15:08:18 #startmeeting keystone 15:08:18 Meeting started Wed Jul 23 15:08:18 2025 UTC and is due to finish in 60 minutes. The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:08:18 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:08:18 The meeting name has been set to 'keystone' 15:08:29 Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct 15:08:40 #link https://openinfra.dev/legal/code-of-conduct 15:09:01 #topic roll call 15:09:12 admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe, deydra 15:09:15 dmendiza: o/ 15:09:19 op/ 15:10:57 #topic review past meeting work items 15:11:32 #link https://meetings.opendev.org/meetings/keystone/2025/keystone.2025-07-09-15.20.html 15:11:49 We had one action item: @Greg to look at the ldap failures 15:11:59 He's on PTO this week, so I'll push that to next week 15:12:05 that was done 15:12:13 oh, cool 15:12:21 and fixed. Sadly not all necessary devstack changes are merged yet 15:12:36 I think I reviewed those 15:12:59 yes 15:13:06 🙋 15:14:28 #topic liaison updates 15:14:32 hi dmendiza 15:14:45 nothing from me for liaison updates 15:15:00 nothing on my side either 15:15:43 #topic specification OAuth 2.0 (hiromu) 15:15:47 #link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext 15:15:49 #link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability 15:15:52 External OAuth 2.0 Specification 15:15:54 #link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged) 15:15:57 OAuth 2.0 Implementation 15:16:00 #link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls (merged) 15:16:03 OAuth 2.0 Documentation 15:16:06 #link https://review.opendev.org/c/openstack/keystone/+/838108 (merged) 15:16:08 #link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged) 15:16:31 no idea where this is, probably just waiting for tacker, et al, to merge things so we can merge the tests 15:16:46 #topic specification Secure RBAC (dmendiza) 15:16:48 #link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_ 15:16:50 2025.2 Release Timeline 15:16:52 Update oslo.policy in keystone to enforce_new_defaults=True 15:16:56 Update oslo.policy in keystone to enforce_scope=True 15:18:10 Yeah... I'm not sure if there's anything else we need right now. 15:19:14 Should we remove this, can we consider it done? 15:19:58 Possibly? The only thing I'm unsure about is whether Devstack defaults to SRBAC on? 🤔 15:21:04 I'm asking AI 😜 15:25:57 Unclear 15:26:42 it tells you all the history of SRBAC in OpenStack perhaps instead of giving the answer, right? 15:26:56 ;) 15:27:15 yeah, and then I tried having it collate each of the core projects and it wouldn't 15:27:43 maybe if I pointed cursor at it 15:28:10 its faster to dig ourselves ;-) 15:28:18 #topic specification OpenAPI support (gtema) 15:28:19 indeed 15:28:24 #link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone 15:28:33 no news on that front sadly 15:28:51 was busy with openpolicyagent as wasm crashing 15:30:55 ack, did you figure out the wasm thing? 15:31:40 not really 15:31:52 found few articles on how to debug it, but haven't tried yet 15:32:13 ack 15:32:16 the only fact is that this starts happening from a certain number of rules 15:32:49 no memory errors because rust doesn't give you enough memory? ;) 15:33:26 neah. In general wasm itself is like a programming language 15:34:07 and the rust implementation for it has an invalid memory access once the wasm for openpolicyagent reaches certain count of rules (functions or whatsoever) 15:34:36 the size of binary does not matter though, so I assume it really has to do with the number of rules 15:34:53 ahh 15:34:54 till now I implemented calling of OPA using http 15:35:11 what is anyway a recommended approach with slightly more features 15:35:47 it also apparently has nearly no influence on the performance, so ... who cares 15:36:05 I will definitely continue trying to debug it though 15:36:27 the policies in OPA are so much greater than oslo.policy 15:37:19 Yeah, it's very promising, keep us posted 15:37:19 #topic open discussion 15:37:22 drencrom 15:37:27 Review patch proposal: https://review.opendev.org/c/openstack/keystone/+/951792 15:37:30 Can I help with ldap tests? How hard it is to run them locally? 15:38:11 we just need to have devstack change on restarting slapd landed 15:38:30 Yeah, that's what I figured 15:38:33 afterwards things are great again and we can come back to that change 15:38:50 this did pass keystone-tempest-ldap-domain-specific-driver, does that instantiate slapd? 15:39:05 I see the change already sets depends-on and tests are now passing 15:39:15 so we can review that 15:39:27 yes, it does 15:39:53 because of that that job was failing for a very long time 15:40:09 we just never looked at it 15:40:51 okay, I'll review it 15:40:59 who should we ping about the devstack patches? 15:41:49 no idea. I think frickler approved one change of both, but not the slapd restart 15:42:01 so he should have rights 15:42:36 oh crap. Now I see the other +Wed change did't land - need recheck 15:44:51 ahh, okay 15:46:31 #topic bug review 15:46:35 #link https://bugs.launchpad.net/keystone/?orderby=-id&start=0 15:46:52 several new bugs for keystone, not sure if we've covered any yet, but I'll go through the list 15:46:57 first up 15:47:08 #link https://bugs.launchpad.net/keystone/+bug/2117217 15:48:16 I thought this was fixed 15:48:50 maybe this is a side-effect of the fix? 15:50:33 no, it just didn't address application credentials 15:50:55 commit e9513f8e4f25e1f20bc6fcab71d9177120000abf if anyone is interested 15:51:25 yeah, looks like that 15:51:40 I think we can confirm this one 15:51:52 right 15:52:06 next up 15:52:11 #link https://bugs.launchpad.net/keystone/+bug/2116948 15:52:45 Can we bump the requirements for epoxy? 15:53:31 hmm, I doubt 15:54:08 I just wonder this is happening, since I use that command in github ci since months and haven't seen issues 15:55:21 hmm 15:55:22 so the problem is that we haven't raised the low constraint for that 15:55:46 additional issue is that the platform the reporter runs does not have a newer version 15:56:04 almalinux 9.6 15:57:32 if we just raise the constraint in Epoxy the reported would still fail to run it since the package is likely not there 15:57:58 ahh, do you mind responding to that bug? 15:58:08 it looks it can be updated only in el10 15:58:16 sure, I'll do 15:58:24 thanks 15:58:25 next up 15:58:29 #link https://bugs.launchpad.net/keystone/+bug/2116930 16:01:04 I remember stephenfin was complaining on limits that they require system scope tokens or so. 16:01:18 Maybe this is somehow related 16:01:35 I was just wondering about that 16:01:45 That looks like the same issues, yes 16:01:54 *issue 16:02:01 ok, so that's confirmed 16:02:23 well, works as designed as we figured out back those days 16:02:35 yeah, thats true 16:02:41 but that is definitely not how anybody would want to use the feature 16:02:53 especially for admin 16:03:27 right 16:04:42 finally 16:04:44 #link https://bugs.launchpad.net/keystone/+bug/2116750 16:06:07 needs further check - not sure this is the default policy 16:06:30 at least my local checkout tells current policy for create_grant is an insanely long and complex rule 16:06:48 it's 3 lines on 32'' 4k monitor 16:07:30 wow 16:07:34 I can take a look at that 16:09:53 addition to that ticket is wording: "when a project admin" - looks like they grant admin on project to non admin users 16:10:35 yeah, thanks dmendiza 16:10:53 that does it for keystone 16:11:00 #link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=0 16:11:05 nothing new in python-keystoneclient 16:11:08 #link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=0 16:11:32 #link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=0 16:11:35 keystoneauth is good 16:11:41 #link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=0 16:11:51 so is keystonemiddleware 16:11:57 #link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=0 16:11:59 good here 16:12:04 #link https://bugs.launchpad.net/ldappool/+bugs?orderby=-id&start=0 16:12:07 and ldappool is good to go 16:12:10 'v 16:12:11 #topic conclusion 16:12:27 Thanks all! Nothing else from e 16:12:29 me 16:12:55 nothing on my side either 16:16:09 #endmeeting