Wednesday, 2025-03-05

*** mhen_ is now known as mhen02:53
*** ykarel_ is now known as ykarel10:44
d34dh0r53#startmeeting keystone15:01
opendevmeetMeeting started Wed Mar  5 15:01:00 2025 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:01
opendevmeetThe meeting name has been set to 'keystone'15:01
d34dh0r53Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct15:01
d34dh0r53#link https://openinfra.dev/legal/code-of-conduct15:02
d34dh0r53#topic roll call15:02
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe, deydra15:02
d34dh0r53dmendiza15:02
gtemao/ but stick in another meeting15:02
dmendiza[m]👋15:03
d34dh0r53#topic review past meeting work items15:06
d34dh0r53#link https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-02-26-15.05.html15:06
d34dh0r53no action items from the last meeting15:06
d34dh0r53#topic liaison updates15:06
d34dh0r53nothing from VMT or Releases15:07
d34dh0r53#topic specification OAuth 2.0 (hiromu)15:08
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:08
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:09
d34dh0r53External OAuth 2.0 Specification15:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged)15:09
d34dh0r53OAuth 2.0 Implementation15:09
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls (merged)15:09
d34dh0r53OAuth 2.0 Documentation15:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/838108 (merged)15:09
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged)15:09
d34dh0r53no updates from me on this one15:09
d34dh0r53next up15:09
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:10
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:10
d34dh0r532024.1 Release Timeline15:10
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:10
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:10
d34dh0r53dmendiza: supplemental ping ;)15:12
dmendiza[m]No updates 😅15:13
d34dh0r53👍15:13
d34dh0r53next up15:13
d34dh0r53#topic specification OpenAPI support (gtema)15:13
d34dh0r53#link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone15:14
gtemasorry, no updates. Due to FF also no hard work done15:14
d34dh0r53ack, no worries15:14
d34dh0r53#topic specification Include bad password details in audit messages (stanislav-z)15:14
d34dh0r53#link https://review.opendev.org/q/topic:%22pci-dss-invalid-password-reporting%2215:15
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/915482 (merged)15:15
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/932423 (to be reviewed)15:15
d34dh0r5318-Feb update: the implementation has been updated to reflect the merged spec state15:15
d34dh0r53I owe you reviews on your patch15:16
stanislav-zperhaps it just needs to wait for someone reviews it15:16
d34dh0r53yeah, cores, if you can review this please15:18
gtema+115:18
d34dh0r53Thank you15:19
d34dh0r53#topic open discussion15:19
d34dh0r53I don't have anything15:20
stanislav-zif I may :) I have use case, for which I need an advice15:20
d34dh0r53Go ahead15:20
stanislav-zIn order to reduce password authentication usage along with its associated peculiarities, there is an idea to switch to application credentials auth as much as possible in cases where technical/service users are utilized (non-humans, applications, systems, etc). Along with that, there is an idea to use short-lived application credentials for these cases all the time to improve security - something like 7d or so. Finally, the15:20
stanislav-zidea is to have the application credentials created upon application start-up - which should generally increase start-up time a bit. Given all that, would you come up with anything that speaks against it? Or something worth keeping in mind? Generally, are application credentials suitable/designed for such use cases? It may result to tens of thousands of app credentials being created/expiring/deleted all the time - do you think15:20
stanislav-zit could impact performance noticeably?15:20
d34dh0r53I think it would impact performance, but I don't know how much15:24
d34dh0r53gtema would know better as he operates clouds at a scale where it would be noticeable15:24
stanislav-zall right. I'm open to comments to it after the call as well :) unless anyone wants to add something now, I suggest we move on. thanks!15:26
d34dh0r53ack, thanks Stanislav Zaprudskiy 15:26
d34dh0r53#topic bug review15:28
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:28
d34dh0r53no new bugs for keystone15:28
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:28
d34dh0r53python-keystoneclient is good15:28
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:29
d34dh0r53no new bugs for keystoneauth15:29
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:29
d34dh0r53keystonemiddleware is good to go15:29
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=015:29
d34dh0r53nothing new in pycadf15:30
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=015:30
d34dh0r53ldappool is good15:30
d34dh0r53#topic conclusion15:30
d34dh0r53nothing else from me, thanks folks!15:30
gtemathks and sorry for mostly only reading15:31
d34dh0r53no problem15:33
d34dh0r53#endmeeting15:33
opendevmeetMeeting ended Wed Mar  5 15:33:24 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:33
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-03-05-15.01.html15:33
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-03-05-15.01.txt15:33
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-03-05-15.01.log.html15:33

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!