18:02:53 #startmeeting keystone 18:02:53 Meeting started Tue Aug 18 18:02:53 2015 UTC and is due to finish in 60 minutes. The chair is dstanek. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:02:55 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:02:55 henrynash, tr�s bien :) 18:02:58 The meeting name has been set to 'keystone' 18:03:00 not a ton today! 18:03:06 #topic Agenda 18:03:13 #link https://wiki.openstack.org/wiki/Meetings/KeystoneMeeting 18:03:21 lbragstad: you in here? 18:03:23 * stevemar will probably be a bit quiet while he finishes up lunch 18:03:28 dstanek: yep 18:03:35 oyez 18:03:38 #topic Voting on SPFE for IdP Specific WebSSO 18:03:38 #link https://review.openstack.org/#/c/199339/2 is the spec 18:03:40 type and chew, type and chew 18:03:45 #link http://lists.openstack.org/pipermail/openstack-dev/2015-August/071131.html is the mailing list discussion 18:03:52 lbragstad: go fer it 18:03:57 is jamielennox here? 18:04:01 ya 18:04:16 cool, just wanted to get an idea for how people felt about this as an SPFE? 18:04:32 I think what jamielennox has is a good solution for the public cloud cases 18:04:35 +1 on it being a spfe 18:04:47 (which have been brought up and highlighted on the mailing list) 18:04:52 the current is too limiting...need what jamielennox is proposing for any sane deployment 18:05:05 lbragstad: want to give the 10 second overview? 18:05:15 basically, 18:05:17 (and how much code are we talkin’ here) 18:05:38 we would be adding a call to keystone federation that would allow us to get federated authentication based on the IdP id 18:05:44 and the protocol 18:06:04 like this call; https://github.com/openstack/keystone/blob/master/keystone/contrib/federation/routers.py#L80-L81 18:06:08 but specific for an IdP 18:06:45 henrynash: when we were talking about it last week it didn't seem like a lot 18:07:05 dstanek: that would be my guess 18:07:05 henrynash: very little new code 18:07:17 so, it would kinda look like http://goo.gl/80yyjF 18:07:21 it should just be the new route, thats about it 18:07:33 questions, comments or concerns? or just vote? 18:07:42 where step 3 would be the new stuff being added in the SPFE 18:08:24 so, this part - /v3/OS-FEDERATION/identity_providers/{idp_id}/protocol/{protocol_id}/websso/ 18:08:26 o/ 18:09:20 so i consider this a blocker for doing some of chadwick's horizon based discovery, or properly running a lot of different protocols on the same websso page, the concern is obviously how close we are to feature freeze 18:09:48 I think it is fine...won't break anyone 18:09:52 but i expect if we get the go ahead there can be code up in the next day or two and it should be a relatively easy revie 18:09:54 w 18:09:55 existing code will run fine 18:10:07 if we are really talking about a route and a few controller lines is there much risk or regressions elsewhere? 18:10:18 I'm stepping up to sponsor this, so i'll have eyes on reviews as soon as they are posted 18:10:19 it's more of a refactoring of existing code than anything new 18:10:30 who will be coding it? 18:11:01 I can help out with the coding, but I'd feel comfortable if jamielennox reviewed it 18:11:02 spec says jamie or lance :) 18:11:11 lbragstad and I will manage between us 18:11:16 jamielennox: ++ 18:11:36 ok, then we can hold both of your feet to the fire 18:11:55 #startvote Approve SPFE for IdP Specific WebSSO? yes,no,dont_care 18:11:56 Begin voting on: Approve SPFE for IdP Specific WebSSO? Valid vote options are yes, no, dont_care. 18:11:57 Vote using '#vote OPTION'. Only your last vote counts. 18:12:02 so I minded to support this….my concren is whether manyof our cores are off coding real late in the cycle and not available for reviews…and we have some big stuff yet to get in (e.g. reseller) 18:12:04 #vote yes 18:12:07 #vote yes 18:12:22 #vote yes 18:12:27 #vote yes 18:12:35 henrynash: reasonable thing to be worried about 18:12:37 #vote yes 18:12:48 #vote yes 18:13:00 why do we even have a spec freeze? 18:13:15 bknudson: process for the sake of proces 18:13:15 #vote dont_care 18:13:17 bknudson: at least it makes things difficult at this point 18:13:29 #vote no (even though I love the feature…we need cores doing reviews) 18:13:30 henrynash: no (even though I love the feature…we need cores doing reviews) is not a valid option. Valid options are yes, no, dont_care. 18:13:40 #vote no 18:13:59 #vote i'll let the cards fall where they fall 18:14:00 dstanek: i'll let the cards fall where they fall is not a valid option. Valid options are yes, no, dont_care. 18:14:03 I agree with henrynash but if cores don't want to do reviews they're not going to do them. 18:14:13 henrynash, this is a small one code wise, but big feature for end users 18:14:26 bknudson, henrynash: yeah, we definitely need more reviews 18:14:29 #vote yes 18:14:36 vote closing in 5.. 18:14:40 #vote yes 18:14:41 ayoung: I’m sure that’s true….but.... 18:14:43 5 hours? 18:14:45 and i was thinking about it.. 18:14:47 it allows a singe IdP to support multipe protocols for Federation 18:14:51 bknudson: long running votes 18:14:56 #endvote 18:14:56 Voted on "Approve SPFE for IdP Specific WebSSO?" Results are 18:14:57 yes (8): rodrigods, lbragstad, ayoung, bknudson, jamielennox, raildo, breton, stevemar 18:14:58 dont_care (1): morgan_2549 18:14:59 ayoung: I love the fetaure, don’t get me wrounf 18:14:59 no (1): henrynash 18:15:07 bknudson: nope, done ... need to move on! 18:15:19 thanks all 18:15:20 roxanaghe_: you here? 18:15:28 dstanek, yes 18:15:31 henrynash, we need to push right up until Milestone 3. There is not enough time to get work done in the release the way we have things tstrucutured nw 18:15:45 #action lbragstad and/or jamielennox to code up the IdP specific WebSSO flow 18:15:54 #topic Change default endpoint type for Keystone v3 to 'public' 18:16:06 #link https://review.openstack.org/#/c/185200/ is the review 18:16:12 roxanaghe_: you're up 18:16:14 i would suggest we revist next week where we want to have things more or less merged 18:16:24 ok, so this review has been sitting there for a while 18:16:27 we need a decision 18:16:29 jamielennox: ++ 18:16:45 it's about changing default endpoint type for v3 keystone to public 18:16:48 jamielennox, ++ for all the big subjects we are planning to get this cycle 18:17:06 all other services have public by default 18:17:31 but there are concerns about breaking stuff if we just change it like that 18:17:42 ++ for that 18:17:48 *for the switch 18:17:57 i'm pretty sure this is changed using sessions 18:18:12 looking for the code to back me up there 18:19:01 what does that mean "default" anyway? 18:19:06 All the services use public_endpoint from catalog except keystone. 18:19:12 https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/auth/identity/base.py#L313 18:20:03 so to my understanding this was the compromise to having fixed this in the past 18:20:21 that if you use the Client(session) format without specifying an interface you would get public 18:20:32 asselin? 18:20:47 (because i completely agree the admin default is wrong) 18:21:08 jamielennox: does that mean we don't need the proposed change or that it's likely to break less than we think? 18:21:19 jamielennox, from what I saw the default is in httpclient and is the same for v2 and v3: admin 18:21:20 for v2 if you use the public interface then a lot of calls aren't going to work. 18:22:00 dstanek: given that the admin and public interface for v3 is the same it's probably not going to break as much as i would think 18:22:17 roxanaghe_: if you use session then it should do it's best to skip httpclient 18:22:20 We want to make this change only for keystone v3, as v2 is bit differnet. In v2 only subset of apis are exposed at public endpoint. That is the reason why defaulted to admin 18:23:00 so maybe applications can already opt-in to the behavior by using sessions. 18:23:31 and it's deprecated to not use a session 18:23:33 oh, blah https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/httpclient.py#L237 18:23:47 jamielennox, ok, I'm not sure if the current code goes that code flow 18:24:22 jamielennox - yes, that's the line 18:24:54 ok, so v3 default is going to end up as admin 18:24:59 umm 18:25:16 so since no value is passed at that point it will get the default admin 18:25:59 so are there any concerns if we switch? 18:26:05 lets just drop v2, and then admin,public is ireelevant 18:26:10 ok, i think we can change that 18:26:24 it's a behaviour change but i would be very surprised if anyone is relying upon it 18:26:28 I'm concerned that it will break somebody. 18:26:34 what about bknudson's worry about breaking existing applications? 18:26:35 given admin/public is the same thing 18:26:59 the other option is we are planning a client v2 start of next cycle 18:28:10 sinve admin and public go through the same endpoint is it possible to break anyone? 18:28:16 *since 18:28:50 roxanaghe_: it goes through the same code but most people will configure admin and public to use different urls, admin is often not routable by the public 18:28:54 break it 18:29:24 i'm ok to break it 18:29:38 vote? 18:29:47 sure... 18:30:04 jamielenox ok, so if only admin is configured - we have now in openstack cli a new option to specify the interface - that could help 18:30:27 #startvote Do we want to change from admin -> public and possibly break some applications? yes,no,dont_care 18:30:27 Begin voting on: Do we want to change from admin -> public and possibly break some applications? Valid vote options are yes, no, dont_care. 18:30:29 Vote using '#vote OPTION'. Only your last vote counts. 18:30:48 #vote no 18:30:50 roxanaghe_: sure, and you can override the setting now. we just try very hard to not change defaults on people so that things that did work don't stop when they update 18:30:52 #vote yes 18:31:13 #vote no 18:31:23 gah, torn 18:31:36 #vote yes 18:31:40 deprecate the old behavior and we can change it in 2.0 18:31:52 i'd rather see something like bknudson suggested in the review getting in 18:32:04 dstanek: you mean the deprecation? 18:32:22 #vote no 18:32:24 #vote no 18:32:24 [7:31pm] 18:32:26 blah 18:32:27 oops 18:32:36 #vote no 18:32:39 #vote no 18:32:43 deprecate it, then change 18:32:46 it's a good idea, but we've turned down less blatant changes for compatibility reasons 18:32:47 #vote no 18:32:55 henrynash: sorry you are wrong....it's 14:32 18:33:14 or is it 13:33? 18:33:19 lbragstad: nope 18:33:26 dstanek: timezones are all secret cunnig plan to keep us all confused 18:33:42 roxanaghe_: it'll definetly be the default in a new release 18:33:46 21:33. 18:33:50 voting over in 5... 18:33:51 #vote deprecate 18:33:53 breton: deprecate is not a valid option. Valid options are yes, no, dont_care. 18:34:04 #endvote 18:34:04 ok, just wanted to take a decision on it :) 18:34:06 Voted on "Do we want to change from admin -> public and possibly break some applications?" Results are 18:34:07 yes (2): roxanaghe_, ayoung 18:34:08 no (7): lbragstad, bknudson, dstanek, samueldmq, jamielennox, henrynash, stevemar 18:34:43 are there any follow ups for this? roxanaghe_ did you want to implement the deprecation idea? 18:35:02 dstanek, yeah I can do that 18:35:15 I'm not sure how you deprecate this... might just be documentation. 18:35:16 you have some guidance on that process? 18:35:50 #action roxanaghe_ to look into alternatives (maybe deprecation) to "Change default endpoint type for Keystone v3 to 'public'" 18:36:07 roxanaghe_: sure, in -keystone later you can find some help 18:36:14 #topic Must tokens always have a user domain ID? 18:36:16 dstanek, ok cool 18:36:22 lots of links here and i'm not sure how bknudson wants to drive this discussion 18:36:24 thanks! 18:36:29 ok bknudson 18:36:42 the question is do tokens always have a user domain ID 18:37:11 they always have a user ID , that's required by the code that converts token to auth dict 18:37:19 bknduson: well, v2 ones don’t :-) 18:37:32 23 minutes left 18:37:38 v2 ones always have the default domain ID as the domain 18:37:46 fernet's DomainScopedPayloads do 18:37:58 federated users should always have the domain 'federated' - right? 18:38:02 domain scope isn't the user domain ID 18:38:15 bknudson: ++ 18:38:30 as far as I can tell from the config option federated users have a domain named "federated" 18:38:39 but there's no ID for the federated domain 18:39:01 also, I think those are ephemeral users... are there actual federated users too? 18:39:08 always domain id 18:39:13 default was a porting hack 18:39:25 if you change the default domain, you will surprise the hell out of everytone 18:39:28 everyone 18:39:37 ignoring v2, whta doesn't have a user domain id? 18:39:37 stevemar, not alwyas 18:39:39 always 18:39:47 I could add a config option for the federated ephemeral user domain. 18:39:54 you should be able to use just a userid, or username + some domain data. 18:39:59 bknudson: isn't that a mapping thing? 18:40:02 either domain id or name 18:40:15 bknudson, no more config values for federation 18:40:32 lets make it so all federation stuff can be changed without restarting the server 18:41:40 jamielennox: I think there's a way to do mapping to either get an ephemeral user or a real one... I assume there's a way to specify the domain ... I'm no expert and haven't looked into it. 18:42:48 so are we working around another fernet issue? 18:43:05 so...is there any realquestion here? 18:43:07 the issue only shows up in a fernet test 18:43:46 bknudson: but that would seem to me the only place where you could end up without a user_domain_id in a token body 18:43:58 fernet for federated needs to record all of the information that is needed to reproduce the token 18:44:13 don't worry about token size, worry about accuracy. 18:44:55 so i've thought this before - at this point i think fernet needs to keep a shadow user table 18:45:20 ok, if it's not a problem to add the user domain ID to the fernet token for federated users that's fine. 18:45:32 jamielennox, can it use the id mapping table? 18:45:34 I'm not sure where the domain ID is going to come from 18:45:37 you get the win of still not storing tokens, but it might just need to record users that login via federation 18:46:12 ++ 18:46:16 lbragstad: dolphm: thoughts? ^ 18:46:40 I thought marekd_404 had a review up for adding the username to the fernet payload? 18:46:46 jamielennox: won't that still be a table that grows forever? 18:46:49 jamielennox, alternative is to make the fernet body larger and record the info there 18:47:03 the table can still be cleaned after a certain period of time since last login, but it'd be max a couple of million rows with unique ids 18:47:23 * dstanek see that there is only about 13 minutes left and bknudson has one more topic 18:47:23 ayoung: the thing i really like about fernet is not growing the table 18:47:30 s/table/token 18:47:47 i'll write something up 18:47:52 jamielennox, it is either/or... 18:47:52 lbragstad: this one? https://review.openstack.org/#/c/202176/ -- I linked to it 18:47:54 for now i think user_domain_id should be in everything 18:48:02 bknudson: yep, looking at that now 18:48:14 that doesn't have the user domain ID either. 18:48:44 however as far as i know most of the time when using federated login (web sites etc) you generally create an entry in a user table somewhere that you can link to later 18:48:45 bknudson: maybe the domain ID is something that we can build into the federated info? 18:48:52 it would also solve the groups issue 18:49:23 lbragstad: sure. I'm not sure if ephemeral users actually have a domain ID at this point either. 18:49:40 there's a config option for the name but none for the ID 18:49:52 right now it consists of groups_ids, idp_id, and protocol_id 18:49:52 https://github.com/openstack/keystone/blob/master/keystone/token/providers/fernet/core.py#L123 18:49:58 #link https://github.com/openstack/keystone/blob/master/keystone/token/providers/fernet/core.py#L123 18:50:09 I don't know how it's supposed to work but if users are actually supposed to always have a domain ID then that will require some changes. 18:50:31 yeah, how would we handle that for UUID? 18:50:33 we can move on if we're agreed on that 18:50:43 it sounds like this is an offline (out of meeting) conversation that needs to happen 18:50:48 lbragstad: I'd add a config option with a random uuid. 18:51:06 moving on.... 18:51:14 #topic keystoneclient keystoneauth_integration feature branch still broken bknudson 18:51:15 #link https://review.openstack.org/#/c/213573/ proposed review 18:51:21 bknudson again! 18:51:30 dstanek: its all broken 18:51:39 ya cn’t keep a good man down 18:51:50 just a notice that the keystoneauth_integration branch is falling way behind due to not being able to merge with master 18:52:08 the change to keystoneauth that I think is needed is merged 18:52:08 stevemar: way to stay positive! 18:52:18 so the purpose of keystoneauth_integration has changed 18:52:23 but now I think we need a release of keystoneauth in order to start using it. 18:52:46 it was initially to make a keystoneclient that depended on keystoneauth, however at this point it's been decided that won't happen during the ksc 1 period 18:53:12 keystoneauth_integration is therefore the keystoneclient 2 branch that will depend on keystoneauth 18:53:40 but if we change the branch names we need to change a bunch of rules in zuul that do things like exclude the requirement check based on the branch name 18:53:48 we need to keep the branch in sync with master 18:54:20 the CRUD interface should remain unchanged, anything related to the session/auth will need to be synced to keystoneauth 18:54:57 tests are the larger problem with cherry-picking between the two 18:55:31 ok, that was it... if you're wondering why keystoneauth_integration isn't up-to-date with master it's because changes were made in master that didn't get to keystoneauth 18:55:41 * lbragstad waves the 5 minute flag 18:55:50 is that it on that topic? 18:56:23 bknudson: i go back and cherry-pick occasionaly but i don't think there have been many changes to session/auth in ksc recently 18:56:23 i'll take that as a *yes* 18:56:33 do you have a list? 18:56:34 ...or not... 18:57:29 jamielennox: the fix that I needed I made with https://review.openstack.org/#/c/210010/ 18:57:52 "Commit 6950527 in python-keystoneclient added role_ids and role_names properties to fixtures.v3.Token" 18:58:00 should we have some cleanup activity to get the branch in sync? 18:58:32 that commit was made to master but wasn't made to keystoneauth 18:58:53 so when I go to merge master to the feature branch, the tests fail since the master tests are using the properties. 18:59:18 but there hasn't been a release since then so the merge is still failing tests 18:59:52 * Shrews lurks 19:00:16 #endmeeting