16:00:04 #startmeeting keystone 16:00:05 Meeting started Tue Jun 12 16:00:04 2018 UTC and is due to finish in 60 minutes. The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:06 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:07 ayoung, breton, cmurphy, dstanek, gagehugo, hrybacki, knikolla, lamt, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, spilla, aselius, dpar, jdennis, ruan_he, wxy, sonuk 16:00:08 The meeting name has been set to 'keystone' 16:00:16 o/ 16:00:23 #link https://etherpad.openstack.org/p/keystone-weekly-meeting 16:00:26 o/ 16:00:27 o/ 16:00:38 o/ 16:00:46 Oyez oyez 16:00:50 o/ 16:00:55 o/ 16:01:11 o/ 16:01:45 o/ 16:02:24 #topic Announcements 16:02:35 #info Specification freeze is in effect 16:02:41 last friday was rocky-2 16:02:52 so - we're past the specification deadline 16:03:02 and with that 16:03:10 #info feature freeze is in a month 16:03:55 #topic Reviews 16:04:15 there are several efforts/specifications that are in need of feedback 16:04:49 jgrassler: has asked for early feedback on the migration for app creds 16:04:54 #link https://review.openstack.org/#/c/572776/ 16:05:12 hrybacki: has been working on the default roles support, which is ready for reviews now that tempest is passing 16:05:17 #link https://review.openstack.org/#/q/status:open+project:openstack/keystone+branch:master+topic:basic-default-roles 16:05:26 wxy|: has a bunch of things up for unified limits 16:05:34 #link https://review.openstack.org/#/q/topic:bp/unified-limits+status:open 16:05:40 #link https://review.openstack.org/#/q/topic:bp/strict-two-level-model+status:open 16:05:45 #link https://review.openstack.org/#/q/topic:bug/1754184+status:open 16:05:50 #link https://review.openstack.org/#/q/status:open+project:openstack/keystone+branch:master+topic:bp/unified-limit-improve 16:06:08 and there is a patch up for MFA receipts 16:06:13 #link https://review.openstack.org/#/c/572776/ 16:06:24 so - plenty of things to review 16:06:48 :) 16:07:01 does anyone else have things to share as far as feature/spec reviews? 16:07:08 or specific reviews to call out? 16:07:29 to unblock the triple-o folks we need eyes on https://review.openstack.org/#/c/574735/ 16:07:55 and this one yaml catalog backend: https://review.openstack.org/#/c/483514/ 16:08:06 I guess that means me 16:08:06 the flask-conversion dispatching support caused an issue with JSON Home on / (I also need to add an added test) 16:08:51 and you hrybacki 16:09:05 need a non RH er to look at is as well. We should remember that rule 16:09:23 i have the flask reviews pulled up, i can take a look too 16:09:28 always a best practice 16:09:54 ayoung: it's not really a "rule" due to small(er) numbers of cores. but all added eyes, red hat or not are welcome 16:10:15 kmalloc, yeah. Just realized how the dynamic has changed. Any IBMers left? 16:10:28 Henry is still core 16:10:54 henry posted to the mailing list last week 16:11:00 and stevemar does drivebys...ok 16:11:30 been looking at that patch for the last half-hour, took me a bit to decrypt the router composition 16:11:40 http://lists.openstack.org/pipermail/openstack-dev/2018-May/130854.html 16:11:51 ah henry has said he's hanging up his core status. 16:11:58 knikolla, yeah, I can see how that is funky. 16:12:17 I guess I've been deep enough in it. 16:12:19 the router composition stuff is ... dense 16:12:22 ayoung: It's routers all the way down! 16:12:25 Heh 16:12:30 it's all going away 16:12:48 but it's a slow roll to go away- losing the composing router code is a win. 16:12:55 Yes 16:13:12 there was another flask side effect I just saw 16:13:12 \o/ 16:13:23 https://review.openstack.org/#/c/568377/ 16:13:33 no not that 16:13:34 one sec 16:14:01 ah, yes...last comment there: 16:14:09 after transition to flask:- 16:14:09 below unversioned url is not working:- 16:14:09 python -c "import requests,json;r=requests.get('http://:5000',verify=False,headers={'Accept': 'application/json-home'});print(r.content)" 16:14:09 versioned one works:- 16:14:09 python -c "import requests,json;r=requests.get('http://:5000/v3',verify=False,headers={'Accept': 'application/json-home'});print(r.content)" 16:14:20 need to bump that to its own bug 16:14:21 ayoung: kmalloc has a patch up to fix that 16:14:27 right, that is bug https://bugs.launchpad.net/keystone/+bug/1776506 16:14:28 Launchpad bug 1776506 in OpenStack Identity (keystone) "Keystone JSON HOME on / fails" [High,In progress] - Assigned to Morgan Fainberg (mdrnstm) 16:14:31 cool 16:14:37 and closed by https://review.openstack.org/#/c/574735/ 16:14:46 but https://review.openstack.org/#/c/574735/ needs another test to ensure we don't regress. 16:14:53 ++ 16:14:56 i'll get that test post meeting 16:15:00 and expand commit message 16:15:09 OK 16:15:15 ayoung: that is the triple-o blocking bug, btw 16:15:28 +2 from me. 16:15:45 my plan is to add a test but otherwise leave the code as is, extra eyes are welcome to ensure the code is good 16:16:03 i can rebase it off the chain i think, but it's in a flask chain right now. 16:16:11 so it has parent patches. 16:16:57 lbragstad, of the ones you posted above, what is burining? 16:17:29 hmm 16:17:33 that's a tough questions 16:17:42 because i'm inclined to say everything :) 16:17:45 Ha 16:17:53 IMO - the unified limits stuff needs eyes 16:17:59 because it's a lot of moving pieces 16:18:13 same with default roles 16:18:29 there isn't a ton up for review for app creds or MFA receipts, yet... 16:18:34 but early feedback is always valuable 16:19:52 i'm also going to be spending a bunch of time working on unified limit support in the clients, so that should help people if they want to test manually 16:20:25 please review the client parts of limits, there are few people with experience in clients, at least this gets folks familiar with it. 16:20:48 and anything default roles. 16:21:00 the other things are smouldering vs outright on fire :) 16:21:08 yeah - we're going to have a lot of patches queued up for default role usage after that patch lands 16:21:36 please help me make sure I'm covering bases with those tests 16:21:37 hrybacki, on the default roles. The code as is looks good. BUt, have we done the "how will we resolve conflicts?" analysis if, say a role exist but is not in the config file or something? 16:21:57 ayoung: in an automated fashion? 16:22:16 hrybacki, lets start with "written down somewhere" first 16:22:30 ayoung: in the spec, yes 16:22:43 and will likely be in release note verbage 16:22:49 OK, so we've asked "how can someone break default roles." THos need to end up in the tests somehow 16:23:29 good point 16:24:58 All we are doing is creating the role if it does not exist. That should not break anything 16:25:13 right 16:25:25 we have not yet done the "banana test" as that is outside the scope. Ok. I think I can endorse this patch 16:25:42 * lbragstad has no idea what a banana test is 16:26:03 lbragstad, that was from the summit 16:26:20 the guy from....Verison? had a test where he creaded a role called banana 16:26:24 and assigned it to user 16:26:38 since no policy was written to use that role, it should have had 0 effect 16:26:51 * hrybacki comes back from internal convo reads up 16:26:55 if it allowed the user to perform some operation, "it slipped on the banana" 16:27:11 Verizon or AT&T (felipe?) 16:27:23 lol 16:27:29 that's clever 16:27:32 Wanna say it was Verison 16:27:45 lbragstad, yeah, I want that in Tempest 16:28:28 anything else burninating? 16:28:45 Oh, on default roles 16:28:49 * hrybacki ayoung american politics are burninating 16:28:49 i think those are the main ones 16:28:51 well, by default, remember *any* role on a project allows some level of access 16:28:55 do we want to add a rule that says "admin implies memeber?" 16:29:08 it's the core concept of what "member" was. 16:29:11 except spelled right 16:29:13 in the current state yes 16:29:20 so, i'm not surprised banana allowed that. 16:29:33 but I assume we want to fix that with default roles 16:29:38 ayoung: can we do implications in policy files? 16:29:46 that's a hard fix knikolla, but i'd like to seethat fixed 16:29:59 hrybacki, yes, but it is messy 16:30:09 role:member or role:admin becomes a rule 16:30:27 and then rule:member: role:memeber or role:admin 16:30:31 hrybacki: but i don't think you need to. keystone will expand implications on token validation IIRC. 16:30:36 ah, interesting. I didn't realize you could do that 16:30:39 and then update the various rules...it is messy 16:30:51 knikolla, it is a config option to expand 16:30:51 so you only need member in the policy file. 16:30:57 ayoung: argh. 16:31:12 on by defualt 16:31:16 we gave them an opt out 16:31:20 my next question ^^ 16:32:24 http://git.openstack.org/cgit/openstack/keystone/tree/keystone/conf/token.py#n114 16:32:47 on by default: [token] infer_roles = True 16:32:53 can we deprecate and eventually remove that option? 16:32:58 Yes 16:33:21 we can deprecate and remove a bunch of the token revoke options. 16:33:24 but that one, definitely 16:33:26 knikolla, oh yes 16:34:27 Remove in S? T? 16:34:48 the net impact of just dropping the option on the floor is effectively zero 16:34:50 i think S would be too soon to remove it 16:35:01 we could just deprecate and never reference it. 16:36:04 So, one reason that was in there was if we were going to generate the policy files from the keystone side. I think we are safe in saying we are not going to do that 16:36:15 ++ 16:36:30 If we generated the policy, then it would be more efficient to expand implied roles in the policy file. 16:38:25 does anyone have anything else regarding reviews or specs? 16:38:44 otherwise i'll switch to open discussion 16:40:16 #topic open discussion 16:40:35 floor is open if anyone has anything they'd like to talk about 16:41:29 I think you are all swell people. EoM 16:42:23 ha 16:42:47 hrybacki is a positive influence on the keystone community (he always was, but specifically told everyone they are swell) 16:43:00 lol 16:43:08 \o/ 16:43:16 o/\o 16:43:32 angry bird or high five, the real topic of discussion 16:44:02 ^ ^ 16:44:02 o/\o 16:44:49 (^_^)/\(^_^) 16:44:53 ^5 16:44:56 sounds like we can get some time back before office hours 16:45:07 :) 16:45:33 thanks for coming! 16:45:38 #endmeeting