20:01:18 #startmeeting barbican 20:01:19 Meeting started Mon Aug 17 20:01:18 2015 UTC and is due to finish in 60 minutes. The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:01:20 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:01:22 The meeting name has been set to 'barbican' 20:01:37 heyo/ 20:01:41 ( ีžเจŠ ีž)โ˜ž 20:01:44 o/ 20:01:47 o/ 20:01:49 o/ 20:01:50 o/ 20:01:57 o/ 20:01:57 o/ 20:02:02 o/ 20:02:08 very nice chellygel 20:02:08 o/ 20:02:13 o/ 20:02:24 \o/ 20:02:29 elmiko, perhaps is hould put that on my resume, no? japanese emoticon usage. 20:02:39 chellygel++ 20:02:53 you have demonstrated a clear proficiency for it ;) 20:03:00 o/ 20:03:21 #topic Action Items from last meeting 20:03:23 o/ 20:03:36 ... and I'm just going to kick the can down the road on these 20:03:43 hehe, fair 20:03:49 I am actively looking at the stable/kilo gate failures though 20:03:58 #action redrobot to finish prioritizing liberty-2 bugs, and also check them for kilo status 20:04:08 #action redrobot to fix the stable/kilo gate failures during mid-cycle (in-progress) 20:04:15 #action redrobot and alee to backport the DogTag gate fixes into stable/kilo after redrobot fixes the gate 20:04:30 also 20:04:37 o/ 20:04:41 #action redrobot to submit a patch for a new python-barbicanclient release 20:04:54 client releases are done via Gerrit now 20:05:07 kfarr I'll add you to the review... I know you're waiting on that release 20:05:26 Thanks redrobot! I'm curious to see what the process is, I couldn't find much online 20:05:50 kfarr there was a message in the dev ML about it... don't have the link handy right now, but I can get it to you after the meeting. 20:06:18 ok, moving on to the agenda for today 20:06:21 which can be found here: 20:06:22 #link redrobot and alee to backport the DogTag gate fixes into stable/kilo after redrobot fixes the gate 20:06:29 derp 20:06:37 #link https://wiki.openstack.org/wiki/Meetings/Barbican 20:06:55 #topic Adding certificate manager namespace to Castellan 20:07:00 abandoned 20:07:04 topic over 20:07:07 thanks for playing :P 20:07:39 (shortest Castellan discussion ever to take place) 20:07:42 rm_work: did this just end up not making sense, or too much resistance, or? 20:07:46 This rivaled content-types for bike shed supremacy! 20:07:50 #link https://review.openstack.org/#/c/156623/ 20:08:03 elmiko: redrobot found the gaping flaw i missed 20:08:24 redrobot, rm_work, ack thanks /me reads 20:08:40 I'll just say I was too distracted by the random invalid arguments everyone was throwing at me :P 20:08:54 haha, nice 20:09:00 but yeah, essentially it's impossible to expose any HSM without ... Barbican or a barbican-clone 20:09:21 because by definition, "a service to expose a HSM" would ... BE a barbican clone 20:09:30 right, makes sense 20:09:30 and if the issue is that people can't use barbican... 20:09:32 we're toast 20:09:44 yep 20:09:56 donezo 20:09:58 finished 20:10:10 thanks for indulging my curiosity =) 20:10:15 heh 20:10:31 #agreed cert manager is out of scope for Castellan 20:10:47 redrobot: you pretty much killed CertManager *everywhere* 20:11:00 I'll probably go rip it out of LBaaS now >_> 20:11:03 yeah... the alternative is to use Barbican directly 20:11:07 yep 20:11:26 or Castellan and take individual refs, like rellerreller was saying 20:11:46 which is shittier from a user perspective but it'd be the only way to be generic enough to support other use-cases 20:12:14 and even then, the same problem exists, which is that a user can't get data into any other service easily 20:12:39 which makes me wonder about Castellan in general -- i guess it's ONLY useful for M2M stuff 20:12:49 m2m? 20:12:53 anything involving an end-user and castellan is sunk 20:13:01 Machine to Machine 20:13:20 ah... yeah... or tiny clouds where users are allowed to use the key manager device 20:13:21 Why can't end user use Castellan? 20:13:40 rellerreller: because no one in their right mind exposes an HSM directly 20:13:45 * peter-hamilton settles in 20:13:51 rellerreller: remember I tend to think in the "public cloud" mindset 20:13:58 What about bring your own key use cases? 20:14:18 rellerreller: how do I store my key using Castellan unless I have credentials for the HSM? 20:14:31 and what cloud provider is going to give users direct credentials for an HSM 20:14:42 that's the point of Barbican <_< 20:14:45 If you own the HSM then you would have credentials for it. 20:15:01 so end-users, in order to use your cloud, would have to own and operate their own HSM 20:15:12 rellerreller yeah.... a small cloud deployment where users have credentials for the HSM would still work. 20:15:13 I can store keys with my credentials and let Neutron or whatever have read access to certain keys. 20:15:15 and they'd have to open up THEIR HSM to your cloud services 20:15:39 yeah that's not a reasonable use-case for public cloud at scale 20:15:43 I don't think 20:15:44 Yes, that is the bring your own key model. 20:16:07 silos or someone else brought this up. 20:16:19 i don't think any major cloud provider would ever do that 20:16:43 could be wrong i guess? but not a use-case we're planning for 20:16:51 yeah... it's interesting that Castellan gives you a non-barbican choice, but there's definitely caveats that come with non-barbican solutions. 20:17:39 and we're way off topic 20:17:53 yup 20:17:55 moving on 20:18:16 thanks for playing rm_work ... your name will always be remembered in Castellan discussions ;) 20:18:32 silos around? 20:18:38 \o/ 20:18:55 #topic Federated Barbican 20:19:00 I created a wiki for fed barbican 20:19:03 https://wiki.openstack.org/wiki/Barbican/Discussion-Federated-Barbican 20:19:13 The picture is so wrong. I need to change it ASAP. 20:19:37 #link https://wiki.openstack.org/wiki/Barbican/Discussion-Federated-Barbican 20:19:39 silos1 nice! 20:19:58 http://googlecloudplatform.blogspot.com/2015/07/Bring-Your-Own-Encryption-Keys-to-Google-Cloud-Platform.html 20:20:02 I'll ping Joe Savak on our end to pitch into that... will definitely come in handy if our federation talk gets picked up. 20:20:16 thanks. 20:20:31 I was hoping we could schedule a meeting sometime to talk and get his help with this. 20:21:25 silos1 I have a meeting with Joe on Sept 2 to talk about Federation. I should have more info after that. 20:21:36 redrobot: awesome! 20:21:42 (Yeah, Joe's on vacay this week) 20:21:46 (slacker) 20:21:51 haha 20:22:03 anyone is free to comment on the wiki. The more the better. 20:23:04 That's pretty much it for me. Just wanted to put the wiki out there. 20:23:13 silos1 ok sounds good 20:23:16 moving on 20:23:37 #topic Defect/issue template 20:23:44 silos1: API call examples would be nice to add to that wiki 20:23:58 hockeynut did you add this topic? 20:24:04 * silos1 writes down to add API calls 20:24:30 redrobot yessir 20:24:39 hockeynut go ahead! 20:25:14 would like to get more detail, and useful info into our launchpad issues. Suggesting this template as a way to get there: https://etherpad.openstack.org/p/barbican-bug-report-template 20:25:28 #link https://etherpad.openstack.org/p/barbican-bug-report-template 20:25:48 if there are other datum that folks would like to see added then certainly lets add it. 20:26:17 +1 looks great 20:26:34 Like how you were clear on priority and severity. 20:26:55 this helps in the immediate time if the fixer <> the reporter and also helps us memorialize information about a bug so it makes sense when "future us" looks at it 20:27:31 pkazmir I unabashadly stole^H^H^H^H^H borrowed it 20:27:34 not sure that we want to track status outside of the launchpad provided ones... 20:27:41 I think reporter is handled by LP automatically. 20:27:46 heh 20:28:09 I do agree we need to get better at triaging bugs 20:28:21 redrobot: +1 So 'Importance' could map to your severity 20:28:31 dont want to duplicate info, so certainly those don't need to be in the defect BODY. But they do need to be considered when writing up a bug. 20:28:35 eg, the OpenStack way is to move bugs from New->Confirmed->Triaged and encouraging people to pick up Triaged bugs. 20:28:57 is triaging a formal activity? 20:29:20 hockeynut it should be... 20:29:29 but historacally we've been really bad at it 20:29:42 is the barbican policy for changing bug state that the PTL does that, any core, or any interested party? 20:29:48 FWIW: https://github.com/cloudkeep/barbican/wiki/Testing-Process 20:30:05 ...see the 'workflow for defects' section 20:30:12 hockeynut: sahara team has been triaging all day, so i'd say yes =) 20:30:19 woodster_, uh oh. not the old wiki 20:30:22 ;) 20:30:26 dave-mccowan permissions are granted in launchpad specific fields... I would say anyone who is not the reporter should be able to move bugs to "Confirmed" 20:30:34 jvrbanac: it's still alive!!!! 20:30:42 launchpad specific groups even... 20:31:01 not sure how the permissions actually break down though... 20:31:03 jvrbanac: Barbican's genesis is that wiki 20:31:11 sounds like we need to add some more rigor beyond just some standardized text in the bug body 20:31:38 * redrobot didn't know we had a cloudkeep page for that 20:31:40 hockeynut: that's for sure. Is there sphinx info on that already? 20:32:30 redrobot I'd be more than happy to take a look at the process, docs, etc and give some recommendations 20:32:39 hockeynut sounds good to me! 20:32:53 #action hockeynut to review bug tracking policies and give feedback 20:33:45 ok, moving on to the next topic 20:33:57 #topic super-user rule in policy.json 20:34:01 dave-mccowan go ahead 20:34:16 working on the quotas blueprint, the need for a new permissions level became apparent. 20:34:22 #link https://review.openstack.org/#/c/213570/ 20:34:36 now we have 3 roles: admin, creator, observer, audit... each role is scope to it's own project 20:35:04 to set a quotas, you really want a cloud-admin (or service-admin, or super-admin) not just a project-admin to change those. 20:35:33 in the review linked above, i proposed one way to do this with the default policy file (no code change to barbican) 20:35:40 That makes sense, I would call it a service-admin. 20:35:53 dave-mccowan yep... I do believe this is the first cloud-admin type of operation 20:35:57 pkazmir +1 service-admin 20:36:09 is there anyone here who is wise in the ways of oslo policy that can point us to the "right" way to do this? 20:36:46 and do other projects have a similiar concept? 20:36:50 dave-mccowan as far as DevStack is concerned... you'll want to add a new user, and then grant the "admin" role on the "service" tenant 20:37:26 the oslo.policy piece would have to check that the admin role is present AND that the tenant the toke is scoped to is the "service" tenant. 20:37:29 dave-mccowan: I think you just need to assign that role to a pre-defined admin 'project' e.g. 'service' project. 20:37:31 i found this in an example keystone V3 policy file: "cloud_admin": "rule:admin_required and domain_id:admin_domain_id", 20:37:55 i don't see a standard (oslo) way to get the service tenant id into barbican 20:37:58 yeah, I noticed that arunkant pointed out that this role should be associated to a special project to quality as a valid cloud admin user 20:38:18 arunkant: yep! 20:39:09 dave-mccowan: And keystone middleware provides header for project name..so it can be checked in policy 20:39:14 dave-mccowan http://git.openstack.org/cgit/openstack/barbican/tree/bin/keystone_data.sh#n64 should do it 20:39:17 a general observation about barbican policy files, we should probably prefix all these policies with "key-management:" 20:39:28 to allow for aggregated policy files 20:39:33 elmiko s/key-management/key-manager/ and I agree 20:39:50 yea, key-manager, whatevet the official service type is 20:39:53 dave-mccowan: so managing domains would be required if using that rule it seems...does keystone v2 support domains though? 20:40:27 dave-mccowan service tenant ID would likely be a config option 20:41:26 woodster_ correct, v2 keystone does not have a concept of domain. All entities created via v2 api belong to the "default" domain in v3. This is how keystone is able to run v2 and v3 in parallel. 20:41:30 woodster_, so far I have seen service policy configuration tend to avoid domain information. Uses project boundary to enforce rules. 20:41:38 dave-mccowan: might be worth pinging ayoung on the keystone team, he had some great suggestions about implementing policy features that can bridge the gap into the policy authorization code. 20:41:55 redrobot... that seems kind of icky. putting the UUID into a config file? tricky to build the gate job to that on the fly too. 20:42:38 dave-mccowan service tenant name in devstack is known to be "service" http://git.openstack.org/cgit/openstack/barbican/tree/bin/keystone_data.sh#n44 20:43:12 redrobot can we key on tenant name only? everything else goes by the tenant id. 20:43:23 i *think* there is a way to specify a function in the policy file that maps to a function in the acl code, that would allow you to control it programatically without the need for embedding special values in the config 20:43:37 dave-mccowan: You can use 'service' project name instead of ID and populate that as service boostrap data 20:44:00 i'm not sure if tenant name is guaranteed to be unique. anyone know? 20:44:20 dave-mccowan it is in v2. only guaranteed unique within a domain in v3 20:45:27 yes, will need both service and domain name in that case. 20:45:36 s/service/project 20:46:01 would be worth pinging the keystone folks about this 20:46:07 +1 20:46:23 also, check out ayoung's talk from vancouver about dynamic policy 20:46:32 elmiko agreed 20:47:02 dynamic policy would include namespaced roles... which I looked into briefly 20:47:03 https://review.openstack.org/#/c/187638/ 20:47:05 redrobot +1 i'd really like to see another project that has done this to follow as an example. no new wheel needed here. 20:47:39 cool, sounds like we can move on to the next topic? 20:47:48 redrobot: i did the namespace conversion to sahara's policy, it went pretty smoothly 20:48:20 elmiko I'll have to look into that and see if I can fix my patch 20:48:29 i'll make a comment too 20:48:53 ok to move on 20:48:59 #topic quotas blueprint update 20:49:03 another one for dave-mccowan 20:49:07 hehe 20:49:38 i wanted to point out 3 deviations from the current spec as approved. 20:50:13 1) the super-admin role, we just discussed. 2) the spec calls for transport-keys to be managed under a quota, but it turns out the are not project resources. 20:50:34 the are per plugin, not per project. so i will delete them from the spec/code/doc etc. 20:50:59 (btw... maybe their API should also be controlled by rule:service-admin) 20:51:31 and 3) a nit: the details of the paging for list of project-quotas was missing from the spec. 20:51:41 Anyone is allowed to ask for the Transport Key 20:51:49 haven't looked into the api recently 20:51:56 i'll update the spec with these 3 points. i assume all of these are ok? 20:51:57 but any add/edit actions need to be service-admin calls 20:52:26 all 3 seem reasonable to me 20:53:03 agreed 20:53:33 and finally, i'd like to ask for reviews on the CRs I have out on the blueprint. pretty please. :-) 20:53:33 awesome... sounds like we're done for today 20:53:47 with a couple of minutes to spare 20:54:07 i'll be stuck soon, if these don't start landing. there are four out there. we can split them up if we need to. 20:54:23 dave-mccowan I'll look at them ... soon ... :) 20:55:03 will appreciate if people can comment on barbican client ACL changes as well. 20:55:16 #topic Review Requests 20:55:30 ok, y'all got 5 minutes to spam the channel with CR links :) 20:56:02 #link https://review.openstack.org/205894 20:56:24 #link https://review.openstack.org/212876 20:56:38 #link https://review.openstack.org/212967 20:56:46 As i said above, 3 linked changes for ACL on barbican client side. (1 # link https://review.openstack.org/#/c/206699/ ) 20:56:56 * hockeynut is hoping that trojan to disable CTRL-V is working 20:57:01 the first one is first priority, but is larger. the second two are more bite-sized. 20:59:24 alrighty y'all, thanks for coming! 20:59:26 #endmeeting