20:02:48 #startmeeting barbican 20:02:50 Meeting started Mon Mar 31 20:02:48 2014 UTC and is due to finish in 60 minutes. The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:02:51 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:02:53 The meeting name has been set to 'barbican' 20:03:18 as usual our agenda is here 20:03:22 #link https://wiki.openstack.org/wiki/Meetings/Barbican 20:03:57 first, let's follow up on some action items 20:04:09 hi malini 20:04:34 hello~ 20:05:06 malini would you like to update us on adding Barbican to the OpenStack security guide? 20:05:34 I created a bleprint, but last weeks OSSG meeting did not happen 20:05:42 So no "approved" yet 20:06:05 cool, do you have a link to the blueprint handy? 20:06:20 in a few minues 20:06:30 malini thanks 20:07:03 #info malini is making progress on adding Barbican to OpenStack security guide. 20:07:55 https://blueprints.launchpad.net/openstack-manuals/+spec/security-guide-key-management 20:08:06 #link https://blueprints.launchpad.net/openstack-manuals/+spec/security-guide-key-management 20:08:45 ok, let's move on to the only item on the agenda today 20:08:54 o/ 20:09:10 #topic Crypto plugin contract changes 20:10:21 #link https://blueprints.launchpad.net/barbican/+spec/update-crypto-plugin-interface 20:12:03 redrobot, so - yeah -- as I mentioned on irc,, I have a patch that implements these changes 20:12:04 I think we've agreed that we want to keep Secret out of the plugin contract 20:12:19 and was about to submit it for review .. 20:12:32 till i just spoke with you and reaperhulk :) 20:12:40 a few minutes ago. 20:12:59 I agree to creating a dto to pass the data over 20:13:07 and will make that change 20:13:19 #agreed DTO should be used to pass data to plugin 20:13:20 awesome 20:13:28 thanks alee_ 20:13:41 reaperhulk do you want to add anything? 20:14:05 no worries .. I'll submit as soon as I set up cloudcafe to do some basic testing 20:14:08 DTO ? 20:14:20 Once we have an actual PR to look at I might have a bit more to say but I think we're all on the same page right now 20:14:22 #info DTO = data transfer object 20:14:33 :-) thank you 20:14:51 malini there's a dto parameter that is currently passed to the crypto plugin 20:15:16 looks like atiwari isn't here today 20:15:42 redrobot:atiwari had mentioned he would be out this week 20:15:43 he was also thinking about some changes that may be needed 20:15:59 malini that's right, thanks. 20:16:28 So there will just be an ecnrypt and decrypt method? 20:16:45 And the repo will just store the result returned from encrypt? 20:17:37 as I understand it, there will still be an encrypt(), decrypt() and generate() method 20:17:38 rellerreller there's a couple more 20:17:50 also a supports method 20:17:53 #link rellerreller https://github.com/stackforge/barbican/blob/master/barbican/crypto/plugin.py#L85 20:18:08 #link https://github.com/stackforge/barbican/blob/master/barbican/crypto/plugin.py#L85 20:18:32 generate would return the same thing that encrypt does 20:18:36 Thanks! 20:18:40 but the generate() method will actually do what the old create() and encrypt() methods used to do. 20:19:11 ^^ yep. this way the plugin manager doesn't need to see the secret data before encrypting it 20:19:33 alee: won't we have to keep the "creat" method for backwards compatibility 20:19:34 or before it is encrypted by the plugin, I should say 20:20:08 malini there's only two implementations of a plugin now that we're aware of 20:20:11 reaperhulk, redrobot ^^ do I need to worry about backwards compatibility? 20:20:39 the plan is to fix the existing implementations, unless we know of a current implementation that needs the backwards compatibility 20:21:10 :-) there are some advantages for a fresh new project 20:21:21 yep 20:21:24 malini: what's the blueprint link? Can I approve? :) 20:21:53 malini: ah you have Bryan as approver 20:22:00 annegentle https://blueprints.launchpad.net/barbican/+spec/update-crypto-plugin-interface 20:22:01 malini: no biggie 20:22:14 annegentle: would you approve, that works too 20:22:30 malini: not sure if it's in the scope right now, considering it's just incubating, not integrated 20:22:37 malini: so have to think about that. 20:22:59 malini: can you write the chapter in the barbican doc set in such a way that it's easily placed later? 20:23:08 we had a page plus last summer as "coming soon to a theatre near you" 20:23:32 on the same topic, then - I have a patch that will do basic integration with the dogtag drm for key generation and retrieval. I'll be submitting that soon as wip so folks can start poking at it. 20:23:34 malini: sure but it's not in an integrated release, so install isn't yet guaranteed 20:23:41 sure, that makes sense 20:23:47 malini: so it'd be great to get a chapter that can be later integrated 20:24:23 annegentle oh sorry, you probably wanted this https://blueprints.launchpad.net/openstack-manuals/+spec/security-guide-key-management 20:24:32 absolutely, redrobot and self shall work on it 20:25:09 malini: redrobot: yeah thanks, sorry I was a bit behind your agenda! 20:25:13 Carry on please :) 20:25:40 #action alee_ will upload WIP change to plugin 20:25:52 but we should start thinking about other tasks -- like a rceipe to get a drm installed, and changes in the barbican client. 20:26:11 any idea when folks will be able to start working on those tasks? 20:27:02 alee_ not entirely sure. jraim would be able to speak on that 20:27:08 In 4 weeks we should get another Intel person on board to work on Barbican, our team is growing 20:27:27 we do have a repo for a drm cookbook, but it's just a skeleton right now 20:27:39 #link https://github.com/cloudkeep-ops/chef-dogtag 20:28:27 #help we need someone to cook up a dogtag drm recipe 20:28:56 any other thoughts on this before we move on? 20:29:16 malini that's great news :) 20:29:36 I can ping jraim later in the week when he's not on a flight .. 20:30:17 yep, that'll work. i'm sure he'll be checking the meeting logs later 20:30:29 Bryan Payne approved our key manager chapter blueprint :-) 20:31:20 :-) 20:31:33 woot! 20:32:15 I'd like to work with you guys to flush out some good content, but I really like the idea of adding more on Barbican to the book 20:32:25 feel free to loop me into the writing process 20:33:12 Sounds good~ 20:34:13 ok, moving on guys. does anyone have any other topics they'd like to discuss? 20:35:56 Is it okay to discuss other blueprints or that handled outside of this meeting ? 20:36:36 arunkant I think this is a good venue for talking about blueprints 20:36:41 #topic Blueprints 20:36:53 arunkant what's up? 20:37:12 I have added this bp. #link https://blueprints.launchpad.net/barbican/+spec/policy-target-support 20:37:43 This is added as part of addressing https://bugs.launchpad.net/barbican/+bug/1291073 20:38:58 #link https://review.openstack.org/#/c/81310/ 20:39:56 yes, I've started looking into the CR, although I must confess I'm not as familiar with oslo policy as you are, so it's taken me a while to spin up on it 20:40:23 i think woodster and reaperhulk had some concerns about the change 20:41:15 Yes..I have tried to answer woodster concern. ..let me check other concern as I have not seen it earlier in the morning.. 20:41:40 I didn't post anything against the CR arunkant. I believe woodster probably captured my concerns since we talked a bit about it a few days ago 20:43:10 okay. I have tried to explain the intent in blueprint by providing cases where ability to validate and use target data in policy rule is useful 20:43:15 will we need to preserve as meta data with our keys access credentials type stuff 20:43:24 unfortunately woodster couldn't make it to the meeting this week. He should be on the barbican IRC channel later though. I'll try to ping him if I see him. 20:43:42 and then compare against the token's particulars 20:44:18 i think atiwari had a design summit session, we need to design this well, then the policy from Oslo could be applied 20:45:29 Are there any blueprints that allow secrets to store arbitrary metadata? 20:45:41 and handle token delegation -- confess I do not know much about delegation 20:46:31 Swift objects, volumes, images all allow storing meta data .. may need to take that path 20:46:51 We are going to propose a blueprint and that is the first step 20:47:02 This way of target support is used in other openstack modules e.g. keystone, horizon, glance etc.. 20:47:02 will check as pertains to access 20:49:10 rellerreller Yeah, blueprint would be the first step 20:49:34 Cool, hopefully we can get that out soon 20:52:13 arunkant we'll have to follow up on the CR after the meeting. 20:52:29 whew, look at the time 20:53:04 okay. 20:54:06 ok guys, we're running out of time for the meeting this week. 20:54:37 #action rellerreller to add blueprint for adding arbitrary metadata 20:54:52 we'll follow up on blueprints again next meeting 20:55:02 any last comments before we sign off? 20:55:03 I'm on it 20:56:29 Alrighty guys, see y'all back here next week. ^_^ 20:56:30 #endmeeting