20:00:45 #startmeeting keystone_horizon 20:00:45 Meeting started Thu Dec 8 20:00:45 2016 UTC and is due to finish in 60 minutes. The chair is r1chardj0n3s. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:00:46 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:00:49 The meeting name has been set to 'keystone_horizon' 20:00:54 good morning, folks! 20:00:57 \o/ 20:01:08 * lbragstad high-fives r1chardj0n3s 20:01:09 o/ 20:01:11 o/ 20:01:33 o/ 20:01:46 so, what've folks been working on? 20:02:04 well - we merged http://specs.openstack.org/openstack/keystone-specs/specs/keystone/ocata/pci-dss-password-requirements-api.html 20:02:20 \o/ 20:02:48 are we any closer to an API for getting that info from Horizon? 20:02:55 o/ 20:03:14 oh dolphm is here too, nice 20:03:28 r1chardj0n3s getting that information from keystone? or horizon? 20:03:37 o/ 20:03:43 stevemar: =) 20:03:50 lbragstad: getting the password strength information from keystone into horizon 20:04:04 ideally horizon gets this info from keystone, shows it to user? and i18n would be supported ? 20:04:22 r1chardj0n3s yeah - we have a spec detailing and API for it, i plan to start working on it next week 20:04:23 lbragstad: the human-readable version of the regex 20:04:28 lbragstad: oh cool 20:04:45 r1chardj0n3s the regex and the description for it will be available via the api 20:04:53 \o/ 20:05:21 lbragstad: in an error message or in advance? 20:05:54 dolphm in an error message when a user tries to update their password, you mean? 20:05:58 lbragstad: yes 20:06:05 ducttape_: translation might be hard 20:06:08 dolphm i believe we already do that 20:06:08 lbragstad: how/when is the description exposed 20:06:22 we want it upfront 20:06:23 lbragstad: (i thought so) so it'll now be done in advance? 20:06:27 gotcha 20:06:30 dolphm yeah 20:06:38 UX++ 20:06:56 dolphm it can be done in advance, but it's up to whoever implements it to use it wherever they want 20:07:22 but - the horizon folks had some good reasons for wanting it in advance last week 20:09:10 yeah, I don't know how you would do translation as this is a configurable item. 20:09:16 looking forward to that new API spec. it would be great to be able to get a translated version if possible, but I get that that could be difficult. Is the configuration always created by deployers? 20:09:45 r1chardj0n3s: currently, yes 20:10:20 so they'd know whether they had any i18n requirements I guess, when they're setting password_regex_description 20:10:36 true 20:10:42 localization is probably low weight concern imo. I'd think most deployments are ok with single default lang fwiw 20:10:48 was just curious 20:11:32 you could always write the message in two different languages in config, but that doesn't scale if you really need to cater to a long list of languages 20:12:46 ok, anyone else have anything they've been working on that needs discussion? 20:14:55 y'all are quiet :-) stevemar, you got anything? 20:15:21 We've scared off keystone 20:15:29 * dolphm boo. 20:15:38 * robcresswell jumps 20:15:40 tough crowd lol 20:15:55 well, I'll poke rderose to see how "fixing federation" is going :-) 20:16:10 sure 20:16:23 new patch: https://review.openstack.org/#/c/399684/ 20:17:07 Essentially it require a domain_id when registering an IdP. If not provided, federated users will be put under a default federated domain. 20:17:22 But all users will be under a concrete domain. 20:18:25 More patches coming... :) 20:18:36 ok, there's mention in the etherpad of Horizon impact too 20:19:29 is that selection of domain id when configuring the idp in horizon, or at some other time? 20:20:15 I don't think Horizon supports creating the IdP, right? 20:20:19 or does it? 20:20:30 rderose: yes 20:20:43 ah, cool 20:20:57 so that would be a change 20:20:59 it's just not entirely useful on it's own without dstanek's work 20:21:08 so we'll need a new field for domain_id 20:21:25 david-lyle: yes 20:21:38 How does keystone version these changes? 20:22:04 robcresswell: are you having another microversion moment? 20:22:07 david-lyle: it is backwards compatible in that, if you don't explicitly set the domain_id, we'll create one 20:22:19 Ah phew 20:22:30 ok 20:22:31 \o/ 20:22:31 r1chardj0n3s: Yes I could feel my blood pressure rising 20:22:49 robcresswell: we haven't introduced a backwards incompatible API change since pre-diablo :) 20:23:13 dolphm: You should teach Nova how to API 20:23:33 * robcresswell goes back to being a grumpy hermit 20:23:37 lol 20:23:43 post PTL-syndrome 20:24:24 dolphm: do you have a reference to the dstanek work you mentioned above? 20:25:14 r1chardj0n3s: http://specs.openstack.org/openstack/keystone-specs/specs/keystone/ocata/native-saml.html 20:25:58 thx 20:26:35 dolphm: true, but even without dstanek patch, we can remove the hardcoded 'Federated' domain 20:26:49 so no dependency on apache for federation ? 20:26:54 and migrate federated users to a concrete domain 20:27:10 rderose: right 20:27:37 rderose: i was just referring to the utility of the current horizon flow for setting up IdP's (you still have to configure shib et al) 20:27:52 dolphm: gotcha 20:29:34 david-lyle yep - specifically no dependency on mod_shib or mod_mellon 20:29:48 nice 20:31:39 any other issues to discuss? 20:32:22 or, any patches we should look at as a priority? 20:34:14 Nothing from me :) 20:34:26 Can probably call the meeting early 20:35:06 yep, if there's nothing either team needs from the other, I'll call it 20:35:33 thanks everyone! 20:35:35 o/ 20:35:37 #endmeeting