Wednesday, 2025-02-19

opendevreviewYaguang Tang proposed openstack/keystoneauth master: fix logic issue for getting IDP data with HTTP 400 response  https://review.opendev.org/c/openstack/keystoneauth/+/94217109:19
opendevreviewLuca Miccini proposed openstack/keystonemiddleware master: WIP DNM test  https://review.opendev.org/c/openstack/keystonemiddleware/+/94220214:49
opendevreviewArtem Goncharov proposed openstack/keystone master: [DNM] test new openstackdocstheme  https://review.opendev.org/c/openstack/keystone/+/94220314:50
d34dh0r53#startmeeting keystone15:02
opendevmeetMeeting started Wed Feb 19 15:02:10 2025 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:02
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:02
opendevmeetThe meeting name has been set to 'keystone'15:02
d34dh0r53Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct15:02
d34dh0r53#link https://openinfra.dev/legal/code-of-conduct15:02
d34dh0r53#topic roll call15:02
gtemao/15:02
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe, deydra15:02
d34dh0r53dmendiza: o/15:02
cardoeo/15:02
mheno/15:02
xeko/15:03
cardoebefore we start, just wanna say thanks to d34dh0r53 and all his efforts on keystone and being the PTL for so long :)15:03
gtema+1015:03
d34dh0r53Thank you <315:03
d34dh0r53It's been fun and I was struggling with the decision but the time is right15:04
d34dh0r53#topic review past meeting work items15:04
d34dh0r53#link https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-02-12-15.06.html15:05
d34dh0r53no action items from last week15:05
d34dh0r53#topic liaison updates15:05
d34dh0r53nothing from VMT or releases15:05
d34dh0r53#topic specification OAuth 2.0 (hiromu)15:06
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:06
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:07
d34dh0r53External OAuth 2.0 Specification15:07
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged)15:07
d34dh0r53OAuth 2.0 Implementation15:07
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls (merged)15:07
d34dh0r53OAuth 2.0 Documentation15:07
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/838108 (merged)15:07
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged)15:07
d34dh0r53no updates from me this week15:07
d34dh0r53I should have time to rebase the last couple of patches and I'll bug for reviews on Friday :)15:07
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:08
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:08
d34dh0r532024.1 Release Timeline15:08
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:08
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:08
d34dh0r53guess dmendiza isn't around yet15:09
d34dh0r53#topic specification OpenAPI support (gtema)15:10
d34dh0r53#link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone15:10
gtemaI just merged the openstackdocstheme change (and created DNM change in keystone to verify it is running)15:10
gtemaafter that I'll proceed integrating openapi rendered into our api-ref15:10
gtemaother than that there are no other things from me15:11
d34dh0r53thank you! that's awesome15:12
d34dh0r53#topic specification domain manager (mhen)15:12
d34dh0r53still unmerged are:15:12
d34dh0r53documentation: https://review.opendev.org/c/openstack/keystone/+/92813515:12
d34dh0r53tempest tests: https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/92422215:12
cardoeHow can I best provide some logs or some debugging around behavior I'm not expecting with the domain manager? I expected to be able to create projects if I have manager on the domain.15:13
gtemaindeed, you should15:13
gtemain last weeks I am working on porting oslo.policy to the OpenPolicyAgent and found also few suspicious policy rules15:14
gtemathe point is that string interpretation is not always working as a human expects (order of AND, OR and brackets)15:15
gtemacardoe - the best thing is actually to create policy test simulating different payloads15:15
gtemaneutron is using this heavily15:15
cardoeokay I'll try that. thanks good idea.15:16
d34dh0r53thanks!15:18
mhengtema: the "suspicious policy rules" you speak of - are they domain manager related specifically?15:18
d34dh0r53core reviewers, if you can please review these last two remaining patches for domain manager spec.15:18
gtemayeah, but not always. There are few incredibly long rules and I guess they are just missing brakets or so. But afaik there were few non-domain-manager-related things15:19
gtemaI noticed certain strange things once I pulled oslo.policy internals from the string implementation and rules looked like related under the wrong subrule15:20
gtemaI might be wrong though, it was some weeks ago15:21
d34dh0r53next up15:27
d34dh0r53'v15:27
d34dh0r53#topic specification Include bad password details in audit messages (stanislav-z)15:27
d34dh0r53#link https://review.opendev.org/q/topic:%22pci-dss-invalid-password-reporting%2215:27
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/915482 (merged)15:28
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/932423 (to be reviewed)15:28
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/942084 (to be reviewed)15:28
d34dh0r5318-Feb update: the implementation has been updated to reflect the merged spec state15:28
stanislav-zI've updated the implementation, and would appreciate reviews. It includes also tests and a release note :)15:29
d34dh0r53ack, I'll take a look this week15:29
stanislav-zthanks!15:29
d34dh0r53Thank you!15:30
d34dh0r53#topic open discussion15:30
gtemafirst tests of comparing rust reimpl of keystone vs python show 20+ lower response latency and 100 times better throughput from the single process15:31
gtemaI am currently in the forest of parsing the token - it's lot of fun with certain "wow" moments15:32
d34dh0r53that's amazing15:32
gtemai.e. that if deployment changes order of auth plugins in config previous token become partially invalid15:32
d34dh0r53I'll bet there are going to be several more "wow" moments ;)15:32
gtemaindeed15:33
gtemanothing else from me and I need to run in few minutes15:33
d34dh0r53ack, thanks!15:36
d34dh0r53#topic bug review15:36
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:36
d34dh0r53nothing new for keystone15:36
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:37
cardoeso if I can throw something into open discussion15:37
d34dh0r53yes, please go ahead cardoe 15:37
cardoeI brought up vexxhost's keystoneauth-websso upstreaming previously. I still want to work on doing that.15:37
cardoeI've also go a Go developer that's going to be working with me. Just wanted to share that I've asked him to work on gophercloud.15:38
cardoeSince that's used for a number of OpenStack integration points, especially with kubernetes tools.15:38
cardoeI'm asking them to follow how the python keystone implementation does things and respect the auth_type in clouds.yaml15:38
gtemacardoe - I always wanted to plugin somebody with golang to start relying on openapi15:39
cardoeI just was curious if there was a keystone spec around this behavior.15:39
cardoegtema: yeah that'd be the best.15:39
gtemacardoe - this is all so damned unspecified and fragile15:39
gtemadepending on how CSP deploys the stuff it works one way or different and osc is currently also cannot  be used as a reference15:40
cardoeI just want their auth to behave like the python does. Because it behaves differently because they try to "guess" what auth you use based on env vars and clouds.yaml is really secondary and only certain fields are read if other fields are seen.15:40
cardoeokay well I guess no real good answer.15:41
cardoeI know that OSC today treats clouds.yaml as the first party source and internally creates one basically. While the Go side reads stuff from env vars and other places and then plucks stuff from clouds.yaml if it's missing data.15:41
cardoeAnyway, that's the only question I had was if there was some documented or reference I could point gophercloud folks at.15:42
gtemacardoe - maybe we can have a separate meeting where I explain you certain findings. But for now sorry, need to run. cy15:42
d34dh0r53Sound like a possible PTG discussion15:43
cardoegtema: absolutely. have a good day.15:43
d34dh0r53That would be very interesting15:43
cardoed34dh0r53: good idea.15:43
d34dh0r53okay, back to bug triage15:43
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:44
d34dh0r53nothing new in keystoneauth15:44
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:44
d34dh0r53keystonemiddleware is also good15:44
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=015:44
d34dh0r53no new bugs in pycadf15:44
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=015:44
d34dh0r53nor in ldappool15:44
d34dh0r53#topic conclusion15:45
d34dh0r53Like we stated at the beginning, this is my last cycle as PTL :(15:45
d34dh0r53I'll do the formal handoff to the new PTL at the PTG and run things until then15:45
d34dh0r53It's been an absolute pleasure and thank you all for everything!15:46
d34dh0r53#endmeeting15:46
opendevmeetMeeting ended Wed Feb 19 15:46:52 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:46
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-02-19-15.02.html15:46
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-02-19-15.02.txt15:46
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-02-19-15.02.log.html15:46
opendevreviewMerged openstack/keystone master: Document usage of the Domain Manager persona  https://review.opendev.org/c/openstack/keystone/+/92813516:00
opendevreviewGrzegorz Grasza proposed openstack/keystone master: [WiP] Run external_oauth2_token if it's configured  https://review.opendev.org/c/openstack/keystone/+/94222216:46
opendevreviewGrzegorz Grasza proposed openstack/keystone master: [WiP] Run external_oauth2_token if it's configured  https://review.opendev.org/c/openstack/keystone/+/94222216:50

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!