15:00:12 #startmeeting oslo-config-plaintext-secrets 15:00:13 Meeting started Tue Sep 25 15:00:12 2018 UTC and is due to finish in 60 minutes. The chair is raildo. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:15 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:18 The meeting name has been set to 'oslo_config_plaintext_secrets' 15:00:22 #link https://etherpad.openstack.org/p/oslo-config-plaintext-secrets 15:00:34 waaa 15:00:46 raildo was faster than me this time with the link xD 15:01:01 :) 15:01:20 o/ 15:02:58 I think we can getting it started 15:03:07 #topic PTG feedback 15:03:24 bnemec, dhellmann how was the PTG for you guys? 15:03:46 Good. I think we had some useful discussions. 15:03:48 any discussion/updates about this topic on Denver? 15:04:50 Yes, although I think it mostly consisted of "this is happening, next step is implementation of the castellan driver". 15:05:03 Oh, we did decide to continue deferring the issue of mutability too. 15:05:13 Basically we're going to ignore it until someone complains. :-) 15:05:43 bnemec, yeah, that makes sense for now :) let's keep that in mind to add a note for that in the castellan driver docs later 15:05:44 sounds like a plan 15:06:52 in the tripleO side, I was remotely in the meeting, tripleo folks liked the idea of having that as a driver for castellan, but they think that we still a bit raw with the implementation details 15:07:08 and I kinda agree with that :) 15:07:39 for example, we should avoid duplicating the secrets in other places (like heat or ansible) where it could end up unencrypted, even using the castellan driver 15:08:21 to fix that one of the ideas was to bring up a temporary instance of Vault where we would store all the sensitive data, and eventually copy the encrypted database to the overcloud 15:09:28 but it's something that we'll need to spend more time during this release, and start writing some PoC for TripleO, so we can understand more how it will works 15:10:30 anything else on this topic? 15:10:49 sounds good to me 15:11:17 #topic (moguimar) Castellan driver 15:11:47 the driver works 15:11:57 I'm trying to write some unit tests to it 15:12:27 to make sure it keeps working and to have a notion of code coverage 15:12:42 +1000 15:12:52 I'm confident with the vault part of castellan 15:13:08 still reading the barbican bits 15:13:20 so... one of the ideas that we had was to write a gate job with some functional tests for it. how feasible it will be to write some functional tests for it? 15:14:00 idk, haven't write any functional tests at all so far 15:14:09 so I can't estimate 15:14:17 are we able to create a simple vault server using tempest stuff or having barbican running on tempest? 15:14:52 castellan has a vault functional test 15:15:33 and it uses pifpaf to run the vault server 15:16:01 I would love to have an idea on how we can test this driver over tempest before merge it, since we can set some next steps for a gate job for castellan during this release 15:16:03 so Castellan doesn't have any functional gates at the moment 15:16:23 the Barbican team agreed to set one up during the PTG 15:16:28 redrobot, is there any specific reason? 15:16:30 ah, great 15:16:31 so I'll be helping make that happen 15:16:48 I think for sure we'll want a Vault gate 15:17:04 and probably a Barbican gate as well 15:17:08 for Castellan->Barbican 15:17:17 I'm also planning on adding a new param for a prefix in the secret id 15:17:42 will I need a spec for that? 15:17:52 redrobot, yeah, that will bring more confidence to justify the driver work when we start working in the tripleo side of this feature 15:17:59 right now, the secret_id is generated by uuid 15:18:14 moguimar, seems like the kind of change that would be good to flesh out on a spec 15:18:38 I just need some more reading on the barbican bits of castellan 15:18:45 it is feasible on vault 15:18:45 moguimar, yeah, that's like the pattern across generation of ids across the openstack services 15:18:53 if it is feasible as well in barbican I will write it 15:19:42 what reason this prefix will be needed for? 15:19:42 so the key_manager.store() returns the secret_id 15:20:08 and the idiea is to have key_manager.store(prefix="node_xyz_") 15:20:30 to get a secret_id like "node_xyz_891273123" 15:21:26 so... shouldn't we create a resource node over secret and collect that date over there? usually I'm against to have any kind of useful data over the ids 15:21:48 that why we use uuid, so it'll be a totally random number 15:22:30 the prefix could also be the node id 15:22:47 but, let's write some spec about it, and we can keep the discussion over there :) sounds like something useful 15:23:37 it would reduce the policy files size having a single policy for all secrets from one node 15:23:54 instead of a policy for each secret of that node 15:24:29 that's all on my end 15:24:55 for this topic 15:25:14 #action moguimar will write up a spec about adding a new param for a prefix in the secret id for castellan 15:25:38 #topic Getting back to our weekly meeting or should we keep as a bi-weekly meeting? 15:25:41 if feasible in the barbican side as well 15:25:45 +1 weekly 15:25:54 the topic already say everything 15:27:21 any other thoughts? 15:28:03 I'd rather the weekly meetings as well, just trying to have the everyone's opinion on it :) 15:28:20 redrobot bnemec dhellmann 15:28:37 +1 weekly or +1 biweekly 15:28:54 I don't have a strong preference. If you think it would be helpful to meet every week that's fine with me. 15:30:01 let's come back to the weekly meetings, if we notice that we don't have enough topics to be discussing in 30 min, we can push it for bi-weekly again 15:30:01 Weekly seems like a good cadence to stay on the same page. 🤷 15:30:12 same feelings redrobot 15:30:31 or we can just skip one week 15:30:39 we've done that once 15:31:07 also, I already updated our meeting's invite to be weekly, so you guys should receive the notification every week :) 15:31:09 then if we keep skipping, we talk about going biweekly again 15:31:32 #topic Open Discussion 15:31:38 none on my end 15:31:40 anything else? 15:32:36 ok, so thank you all for you time, have an amazing week everyone! 15:32:39 #endmeeting