Wednesday, 2025-04-16

*** mhen_ is now known as mhen01:26
opendevreviewTakashi Kajinami proposed openstack/python-keystoneclient master: Apply upper constraints to build documentation  https://review.opendev.org/c/openstack/python-keystoneclient/+/94742409:41
opendevreviewTakashi Kajinami proposed openstack/keystonemiddleware master: Apply upper constraints to build documentation  https://review.opendev.org/c/openstack/keystonemiddleware/+/94742609:42
tkajinamIt seems doc build job is broken due to incompatibility with latest sphinx and sphix-api-doc (which can be found in https://github.com/sphinx-contrib/apidoc/issues/21 ) and adding u-c to use older version works as a workaround.09:43
tkajinam^^^ gtema fyi09:43
gtemaack, watching09:43
gtemathanks09:43
tkajinamonce that is merged I'll propose backport to 2025.1 (with constraint file url adjusted to 2025.1 )09:43
tkajinamso that we can merge https://review.opendev.org/c/openstack/keystonemiddleware/+/943709 and https://review.opendev.org/c/openstack/python-keystoneclient/+/94371209:44
gtemathanks tkajinam09:44
tkajinam:-)09:44
tkajinamI wonder if it's intentional that notification about stable branches are not sent to this channel ?12:10
tkajinamIf not then we may need https://review.opendev.org/c/openstack/project-config/+/94746812:10
tkajinamugh. ignore it. the change was already made earlier12:11
tkajinamI was looking at an old version in my local...12:12
opendevreviewTakashi Kajinami proposed openstack/pycadf master: Replace UPPER_CONSTRAINTS_FILE  https://review.opendev.org/c/openstack/pycadf/+/94748213:31
d34dh0r53#startmeeting keystone15:02
opendevmeetMeeting started Wed Apr 16 15:02:36 2025 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:02
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:02
opendevmeetThe meeting name has been set to 'keystone'15:02
d34dh0r53Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct15:03
gtemathanks Dave, I was stuck in the limbo of compilation15:03
xeko/15:04
d34dh0r53#link https://openinfra.dev/legal/code-of-conduct15:04
gtemao/15:04
d34dh0r53#topic roll call15:04
d34dh0r53#topic review past meeting work items15:04
d34dh0r53#undo15:05
opendevmeetRemoving item from minutes: #topic review past meeting work items15:05
d34dh0r53sorry15:05
d34dh0r53got ahead of myself15:05
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe, deydra15:05
d34dh0r53and a shoutout to dmendiza 15:05
d34dh0r53#topic review past meeting work items15:07
d34dh0r53there wasn't a meeting last week (PTG) and we didn't have any from the previous week15:07
gtemai feel irc bridge has a lag now. Do you guys want me to send out a summary of PTG discussions through the mailing list?15:07
d34dh0r53#link https://meetings.opendev.org/meetings/keystone/202515:07
d34dh0r53gtema: Yeah, that would be good15:08
mharley[m]o/15:08
dmendiza[m]🙋‍♂️15:08
gtemaok, will do that tomorrow15:08
d34dh0r53Thank you!15:08
dmendiza[m]+1 to PTG summary15:08
mharley[m]+215:09
d34dh0r53#topic liaison updates15:11
d34dh0r53nothing from me, but there are VMT changes afoot that shouldn't affect us too much since we have VMT members already15:12
xekI'd like to volunteer to be the Security liaison for keystone15:12
xekI see right now dmendiza is listed in https://wiki.openstack.org/wiki/CrossProjectLiaisons#Vulnerability_management15:13
gtemasure, why not15:13
d34dh0r53That's awesome, thanks Grzegorz Grasza 15:13
xekI'll also volunteer for Barbican15:14
d34dh0r53I'll figure out how to change that for keystone (unless someone already knows what repo that's in) and add your name15:15
d34dh0r53#topic specification OAuth 2.0 (hiromu)15:15
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:16
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:16
d34dh0r53External OAuth 2.0 Specification15:16
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged)15:16
d34dh0r53OAuth 2.0 Implementation15:16
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls (merged)15:16
d34dh0r53OAuth 2.0 Documentation15:16
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/838108 (merged)15:16
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged)15:17
d34dh0r53no updates from me15:17
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:17
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:17
d34dh0r532024.1 Release Timeline15:17
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:17
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:17
dmendiza[m]I need to review current status...15:18
dmendiza[m]... but I think we're already defaulting to True in both?15:19
d34dh0r53I think so15:19
dmendiza[m]I think there's some pending domain-level tempest tests too15:19
gtemawrt VMT Liasons: apparently all it takes is just an edit of the https://wiki.openstack.org/wiki/CrossProjectLiaisons. I have however weird feeling about who is allowed to make updates to it15:23
d34dh0r53Ok cool15:24
d34dh0r53I'll suggest an edit and see how it goes :)15:24
d34dh0r53anything else on srbac dmendiza ?15:24
dmendiza[m]Not right now...15:24
d34dh0r53Cool, thanks15:25
d34dh0r53#topic specification OpenAPI support (gtema)15:25
d34dh0r53#link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone15:25
gtemaunfortunately I was (and still am) caught in other limbo of openapi related work on the codegenerator side, so no progress explicitly on the keystone side15:26
gtemain the meanwhile I have seen that the new openstackdocstheme is slowly rolling out new api ref docs15:26
gtemaI also fixed few things in the codegenerator that parses this new output15:27
gtemawe have noticed one interesting (not really openapi related) stuff for domain group users15:27
gtemacurrent python-keystoneclient takes domain_id as a param which is respected in the user groups case, but not in the group users (or vie versa)15:28
gtemaanyway - the api-ref does not state anything about filtering the results, but the code does filter explciitly by the scope15:28
gtemabut much worse issue is with glance api design - CSP is able to modify supported enum values. Luckily this is not what we have in Keystone15:29
gtemajust that we need to ensure we are not introducing any APIs where property is enum which can be altered by the deployment15:30
gtemaall sort of CLI/TUI/UI is literally broken in such case15:30
gtemathat's it on the topic for this week15:31
d34dh0r53ack, thanks gtema 15:31
d34dh0r53#topic open discussion15:31
gtemanothing from me this time15:32
d34dh0r53I don't have anything other than to say it was a good PTG, thanks for the participation and ideas.  Interesting days ahead for keystone :)15:32
gtema:)15:33
mharley[m]Guys, I was checking the Keystone's specs.15:33
mharley[m]It seems the only proposal for the 2025.1 cycle was this one:  https://github.com/openstack/keystone-specs/blob/master/specs/keystone/2025.1/pci-dss-invalid-password-reporting.rst.15:33
mharley[m]Does anyone know if it has been implemented?15:33
gtemait was not merged in time15:34
gtemabut it is in master now15:34
mharley[m]Understood.  So, no further specs are open to be implemented?  I see the backlog directory is around six or seven years old...15:35
gtemathe federation improvements are like experiment without a spec15:36
gtemasince this is not landing in the Keystone in the current form15:36
gtemaother than that there are no specs and things we want to introduce15:37
mharley[m]You mean, the federation feature was implemented but it doesn't have a corresponding specification?15:38
xekI'll work on the OAuth2.0, but it's just implementing the missing peaces, so no new specs needed for that15:39
gtemano, I am working on redoing federation from scratch in Rust cli without spec, because atm final design is not fixed15:39
xek(I meant specifically External OAuth2.0, which is not really federation)15:41
dmendiza[m]Somewhat related to Blueprints ... the Launchpad project probably needs some TLC.  15:41
gtemaoh right15:43
dmendiza[m]I can help clean up branches and such15:44
gtemathanks a lot dmendiza15:44
d34dh0r53Yeah, I've been negligent in that regard :/15:45
mharley[m]dmendiza:, are you referring this?15:45
mharley[m]https://blueprints.launchpad.net/keystone/15:45
dmendiza[m]mharley: yeah, that one.  Well, not just the blueprints, but the series and milestones15:46
mharley[m]It seems there is a couple of issues with no assignees. :-)15:47
dmendiza[m]Oh yeah, we've got an endless backlog of bugs 😅15:49
gtemajust 254, not that bad15:50
dmendiza[m]If we fix one a day we might be done by the end of the year 😛15:50
d34dh0r53lol15:51
gtemawe may propose a fix, but surely not land one change a day (not on weekends)15:51
d34dh0r53OBAD (One Bug A Day)15:51
mharley[m]hahaha15:51
mharley[m]Start the campaign:  adopt a bug.  And do that every single day. :-( 15:52
gtemaouch, that's gonna hurt15:52
d34dh0r53Indeed, speaking of bugs we should move on for the sake of time15:53
d34dh0r53#topic bug review15:53
gtemaindeed15:53
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:54
d34dh0r53one new bug in keystone15:54
d34dh0r53#link https://bugs.launchpad.net/keystone/+bug/210742315:54
gtemaI'll have a look15:55
d34dh0r53thanks15:55
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:55
d34dh0r53nothing new here15:55
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:55
d34dh0r53we have a new one in keystoneauth15:56
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:56
d34dh0r53#undo15:56
opendevmeetRemoving item from minutes: #link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:56
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bug/210737315:56
d34dh0r53Looks like a fix has been proposed15:56
d34dh0r53so we should review15:57
d34dh0r53There are several related bugs from the last few weeks in keystoneauth, all seem to be somewhat related to OIDC or Device Authorization15:58
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:59
d34dh0r53we have a new one in keystonemiddleware as well15:59
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:59
d34dh0r53#undo15:59
opendevmeetRemoving item from minutes: #link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:59
d34dh0r53https://bugs.launchpad.net/keystonemiddleware/+bug/210659716:00
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bug/210659716:00
gtemahmm, weird one16:03
d34dh0r53yeah16:04
dmendiza[m]I wonder if it can't tell the difference between a 403 because the subject token is not good or a 403 because the service credentials are no good16:04
d34dh0r53yeah, let's try to investigate this one16:07
d34dh0r53next up16:07
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=016:07
d34dh0r53no new bugs in pycadf16:07
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=016:07
d34dh0r53ldappool is good as well16:07
d34dh0r53#topic conclusion16:07
gtemathanks Dave16:08
d34dh0r53nothing more from me16:08
d34dh0r53thank you all16:08
d34dh0r53#endmeeting16:08
opendevmeetMeeting ended Wed Apr 16 16:08:38 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:08
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-04-16-15.02.html16:08
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-04-16-15.02.txt16:08
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-04-16-15.02.log.html16:08
gtemasee you guys16:09

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!