16:00:22 #startmeeting keystone 16:00:23 Meeting started Tue Apr 23 16:00:22 2019 UTC and is due to finish in 60 minutes. The chair is cmurphy. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:24 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:27 The meeting name has been set to 'keystone' 16:00:31 o/ 16:00:36 #link https://etherpad.openstack.org/p/keystone-weekly-meeting agenda 16:00:37 o/ 16:01:22 o/ 16:01:47 o/ 16:02:16 okay let's get started 16:02:25 #topic next meetings 16:02:26 o/ 16:02:32 o/ 16:02:50 next week most of us will be at the summit so we will have to cancel that meeting 16:02:58 wait 16:03:07 yes next week 16:03:23 * cmurphy loses track of time 16:04:01 the following week i'm going to take a couple of days off, I could ask for a volunteer to chair the meeting but i think most of us are going to be toast anyway and we may as well cancel 16:04:03 thoughts? 16:04:18 wfm 16:04:32 i'll likely be working on summaries anyway 16:06:13 okay 16:06:41 #agreed next two meetings canceled, resume meetings Tuesday 14 May 16:06:57 ok 16:07:00 wfm 16:07:12 cool 16:07:16 #topic reviews 16:07:27 anyone want to highlight any reviews? 16:09:54 I noticed jose was working on https://review.opendev.org/655166 and wanted to bring it up 16:10:25 would that work? and would we need renewable app creds in that case? 16:10:43 knikolla: kmalloc ? 16:11:09 o/ 16:11:11 that should be allowed, as long as if the group role assignment changes the app cred is likewise invalidated 16:11:25 there is no reason a group-conveyed role assignment should be restricted from use in an app cred 16:11:33 doesn't need renewable. 16:11:39 assuming concrete group role assignment 16:11:41 it looks like they're generated at validation time 16:12:17 we can't really check on group membership changes if they happen in idp 16:12:23 and user only uses app cred to log in 16:12:55 IDP/Federation allowed appcreds are not concrete assignments 16:13:43 but groups are concrete and have concrete role assignments 16:13:46 #link https://review.opendev.org/#/c/655166/1/keystone/models/token_model.py@412 16:13:49 group roles can't be divined from the IDP in any case, group membership can. either a role is conveyed to the user directly in federation or it's a role assignment on a group within keystone 16:14:07 so, no reason group role assignments shouldn't be allowed in app creds. 16:14:10 afaict 16:15:00 well - i thought the main driver of renewable app creds was because we wanted to "force" the auditing of those groups 16:15:36 so that a federated user couldn't just create an application credential with access that gets out of sync from the idp in the future 16:16:04 * lbragstad could be mis-remembering something though 16:16:10 that is fair 16:16:18 but this appears to be *any* group assignment 16:16:46 ignoring auto-provisioned projects, when a federated user gets a scoped token the mapping gives them a membership in a group which gives them an effective role assignment 16:17:07 if they lose membership to the group because their saml attributes changed then they don't have the effective role assignment any more 16:17:19 because the mapping wouldn't apply any more 16:17:21 right? 16:17:25 and that's driven by the assertion, yeah? 16:17:32 as i understand it 16:17:33 right, but they could login with the app cred is the concern 16:17:39 circumventing that effective bit. 16:17:43 right 16:17:53 so if i have membership to an admin group in an idp somewhere 16:17:57 so, exempt federation from effective until we have renewable? 16:18:06 but otherwise, this still feels like a gap in our functionality 16:18:14 i can use my assertion to generate an application credential to that corresponding OpenStack group 16:18:38 and nothing would force me to revisit that authorization, even if i'm removed from that group or company 16:18:54 okay that's right, i'm remembering now 16:19:17 iirc - renewability was our scapegoat 16:20:26 in order to prevent that specific foot-gun scenario 16:21:35 we could just do a "is_federated" and not do "effective" 16:22:03 in that case. until we have renewable 16:22:21 and we can do the same normal invalidation on group assignment change we do on direct assignment 16:25:06 okay i'm in agreement, can someone comment on the patch? 16:25:25 I'll comment. 16:25:33 thanks 16:26:25 i also wanted to mention https://review.opendev.org/649177 i haven't looked at the last revision but it seems like it fixes an important bug but needs some careful eyes on it 16:27:51 #topic open discussion 16:27:57 anything else anyone wants to bring up? 16:28:29 my internal team is having a team dinner at some point next week, we just don't know when, where, or how. 16:28:49 so - i'm not sure if that will conflict with the keystone team dinner at anypoint 16:29:11 lbragstad: based on the poll i was going to go for wednesday 16:29:42 sweet - if that's the consensus, i'll let my internal team know 16:29:56 cool 16:30:20 i'll be trying to organize that properly today 16:30:27 commented. 16:31:19 thanks cmurphy 16:34:04 here's another question for the group, do we need branches for ldappool? see thierry's question https://review.opendev.org/654455 16:35:06 interesting 16:36:05 we had them for convenience not for any other reason 16:36:14 probably don't need the branching 16:38:05 i'll ask pas-ha since he had asked about the branch, i think we may as well drop them 16:38:59 from a vendor perspective, branches are nice \0/ 16:39:40 hrybacki: from another vendor perspective we don't use the branches for that lib 16:39:43 ¯\_(ツ)_/¯ 16:40:09 I don't have a strong argument tbh -- hence the weak shruggie :) 16:42:36 yeah doesn't seem like there's a strong rationale either way 16:42:55 seems like the meeting is winding down so let's go ahead and close it and get a few minutes back 16:43:01 see most of you next week! 16:43:07 #endmeeting