*** timburke_ is now known as timburke | 06:46 | |
opendevreview | Mridula Joshi proposed openstack/openstacksdk master: Adding support for image upload https://review.opendev.org/c/openstack/openstacksdk/+/881939 | 06:52 |
---|---|---|
opendevreview | Mridula Joshi proposed openstack/openstacksdk master: image: Support for stores_info https://review.opendev.org/c/openstack/openstacksdk/+/883493 | 07:08 |
opendevreview | Polina Gubina proposed openstack/ansible-collections-openstack master: Shared file system module https://review.opendev.org/c/openstack/ansible-collections-openstack/+/883201 | 08:57 |
opendevreview | Merged openstack/openstacksdk master: Add find_share() for shared file system share resource https://review.opendev.org/c/openstack/openstacksdk/+/882979 | 10:06 |
opendevreview | Merged openstack/openstacksdk master: ironic: Add support for Introspection Rules https://review.opendev.org/c/openstack/openstacksdk/+/775878 | 10:13 |
opendevreview | Polina Gubina proposed openstack/ansible-collections-openstack master: Shared file system module https://review.opendev.org/c/openstack/ansible-collections-openstack/+/883201 | 10:37 |
thomasb06 | gtema: hey | 12:59 |
thomasb06 | gtema: eventually setting up an OpenStack prototype... | 12:59 |
thomasb06 | What's up here since last year? | 12:59 |
noonedeadpunk | hey there! I was trying to re-use issued tokens in openstackclient in client 6.2.0 using https://docs.openstack.org/python-openstackclient/latest/cli/authentication.html#authentication-plugins and smth feels quite off | 16:20 |
noonedeadpunk | So, assuming I issue token like that: token=$(openstack token issue -c id -f value --os-cloud default) | 16:22 |
noonedeadpunk | openstack --os-auth-url http://172.29.236.101:5000/v3 --os-token $token image list does ask for password | 16:23 |
noonedeadpunk | ok, adding `--os-auth-type token`, but that results in `The service catalog is empty.` | 16:24 |
gtema | Hmm, i never tried it this way. Will try in next days. Can you maybe try also setting --os-auth-type token (or smth like that) | 16:24 |
noonedeadpunk | `openstack catalog list --os-cloud default` ofc prints out catalog including image | 16:24 |
gtema | Aaah, that would be a really interesting case. Catalog is being received with auth response, which you in this case don't issue | 16:25 |
noonedeadpunk | then I've tried to add more scope, like --os-project-name and --os-domain-name, but that get even weirder | 16:25 |
gtema | No, scopes are only going into the auth | 16:26 |
noonedeadpunk | As eventually issuing tokens takes quite some time, and when couple of actions need to be done in a row, it makes sense to re-use tokens... | 16:26 |
gtema | For that you can use auth caching | 16:27 |
noonedeadpunk | Ofc I tried that with openstack.cloud.auth module and feed token to other modules, which didn't work as well | 16:27 |
noonedeadpunk | but auth caching happens on keystone side? | 16:27 |
noonedeadpunk | so you still need to issue that API request | 16:28 |
gtema | https://docs.openstack.org/openstacksdk/latest/user/config/configuration.html#cache-settings | 16:28 |
gtema | But it requires you have keering lib installed | 16:29 |
gtema | It is not described precisely sadly | 16:29 |
noonedeadpunk | I'm not sure that will help with my ansible usecase | 16:29 |
noonedeadpunk | well, it uses clouds.yaml though... | 16:29 |
gtema | Right, in pure server usage will not that much | 16:29 |
noonedeadpunk | can oslo.cache drivers be used there? | 16:30 |
gtema | Keering requires some backend, which on server side is itself eventually require "unsealing" | 16:30 |
gtema | No, oslo.cache is not used | 16:30 |
gtema | You can build such backend plugin though | 16:31 |
noonedeadpunk | As I was thinking to use memcahced with encryption like keystone does | 16:33 |
gtema | I am sure you can build such plugin for keering | 16:34 |
noonedeadpunk | But yeah, I guess my main thing was that this module seems pretty much useless now https://opendev.org/openstack/ansible-collections-openstack/src/branch/master/plugins/modules/auth.py | 16:34 |
noonedeadpunk | as re-using token you get like this is not trivial at all | 16:35 |
gtema | Well, for that case we could improve SDK to try to fetch catalog when it is not present yet | 16:35 |
gtema | There is sadly no guarantee this can be received, since not every cloud may allow this call | 16:35 |
noonedeadpunk | you mean some super old crappy clouds?:) | 16:37 |
gtema | Yes, or ones with not proper identify policies | 16:38 |
noonedeadpunk | um, but if it's policy - then you won't be able to get catalog at all? | 16:39 |
gtema | Not definitely, catalog in the auth response it is not managed by policies afaik | 16:42 |
gtema | And anyway - if no catalog => try fetch. If not available=> fail | 16:43 |
gtema | It is anyway already some exception handling case | 16:43 |
noonedeadpunk | Well, responding with catalog when policy disallows that is kinda weird from keystone side then.... | 16:45 |
noonedeadpunk | but yeah, I never tried that | 16:45 |
noonedeadpunk | but catalog is weird overall I'd say.... | 16:46 |
*** timburke_ is now known as timburke | 16:48 | |
gtema | Catalog is one of the best things of Openstack in my eyes. It is not without issues, but still is a very good thing | 17:06 |
noonedeadpunk | The problem I have with it, is that it exposes internal/admin endpoints | 17:08 |
noonedeadpunk | Which is weird, as I'd say it should return only endpoint that was in request (or was accessed through) | 17:09 |
noonedeadpunk | like if you pass interface: public, in return you get internal&admin as well | 17:09 |
*** melwitt_ is now known as melwitt | 17:11 | |
noonedeadpunk | and that disables ability to do some kind of reselling, ie create random interfaces and URI's for it (with different FQDNs). But then you ask for catalog and in return you have like everything... | 17:11 |
gtema | I guess this will not be a hard stuff to fix, and I agree, this is one of the issues | 17:11 |
gtema | At a very least it is very easy to build a filtering proxy to be deployed for public | 17:12 |
noonedeadpunk | ugh, wrappers | 17:18 |
noonedeadpunk | very-very slippery path | 17:19 |
noonedeadpunk | anyway :) | 17:19 |
noonedeadpunk | have a good weekend! | 17:20 |
gtema | thks, you too | 17:22 |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!