
gtema | now it was renamed from invalid_password_hash_include to log_invalid_password_hash. But I think report_invalid_password_hash is more universal | 15:17 |
stanislav-z | I'll update it now :) thanks | 15:17 |
gtema | thanks Stanislav Zaprudskiy | 15:17 |
d34dh0r53 | thank you Stanislav Zaprudskiy ! | 15:17 |
d34dh0r53 | #topic open discussion | 15:17 |
gtema | I am first :) | 15:18 |
gtema | https://github.com/gtema/oslo.policy.opa | 15:18 |
gtema | I was able to create a plugin for oslo.policy and even auto-generate oslo_policies into the OpenPolicyAgent language | 15:18 |
d34dh0r53 | wow | 15:18 |
dmendiza[m] | Nice | 15:19 |
gtema | in the meanwhile even found ancient blogpost https://jaosorior.dev/2018/rewriting-openstack-policy-files-in-open-policy-agent-rego-language/ that specilated about this idea back in 2018 | 15:19 |
gtema | and while my convertor was working I thought some of the policies in keystone are not really working like human would understand them due to the priority of AND and OR that oslo_policy applies | 15:20 |
gtema | those are especially tricky in the role assignements (wrt domain manager) | 15:20 |
gtema | can't say with confidence, just have a feeling those might be wrong | 15:20 |
gtema | I was able to auto-convert keystone and barbican policies, would try others later | 15:21 |
gtema | I LOVE possibility to test policies very explicitly | 15:21 |
gtema | this is something I miss in oslo_policy | 15:21 |
gtema | that's it so far from me on that | 15:22 |
dmendiza[m] | Oh hey that's Ozz's blog. I know that guy. | 15:22 |
gtema | with that it is possible to have very preciese fine-graned policies in Keystone without role explosion | 15:24 |
mharley[m] | gtema: when you say "test policies", are you referring something like this (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html)? | 15:25 |
mharley[m] | Just to establish a parallel with your sentence. :-) | 15:25 |
gtema | mharley: I refer to https://github.com/gtema/oslo.policy.opa?tab=readme-ov-file#policy-testing and https://www.openpolicyagent.org/docs/latest/policy-testing/ | 15:25 |
gtema | but yeah, it is something similar | 15:26 |
gtema | basically you can write unittest that will evaluate the authorization decision based on inputs | 15:26 |
mharley[m] | Got it. Something more "roots". :-) | 15:26 |
gtema | in OpenPolicyAgent you also have a decision log what helps you to track down how OPA resolved the request | 15:27 |
cardoe | Since it's quiet I'll ask what I asked after the meeting last week.. I'm really just wanting to provide documentation updates for usage. I've tried to dip my toe in the water with https://review.opendev.org/c/openstack/keystone/+/929315 but just unsure what I need to do to keep advancing things. | 15:30 |
cardoe | I just want to have the docs correct for existing installations. Today the docs talk about Ubuntu 16.04 in many places and the packages involved have changed. Their configuration has changed as well. | 15:31 |
gtema | +W-ed | 15:31 |
d34dh0r53 | thanks gtema | 15:32 |
d34dh0r53 | and thank you cardoe for this, those docs were indeed lacking | 15:32 |
gtema | cardoe: this OpenPolicyAgent work that I described is very helpful in the OIDC improvements since it allows us to properly decouple auth from authz | 15:32 |
gtema | I am generally still on the topic, so haven't forgotten | 15:32 |
cardoe | 100% agree gtema. I was actually looking at what you did and this nails what I'm going to want to explore in the future in a wayyyy better way. | 15:33 |
gtema | thks :) | 15:33 |
d34dh0r53 | awesome, anything else for open discussion before we move on? | 15:34 |
stanislav-z | I have one, too. | 15:34 |
stanislav-z | https://bugs.launchpad.net/keystone/+bug/1914260 - I wanted to start working on this one. Especially for cases when resources are *deleted* (e.g. project, or user, etc), only their ID and typeURI are reported in audit events (under `target`) - which makes it difficult to handle cases e.g. when a real user comes and wants to know who deleted their resource, but all they have is the resource' name/project/domain - which is at | 15:34 |
stanislav-z | that point not possible to translate to ID (or vice-versa) as the corresponding resource was already gone. I thought of extending the `delete` events with some additional details. Does anybody have suggestions, or objections against it? | 15:34 |
gtema | Stanislav Zaprudskiy: I think we also lack generally a doc on how all this is intended to be captured/processed. I want to start looking into audit area for my employer as well and so far miss some basics | 15:36 |
gtema | since you work on that maybe you can also propose some doc improvements so that we all are on the same page | 15:36 |
stanislav-z | I could potentially share how it's being used in our set-up, which might be a starting point for the doc | 15:39 |
gtema | yeah, that will help understanding where are the requirements for improvements coming from | 15:39 |
stanislav-z | jfr, there is another service on top - https://github.com/sapcc/hermes. and some more things, too :) I'll try to come up with something, and will have a look where would be a good place for the doc | 15:40 |
gtema | cool | 15:41 |
gtema | "It is named after the Futurama character, not the Greek god." - lol | 15:41 |
d34dh0r53 | Thank you Stanislav Zaprudskiy ! | 15:42 |
d34dh0r53 | #topic bug review | 15:42 |
d34dh0r53 | #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 | 15:42 |
d34dh0r53 | no new bugs for keystone | 15:42 |
d34dh0r53 | #link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=0 | 15:42 |
d34dh0r53 | nor python-keystoneclient | 15:43 |
d34dh0r53 | #link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=0 | 15:43 |
d34dh0r53 | no new bugs in keystoneauth | 15:43 |
d34dh0r53 | #link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=0 | 15:43 |
d34dh0r53 | nothing new in keystonemiddleware | 15:43 |
d34dh0r53 | #link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=0 | 15:43 |
d34dh0r53 | pycadf is good | 15:43 |
d34dh0r53 | #link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=0 | 15:43 |
d34dh0r53 | so is ldappool | 15:43 |
d34dh0r53 | #topic conclusion | 15:43 |
d34dh0r53 | I won't be able to make the reviewathon this week, but other than that I've got nothing | 15:44 |
d34dh0r53 | please reach out if you need anything | 15:44 |
gtema | thks guys, need to run | 15:44 |
d34dh0r53 | Thanks folks! | 15:47 |
d34dh0r53 | #endmeeting | 15:47 |
opendevmeet | Meeting ended Wed Jan 22 15:47:51 2025 UTC. Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4) | 15:47 |
opendevmeet | Minutes: https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-01-22-15.03.html | 15:47 |
opendevmeet | Minutes (text): https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-01-22-15.03.txt | 15:47 |
opendevmeet | Log: https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-01-22-15.03.log.html | 15:47 |
opendevreview | Stanislav Zaprudskiy proposed openstack/keystone-specs master: Include invalid password details in audit messages https://review.opendev.org/c/openstack/keystone-specs/+/915482 | 16:30 |
opendevreview | Merged openstack/keystone master: Fix invalid jsonschema for trusts https://review.opendev.org/c/openstack/keystone/+/939583 | 17:36 |
opendevreview | Merged openstack/keystone master: extend docs explaining OIDC https://review.opendev.org/c/openstack/keystone/+/929315 | 18:26 |
-opendevstatus- NOTICE: The Gerrit service on review.opendev.org will be offline momentarily for a restart to put some database compaction config changes into effect, and will return within a few minutes | 22:54 |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!