16:00:39 #startmeeting keystone 16:00:40 Meeting started Tue Oct 30 16:00:39 2018 UTC and is due to finish in 60 minutes. The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:41 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:44 The meeting name has been set to 'keystone' 16:00:50 o/ 16:00:56 #link https://etherpad.openstack.org/p/keystone-weekly-meeting 16:00:57 o/ 16:00:58 agenda ^ 16:01:00 o/ 16:01:55 o/ 16:02:21 o/ 16:02:36 give folks another 30 seconds 16:02:52 * kmalloc drinks more coffee while waiting 16:02:58 o/ 16:03:17 #topic TC Vision Feedback 16:03:22 in case you haven't seen it 16:03:26 #link http://lists.openstack.org/pipermail/openstack-dev/2018-October/136034.html 16:03:31 applies to us 16:03:51 if you have opinions, comments, questions, or concerns, feel free to weigh in 16:04:12 #topic Athenz and Auto Provisioning 16:04:18 #link https://etherpad.openstack.org/p/keystone-shadow-mapping-athenz-delta 16:04:26 penick posted responses to questions in there 16:04:42 nice 16:04:59 depending on his availability, we might see if we can get him in our meeting next week if we have more questions 16:05:21 he did offer to participate in a hangout/vc if people find that useful 16:05:48 feel free to weigh in on the approach, or leave comments about what might be feasible to upstream into keystone's auto-provisioning implementation 16:06:35 does anyone have immediate questions on this topic? 16:07:04 ok - moving on 16:07:12 #topic Dead Code/Doc Cleanup 16:07:13 kmalloc o/ 16:07:27 take a look at the links on the agenda 16:07:38 a few of us have been on a "clean up the dead code" kick 16:07:46 (notably wxy| cmurphy and myself) 16:08:01 this is removing a lot of ancient stuff we don't need anymore 16:08:07 #link https://review.openstack.org/#/q/status:open+project:openstack/keystonemiddleware+branch:master+topic:bug/1649735 16:08:12 #link https://review.openstack.org/#/c/614172/ 16:08:15 infinite++ 16:08:18 #link https://review.openstack.org/#/c/612625/4 16:08:23 there will be more 16:08:24 #link https://review.openstack.org/#/c/613218/1 16:08:31 #link https://review.openstack.org/#/c/613513/3 16:08:37 thanks kmalloc cmurphy wxy| 16:08:38 but this is very much something we need to keep our eyes on 16:08:51 old code causes weird problems 16:08:54 awesome! 16:09:03 like spamming the keystone server for the revocation list that is a 410 now 16:09:09 (KSM) 16:10:06 so, if you see code that needs to go 16:10:09 spin a quick pack 16:10:11 patch* 16:10:31 while i like these as low-hanging fruit, clearly we have to still do the cleanup even if we don't have someone picking them up 16:10:54 so, my opinion is we should just clean some stuff up ever now and again 16:11:02 espeically the big ones like PKI[z] support in KSM 16:11:10 makes sense - i'll review those patches today 16:11:15 because it removes a lot of bitrot code 16:11:32 and less to maintain is good for us(tm) 16:13:19 any other patches to note regarding dead code? 16:13:50 nothing yet 16:13:52 #topic Bug Smash 16:14:03 kmalloc? 16:14:04 wondering how a "dead code" halloween costume would look like 16:14:19 (un)dead code 16:14:20 I went through and triaged/smashed/closed/etc a TON of bugs across our projects 16:14:36 I reopened a couple of those btw 16:14:37 if i mis-closed a bug, please don't hesitate to open it back up (cmurphy caught a few) 16:14:41 :) 16:14:42 cmurphy: :) 16:15:07 also don't hesitate to be aggressive about closing/marking bugs as incomplete if they need more info 16:15:15 I'd like to see us down under 100 bugs for keystone by end of stien 16:15:19 we're at ~130ish 16:15:39 yeah - we've been trending higher over the last 180ish days... 16:15:40 most of them are small amounts of code to fix, e.g. https://review.openstack.org/#/c/613633/ 16:15:57 but it's not exactly "easy" to figure out what needs to be done 16:16:10 another example: 16:16:13 #link https://review.openstack.org/#/c/613455/ 16:16:27 just long running bugs we should bubble to the top of our lists 16:17:02 most of the other projects are in the single digit or sub 30 bugs 16:17:11 other = our other, aka not-server 16:17:30 some are really in depth, i expect those to take longer 16:17:37 it would be nice to have keystone server under 100 by the time we release stein 16:17:49 we did finally fix that one doc issue about the port # that would be re-opened as a new bug at least once a week 16:17:51 but we have mostly been letting bugs sit, and either they are not relevant (we aren't going to fix) or we should fix them 16:18:03 gagehugo: we have a lot of doc bugs 16:18:08 those are really unfun to fix 16:18:09 :( 16:18:24 we have a lot of documentation work in general 16:18:43 i'd like to get us to really consider a bug-zero target 16:18:53 especially the duplication from the Great Doc Migration in Pike 16:19:11 meaning, all bugs are actively worked on (longer bugs) or have fixes proposed 16:19:25 or are in an incomplete/need more data state 16:19:45 e.g. the awful admin-ness bug wont be closed until scope_type work is done 16:20:03 i don't expect bug-zero in stien 16:20:04 which we're planning to get done in stein 16:20:23 but we should aim to knock down to sub 100, if we are sub 100 this cycle we can aim for sub 50 next 16:20:32 and if we are 50 or under, i think bug-zero is a real target 16:20:41 half of the scope_types bugs are in progress 16:20:43 #link https://bugs.launchpad.net/keystone/+bugs?field.tag=policy 16:20:46 ++ 16:21:06 thanks to vishakha for helping out there 16:22:27 vishakha has been working on a bunch of bugs 16:22:30 it's fantastic 16:22:44 I've been looking for interesting low-hanging-fruit tasks for all the outreachy applicants, if any of these bugs are easy fixes but missing the low-hanging-fruit tag please add it, or if any of them could maybe be broken down into smaller tasks that a newbie could do please let me know 16:22:45 we also have had some wonderful outreachy-potential folks stepping in on the low hanging ones 16:22:57 cmurphy: ++ 16:23:10 i had to remove the low-hanging-fruit from a couple of troll bugs 16:23:12 thanks for helping with that kmalloc and cmurphy 16:23:32 cmurphy do you remember which ones? 16:24:06 https://bugs.launchpad.net/keystone/+bug/1570463 https://bugs.launchpad.net/keystone/+bug/1579659 16:24:06 Launchpad bug 1570463 in OpenStack Identity (keystone) "RFE: keystone-manage CLI to allow using syslog & specific log files" [Medium,Incomplete] - Assigned to Maram El-Salamouny (maramelsalamouny) 16:24:07 Launchpad bug 1579659 in OpenStack Identity (keystone) "oauth login silently ignores scope" [Medium,Triaged] - Assigned to omkar_telee (omkar-telee) 16:24:42 * kmalloc would close that first bug as "wont fix" tbh 16:25:01 you can totally pipe output to the syslog injector binary 16:25:14 i was trying to figure out if it's already fixed 16:25:26 it might be with keystone's log.conf 16:25:48 but i would just say pipe to logger 16:26:02 that would be the way i'd do it in any environment i manage 16:26:10 because configuring keystone-manage sounds like a TON of work 16:26:13 triaging the bug isn't the topic ;) 16:26:17 anyway 16:26:39 anything else we want to cover on bugs 16:26:40 ? 16:26:56 we should re-visit friday-bug-day 16:27:01 just make sure all bugs are triaged 16:27:13 post summit* 16:27:17 not pre-summit 16:27:18 :P 16:27:27 mm 16:27:41 we moved away from friday's because of $reasons 16:27:43 the weekly bug smash did keep bugs at least with eyes. 16:27:46 could be any day 16:27:52 but i wouldn't be opposed to focusing on bugs during office hours 16:27:57 just a weekly "hey folks, triage bugs" 16:27:57 if question queues are down 16:28:13 ++ pragmatic 16:28:18 just once a week make sure new bugs haven't lingered for months. 16:28:21 or weeks 16:28:25 sure 16:28:26 or well longer :P 16:28:34 obviously more triaging is good 16:28:40 i notice several other projects use their weekly meetings to do group triage 16:29:01 1st hour of office hours == quick triage? 16:29:05 that's not something we've typically done, but i wouldn't mind spreading the triage knowledge around a bit 16:29:09 dumb question -- is there anything like an sla between cores and community wrt bug responses? 16:29:26 hrybacki: typically no 16:29:46 hrybacki: it's not just "cores" who are responsible for bugs 16:29:56 anyone may triage bugs. 16:30:01 hrybacki sla as in the community must respond to bugs within X days or something like that? 16:30:13 kmalloc: or fix them 16:30:15 and sometimes reporter needs to supply more info 16:30:18 cmurphy: ++ 16:30:25 not what I meant -- but if there was something they'd have to pin it to /a/ group 16:30:34 lbragstad: aye 16:30:39 there is no set SLA in that regard 16:30:44 ack 16:30:55 part of the Apache2 license covers part of that 16:31:02 * kmalloc is done harping on bugs. 16:31:03 :) 16:31:04 thanks all! 16:31:09 There is only one bug I care about 16:31:12 interesting /me notes a review 16:31:17 lol ayoung 16:31:23 which one? 16:31:30 lol 16:31:30 * hrybacki ducks 16:31:34 I'm a man with a one track mind. So much to do in one lifetime.... 16:31:50 hrybacki you're playing with fire 16:31:56 haha 16:32:02 * hrybacki runs and hides 16:32:05 Not a man for compromise and where's and why's and living lies 16:32:16 * lbragstad braces himself for an ayoung rant 16:32:16 ;) 16:32:23 https://www.youtube.com/watch?v=hFDcoX7s6rE 16:32:44 Just excited for Bohemian Rhapsody this weekend, actually. 16:32:52 hrybacki: don't encourage it :P 16:33:06 :) 16:33:10 ayoung: i've heard VERY good things, but lets talk about that outside of the meeting 16:33:11 oh - i know 16:33:11 I'll stop poking the ants nest 16:33:15 i want to see that movie so bad 16:33:37 alrighty - moving 16:33:38 on 16:33:43 #topic KSA Rate Limiting 16:33:47 kmalloc o/ again? 16:33:50 This needs tests. 16:33:51 BUT 16:33:59 I want eyes on this to see if this belongs in ksa 16:34:02 I think it is worthwhile 16:34:09 but it could go up in SDK instead 16:34:19 this implements ratelimiting mechanisms in KSA itself 16:34:20 KSA? 16:34:23 keystoneauth 16:34:24 Why on the client side? 16:34:39 so the client can say "i don't want to overload X server" 16:34:39 KSA2? 16:34:47 hmmm 16:34:52 or "we might get locked out if we ask too many times, so please don't ask too many times" 16:34:59 LIke LDAP? 16:35:09 this is allowing the client to limit their requests to service 16:35:27 not just assuming the server will be pleasant about it 16:35:43 nodepool specifically needs this kind of functionality, but if nodepool does it is likely someone else does too 16:35:48 When you say it that way, it sounds like SDK 16:36:01 and the lower the level it is supported the easier it is to maintain 16:36:04 I sort of grimaced at it but mordred made the point that there is already retry logic in ksa 16:36:06 not everything uses SDK. 16:36:16 and KSA does have.. yes what cmurphy said 16:36:22 so rate limiting sort of goes with that 16:36:26 I didn't do it 16:36:28 * mordred reads 16:36:28 makes sense 16:36:37 so, please +1/+2/-1 (please do not -2, we're not at that point yet) 16:36:45 not everything uses KSA either. CloudForms goes with Fog 16:36:51 i'd like eyes and comments. 16:37:02 so - the reason I think it needs to be in ksa and not sdk (where it is now) 16:37:02 ayoung: aye, but most things python use KSA 16:37:11 is that automatic retries are handled at the ksa layer 16:37:21 and so are invisible as requests to the sdk layer 16:37:29 Ok. 16:38:09 * knikolla pokes mordred: we should talk about the summit talk at some point soon 16:38:14 knikolla: yeah. :) 16:38:38 mordred: and i largely agree, but want the other keystone folks to have eyes on it 16:38:43 and it will have tests before it lands 16:38:50 * lbragstad makes a note to review 16:38:58 What will it break to have it in KSA? 16:39:01 also - fwiw - the code allows two things - client-side rate limiting, as well as concurrency limiting - we have found that both are essential in real-world use like nodepool 16:39:04 but, right now just looking at "is this a good idea and a good impl" is what we wanty 16:39:11 ayoung: should break nothing, it's opt-in use only 16:39:16 ayoung: nothing. it should be completely no-op if you don't opt-in 16:39:23 ayoung: as it should be 16:39:53 Just to complete the thought...if this is so important, should it be OPT in, or is that only due to paranoia? 16:40:14 it must be opt in, because you want the client to specify how limited things should be 16:40:20 many times a couple simple retries isn't bad 16:40:36 the client/consumer is the only thing that can know how limited the rate of requests should be 16:40:42 yeah - it's extra overhead that many people don't need - but if you're at scale, you will need it 16:40:47 if it's a "this might break the server" case, the server should protect itself 16:40:55 (different story) 16:40:56 'should' 16:41:09 yeah, so not opening THAT can of worms right now 16:41:20 * mordred flexes arms and remembers crashing public clouds before having implemented client-side rate limiting :) 16:42:13 anything else on this topic? 16:42:15 OK...we'll look with appropriate understaning now. Anything else on that? 16:42:24 nope. 16:42:31 #topic open discussion 16:42:33 except please do not -2 ;) 16:42:54 floor is open 16:43:09 Like I mentioned before I'm looking for good low hanging fruit tasks for newbies to get their hands dirty without having a lot of keystone context 16:43:20 so if you can think of any or run across any let me know 16:43:33 i'll keep my eyes open 16:43:36 cmurphy, so, my advice to people lately has been to start with code reviews, not bug fixes 16:43:46 find some thing they understand, and ask questions. 16:43:55 No +1-1 required 16:44:21 ayoung: that's a good point 16:44:24 ayoung: that has always been my recommendation 16:44:30 and those questions usually lead to a discussion, which leads to the original poster sometimes saying "hey that is a good idea." 16:44:38 however, a lot of recent code reviews have been ... a little dense :) 16:44:47 i think we're through the worst of that for now. 16:44:49 yeah, it would be a little flood-gate-y 16:45:30 If they want, and the author agrees, they can make that change for the original poster by updating the patch, and there there they go... 16:45:47 Great for Typos, and doc changes esp 16:46:03 also followup patches for nits/typos are good 16:46:27 100% would support someone wanting to submit their own patch to fix the things if they so desired like that 16:46:31 kmalloc, I wish that had always been the norm here....sometimes I miss Brant, sometimes I don't 16:47:51 slightly unrelated - but i have a couple patches up to oslo.context and oslo.policy that will make the scope_types work in keystone easier 16:48:01 #link https://review.openstack.org/#/c/611443/ 16:48:03 so I'll definitely keep this in mind but also being able to see your code land is really motivating especially since a lot of these people are students 16:48:05 lbragstad, oooh, so does ozz 16:48:08 #link https://review.openstack.org/#/c/613635/ 16:48:21 and #link https://review.openstack.org/#/c/614195/ 16:48:50 those things should make it easier for us to do complete user management with scope-types 16:49:02 (like the demo i did a week or two ago) 16:49:11 I like, in general 16:49:43 https://review.openstack.org/#/c/613313/ 16:50:05 That allows a much wider set of testing. One thing we can't do now: check if the right project ID was set 16:50:12 nice - i'm on that review 16:50:29 yeah that one has been on my list for a couple days 16:50:37 like, we only cjheck the ID from the token, and assume a match. That one thos, goes much further and allows a lot of target stuff 16:50:45 the one things we don't do is test via oslo-context. 16:51:16 I'm working on a unit test for the checker code, so we can build it out for this one 16:52:25 coding features so you can talk about them during presentation in the summit is an interesting dynamic. Its like "How should we do this right...oh, we need that..." 16:53:04 we should also expose the flatten mechanism as part of the policy check, like "flatten_target" inherent to olso.policy 16:53:14 opt-in so we don't break anyone 16:53:22 but it would be a nice-to-have 16:54:02 kmalloc, yeah, we need to move some of the mechanisms we build for the CLI into toolijng for others to use. That one is the obvious one, aloth, for servicees, they tend to use context, which does that for you...sort of 16:54:27 aloth.>altho 16:54:55 unrelated: does simo work at red hat? 16:54:58 yes. 16:55:00 lbragstad, yep 16:55:12 lbragstad, still in my old group, that does IdM etc 16:55:13 ayoung: if you can get another pass by simo on the jwt thing 16:55:22 happy to do so 16:55:24 thnx 16:55:26 timing isn't ideally, but i agree with cmurphy that it would be nice to get their eyes on the jwt thing one more time 16:55:49 i have one more review that i want to raise up as a potential thing 16:55:52 thanks ayoung and kmalloc 16:55:54 for folks to look at 16:56:00 #link https://review.openstack.org/#/c/613681/ 16:56:12 So... will JWT give us a way to do PKI type signing? 16:56:19 that requires some work, but i want some extra eyes to determine if a None header is within WSGI spec 16:56:29 the rest of the code should be "ok" otherwise. 16:56:33 specifically, I want one keystone to be able to sign a token, and for other services to be able to validate without forging them 16:56:51 ayoung: eventually. JOSE with asym encryption/validation 16:57:06 but that is a few steps outside of JWT addition 16:57:10 erm that's for other keystones to validate them, not other non-keystone services 16:57:10 to keystone 16:57:20 right? 16:57:22 it could be possible 16:57:22 yeah - that is noted specifically as an advantage of jwt 16:57:26 cmurphy, anyojne should be able to validate.... 16:57:42 3 minutes, time check 16:57:54 the only reason we send them back to keystone is because of the Fernet spec. PKI tokens were validated in the services 16:58:09 * kmalloc ducks out, food. 16:58:13 the major hurdle is that services need roles 16:58:18 be back in -keystone post meeting. 16:58:19 in order to do rbac 16:58:28 and we don't include unbound things in the token payload 16:58:52 cmurphy, and, one Keystone may not be a peer to the other keystone. I was brainstorming some of this for the edge talk 16:59:14 * ayoung needs to go find the slip of paper he was scribbling on with all these ideas 16:59:28 we can take this to -keystone later, too 16:59:33 thanks for coming, all 16:59:55 #endmeeting