17:01:05 #startmeeting keystone-office-hours 17:01:06 Meeting started Tue Mar 20 17:01:05 2018 UTC and is due to finish in 60 minutes. The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:01:07 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:01:10 The meeting name has been set to 'keystone_office_hours' 17:01:37 #link https://bluejeans.com/8559013623 17:03:37 going out for lunch, will be back in an hour or so 17:11:23 Johannes Grassler proposed openstack/keystone-specs master: Add whitelist-extension-for-app-creds https://review.openstack.org/396331 17:14:36 o/ 17:20:02 reviewing https://review.openstack.org/#/c/396331/ since jgr won't be around all of office hours 17:30:34 in case you missed it - https://bluejeans.com/8559013623/ 17:30:55 oh we're bluejeansing? 17:31:20 yep - we actually have questions for you cmurphy 17:31:31 bah okay 17:31:34 one sec 17:36:34 kmalloc: i'm not sure if it's just me, but it sounds like your mic is clipping 17:37:47 kmalloc: added some comments, and will fix up most of that in a patch after lbragstad, or cmurphy get a chance to also comment. 17:41:24 adriant: want to join the bluejeans session ^ 17:42:59 moving on to https://review.openstack.org/#/c/553670/ 17:43:05 cmurphy: might jump on in a sec :) 18:04:48 lbragstad: ping, default roles chat? 18:09:09 kmalloc: your puppy left :'( 18:22:22 o/ back 18:52:42 gagehugo: we just dropped bridge fyi 18:53:06 hrybacki ok I was listening in 18:53:25 ack -- didn't want you to feel as if we abandoned you gagehugo 18:53:29 heh 18:53:36 nah I caught the tail end of system scope 18:53:50 ++ 18:54:03 relocating now o/ 18:56:01 lbragstad https://review.openstack.org/#/c/554327/ fixes the same bug as https://review.openstack.org/#/c/553108/ but it refactors the sql backend logic for tags, which I'm not sure about 18:57:31 it uses nova's approach which looks like using inner joins, but we had some concerns about if that would be worse performance 19:09:17 gagehugo: revieing 19:09:19 reviewing* 19:09:40 I need to be revived on this tue 19:09:45 :) 19:26:52 gagehugo: is https://review.openstack.org/#/c/553108/3 the perferred way to close the bug? 19:27:30 i'm spinning up an environment to test it quick 19:28:09 lbragstad I think it's a much simpler fix than Nic's 19:28:23 I'm sure the logic could be refactored to be better 19:29:05 and it may require refactoring if we add starts/ends with & contains 19:31:08 lbragstad: extensive comments on app-cred whitelist 19:31:15 it should cover all the things we talked about 19:31:20 perfect 19:31:35 it's a pretty big re-work, but it should simplify and clarify what we allow 19:48:06 lbragstad: I think we need to find a good way of de-coupling default roles from scope types 19:49:50 at least in documentation. e.g. Here are default roles X, Y, and Z. This is generically what their purpose should be. Have you heard of scope types A and B? Here is generically what their purposes . Here is how we envision default roles being applied in the following scoped operations. 19:50:15 thoughts? I think it gets v confusing when we introduce both the default roles and how they are used with scope at the same time 19:51:42 right 19:51:52 it's almost like a support matrix 19:52:19 yeah roles & scope like to confuse people 19:52:29 more clarification would be great 19:53:12 would an abstracted support matrix with "scopes" being one axis and "default roles" being the other help? 19:53:44 lbragstad: I'm not sure I follow precisely 19:53:49 so maybe XD 19:54:28 trying to find an example 19:55:39 ack 20:04:17 lbragstad you tested tags with ksc right? 20:06:16 gagehugo: yeah 20:06:22 hrybacki: gagehugo - https://imgur.com/a/XGMnW 20:06:43 i apologize for the chicken scratch 20:07:16 oh man engineering paper 20:07:18 hah, no you are fine 20:07:37 lbragstad: do we have any documentation specific to system, domain, and project scope atm? 20:08:53 I'm thinking 1) intro the default roles and their generic purpose 2) brief review of scope levels (system, domain, project) and link to more info for the curious 3) present something akin to your diagram demoing how they 'should' overlap 20:09:19 lbragstad http://paste.openstack.org/show/706590/ 20:09:22 it works for curl 20:09:27 wonder if ksc is borked as well 20:09:41 and maybe in reverse order of how we have e.g. reader, write, and admin roles -> project, domain, and system scopes 20:10:33 hrybacki: that was kind of my thinking behind https://bugs.launchpad.net/keystone/+bug/1757151 20:10:34 Launchpad bug 1757151 in OpenStack Identity (keystone) "Token and scope documentation needs an update" [Medium,In progress] - Assigned to Lance Bragstad (lbragstad) 20:10:36 I can add a testcase though 20:10:44 huh - interesting 20:10:49 i can retest with curl 20:11:36 lbragstad: okay. I'll work on this draft in an abstract way and then we can fill in the specifics together this week? 20:12:10 yeah - i'll start working on the scope docs 20:12:22 ++ 20:12:39 also - i was wondering if it would be useful to break the scope doc up depending on the audience 20:12:59 having a document that explains scope types for users and operators 20:13:16 and a separate document that explains scope types for developers writing other services 20:14:37 lbragstad: would it be too much to have them separate but in the same doc? Not sure how different they would be 20:17:25 hrybacki: we'll - we have a section for user guides and then we have this - https://docs.openstack.org/keystone/latest/contributor/services.html 20:17:28 which is in a separate document 20:18:08 but then we have https://docs.openstack.org/keystone/latest/admin/identity-tokens.html#authorization-scopes which is in the admin-guide 20:20:02 I feel like I need to read all of our docs. I haven't the slighest clue as to how they are structured rn 20:20:47 the last major restructuring we did was in PIke 20:20:55 we moved all the openstack manuals content into keystone 20:21:11 and per the specification, we broke it into several guides 20:21:25 (admin guide, install guide, configuration guide, user guide, API references, etc...) 20:22:06 ack, that does ring a bell 20:24:40 Lance Bragstad proposed openstack/keystone master: Remove references to UUID from token documentation https://review.openstack.org/554581 20:25:22 but yeah, we have things that are applicable to multiple guides, 20:25:31 scope and roles feel like one of them 20:39:12 ++ multiple guides 20:40:15 Lance Bragstad proposed openstack/keystone master: Remove references to UUID from token documentation https://review.openstack.org/554581 20:40:15 Lance Bragstad proposed openstack/keystone master: Remove references to v2.0 from external developer doc https://review.openstack.org/554690 20:49:50 alright lbragstad -- I made a bunch of changes and shared the doc with you. Adding comments on the side to allow for easy communication without muddling up the already murky doc 20:50:04 checking 20:50:16 I have to drop for the night at 5PM (meetings outside of work-work) but will pick this up based on your comments lbragstad 20:57:19 I think the stable/queens neutron-grenade job is bork 20:57:38 https://review.openstack.org/#/c/548788/ 20:58:18 anyone have thoughts on https://review.openstack.org/#/c/549723 ? the problem i think is that we're not mapping to the extra column but i don't know if we want to encourage that 21:01:24 yeah it should come from extras 21:01:54 I would assume? 21:02:54 * gagehugo takes a look 21:03:42 yeah it should be an extra but i guess for federated users we're not passing arbitrary attributes in to the shadow user 21:04:19 which sort of seems fine to me but it makes our example here wrong https://docs.openstack.org/keystone/latest/advanced-topics/federation/federated_identity.html#mappings-examples 21:04:51 ah 21:05:08 yeah it should use arbitrary attributes then I guess 21:07:40 Merged openstack/keystone master: Fix api-ref for project tag create https://review.openstack.org/553422 21:20:29 hrybacki: responded inline 21:23:24 lbragstad, cmurphy: What's the response code when attempting auth with an expired token? Or trying to use an expired token? 21:23:40 401 i believe 21:23:55 or 404... i need to double check.. 21:23:55 yeah i think still 401 21:24:06 I'm just trying to decide and add to the spec what we return when a receipt expires 21:24:22 because knowing the failure was expiry would be useful 21:24:36 but if we can add that to the 401 error message that works 21:25:02 yeah - 401, just tested it 21:25:39 I'm imagining horizon flow: username+password > totp screen > wait 6 mins > hit enter > error redirect to login again 21:25:53 in that case should the user be made away the failure was expiry 21:26:06 and if so, then we need to convey that in the response :/ 21:26:56 mmm should Horizon handle a timeout like that? 21:27:14 think of when your bank kicks you off a login screen without you making any prompt at all 21:27:27 (maybe that's just my bank) 21:27:35 oh, so have the js do it? 21:27:37 Actually... 21:27:44 aye 21:27:46 yes, we'd return the expiry time in the receipt 21:28:07 horizon would know when it expires and could pass to the js that time 21:28:27 then redirect back to login before even hitting the failure 21:28:45 yeah, i'd have horizon handle that case if possible 21:28:45 yeah, that works 21:36:19 kmalloc: as a middle ground, you ok with 10mins for expiry and having it configurable should a cloud want it short/longer? 21:36:40 i'd rather it not be configurable, not my followup comment, don't worry about timing. 21:37:18 pick a timeout, go with it. 21:37:28 alright, I'll put 10 then since it's a little safer than 15, and not quite as short as 5 21:37:43 honestly i don't think it'll matter 21:37:55 remember this is only every supposed to be used from initial password -> followup 21:38:05 what usecase are you solving with 10 or 15m timeout 21:38:14 my opinion is start very low and increase 21:38:17 vs the inverse 21:38:23 * adriant nods 21:38:28 done, 5m it is 21:38:34 but answer what you're solving with the longer timeout before selecting above 5 :) 21:38:46 and then i'm on the same page as you for the reasoning. 21:39:20 kmalloc: I don't have a good reason, more just that I expect people to be silly and take too long for stuff that shouldn't and then complain :P 21:39:30 * adriant is quite cynical when it comes to users 21:39:43 i'd rather they complain and we increase it in code ;) 21:40:00 because then we can ask "why does it take you 10m to get your auth process done?" ;) 21:43:04 ack, thanks lbragstad 21:43:23 no problem 22:04:06 #endmeeting