Tuesday, 2025-03-11

alvinstarrThis mornings dumb question.13:34
alvinstarrI am trying to create a new role that is only allowed to create users and projects.13:34
alvinstarrIt looks like that is a build time as opposed to a run time configuration thing.13:34
alvinstarrHow/where would I build the rules for this new role?13:34
noonedeadpunkhey13:35
noonedeadpunkalvinstarr: I think what you're looking for is a domain manager13:35
noonedeadpunkwhich should be available in recent releases out of the box13:35
noonedeadpunkhttps://docs.openstack.org/keystone/latest/admin/service-api-protection.html#manager13:36
noonedeadpunkso pretty much your user need to have a `manager` role assigned to a specific domain13:36
noonedeadpunkbut eventually, defining privileges for new roles is done through overrides of policies13:44
noonedeadpunkosa contains variables for each service to define overrides to apply to the service, but you'd need to pretty much write rules you want/need there13:45
alvinstarrThanks.13:47
alvinstarrI think your right the manager role will work for me.13:47
alvinstarrI just need to get a better handle on role assignment and management as it stands currently.13:47
noonedeadpunkalvinstarr: but that works best in multi-domain envs. ie, you create a domain for "customer" and assign a manager there for "self-service"13:52
noonedeadpunkalso - last time I checked, Horizon was not supporting that nicely13:52
alvinstarrWe may be able to get away with the default domain.13:58
alvinstarrI just did not want to hand out complete admin control to the software that will be creating customer accounts and projects13:58
noonedeadpunk++14:04
noonedeadpunk#startmeeting openstack_ansible_meeting15:01
opendevmeetMeeting started Tue Mar 11 15:01:24 2025 UTC and is due to finish in 60 minutes.  The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot.15:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:01
opendevmeetThe meeting name has been set to 'openstack_ansible_meeting'15:01
noonedeadpunk#topic rollcall15:01
noonedeadpunko/15:01
noonedeadpunk#topic office hours15:05
noonedeadpunkso I didn't do much again last week... though, I should be getting more time15:07
noonedeadpunkand planning to focus on molecule testing for plugins 15:08
noonedeadpunkso https://zuul.opendev.org/t/openstack/build/77addcef55d64976ab2ed4d38d6ae22a already fails with permission denied and not connection dropped15:08
noonedeadpunkso potentially jsut re-enabling root account there might help15:09
NeilHanlon👀15:09
NeilHanlono/15:09
NeilHanloni'm not late, you're early! /s15:09
noonedeadpunkhave I messed up with timezones?15:10
NeilHanlonno I'm just all screwed up from daylight savings + travel 15:10
noonedeadpunkwell, I'm really tend to screw daylight savings..15:11
noonedeadpunkNeilHanlon: any news on rocky 10?15:11
noonedeadpunkor whatever...15:12
noonedeadpunkany news on gluster?:)15:12
noonedeadpunkon the weekend I made a role for encryption of sensetive data in osa with ansible-vault15:15
noonedeadpunktogether with some testing, to the ops repo15:16
NeilHanlonno news yet on rocky 10, but i think I told people this weekend we were targeting early/mid April for a beta15:16
NeilHanlonas for Gluster... https://copr.fedorainfracloud.org/coprs/neil/glusterfs/build/8750388/15:16
NeilHanlon(that's really why I was late lol)15:16
noonedeadpunkI think this can be smth we can just generally suggest as basic thing on how to secure storage of openstack_deploy folder 15:17
NeilHanlonI will maintain it. :) probably in EPEL 10, if I can manage to do it15:17
noonedeadpunkoh, that would be really nice...15:17
noonedeadpunkI have no idea about gluster audience... but I believe it must have some except us, right?15:18
NeilHanlonthat makes sense noonedeadpunk re: secrets. I'd been also thinking about how we could incorporate SOPS (https://www.cncf.io/projects/sops/)15:18
noonedeadpunkah, yes, we actualyl do use sops here15:18
noonedeadpunkwith osa15:18
NeilHanlonoh nice :D15:18
noonedeadpunkso it's more then doable15:18
NeilHanloni only learned about SOPS at Cfgmgmtcamp this year15:19
noonedeadpunkone thing I hate about sops, or well... one of things...15:19
noonedeadpunkis that either it's very annoying to maintain if you're using GPGs15:19
noonedeadpunkor weird if you use remote transport like vault15:19
noonedeadpunkbtw this year on cfgmgmt I learned about https://github.com/cyberark/conjur#rotators15:20
NeilHanlonahh. yeah I can see that being difficult15:21
noonedeadpunkanother thing I learned about sops - it's tricky to make it idempotent, as naturally sops will agree to double/triple/quadrople encrypt the same file15:21
noonedeadpunkinstead of detecting that it's already encrypted15:21
NeilHanlon"security"15:21
NeilHanlonlol15:22
NeilHanlonthat seems a bit broken, IMO15:22
NeilHanlonconjur looks interesting...15:22
noonedeadpunkbut in fact I'm not sure what exactly sops accomplishes comparing to ansible-vault except being annoying15:23
noonedeadpunkas one who has gpg in file encryption still able to decrypt file version anytime after if it has it locally15:24
noonedeadpunkso most trivial usecase - employee was let go and we want prevent them to access secrets is not done with sops...15:25
noonedeadpunkand ansible-vault is way more trivial....15:25
noonedeadpunkbut dunno15:25
noonedeadpunkprobably the usecase, is have GPG only for non-interactive sessions, like Ansible, and then rest go through vault15:26
noonedeadpunkregarding sops implementation - given we have an ansible-vault as a reference, I will suggest my company to track sops implementation as smth we want to contribute to15:30
damiandabrowskiSOPS will refuse to encrypt yaml files multiple times15:32
damiandabrowskibut for text files...yes, it's a bit annoying15:32
noonedeadpunkansible-vault will refuse for text files as well ;)15:33
noonedeadpunkthe patch I'm talking about : https://review.opendev.org/c/openstack/openstack-ansible-ops/+/94386615:33
noonedeadpunkand then I'd love to start looking into EL10 in upcoming weeks...15:34
noonedeadpunkand one potential things, but it's probably for the PTG - if we wanna bring back freezer role15:36
noonedeadpunkI do have quite working role for deployment15:36
noonedeadpunk#link https://github.com/noonedeadpunk/openstack-ansible-os_freezer15:36
noonedeadpunkbut it's not deploying freezer-scheduler yet - waiting for merging blueprint to be able to run it centrally rather then on clients only15:37
NeilHanlonI'm gonna try to start taking a look at OSA for c10s in the coming weeks, too. especially the modular libvirt stuffs15:41
NeilHanlonI am done travelling for a little while so I can actually focus on some stuff15:41
noonedeadpunkthat part is indeed most concerning one15:41
noonedeadpunkas I have actually no idea how that does work15:42
noonedeadpunkor well: 1. what we need to start 2. what we don't need to start 3. How to control TLS/non-TLS now15:42
noonedeadpunkand third one is the most unclear so far...15:43
noonedeadpunkas doing ansible is trivial if you know what needs to be done...15:43
NeilHanlonhttps://libvirt.org/daemons.html at least seems pretty verbose about the changes, on it's face15:44
NeilHanlonagreed TLS is the most ambiguous right now15:45
noonedeadpunkSo right now we have quite some logic around libvirtd-tcp.socket and libvirtd-tls.socket and switching back-forth15:46
noonedeadpunkand I don't understand to what it does translate tbh15:46
NeilHanlonI will take that on, to disambiguate our config and what we're doing with the monolithic daemon15:47
noonedeadpunkSo apparently we need virtqemud, but then... virtinterfaced? virtnetworkd? virtnwfilterd? virtstoraged?15:48
noonedeadpunkprobably it transitions to virtproxyd-tls.socket?15:48
noonedeadpunkyeah, I guess it's virtproxyd-tcp.socket / virtproxyd-tls.socket15:49
NeilHanlonyeah, i think so15:49
noonedeadpunkbut somehow amount of things we'd need to control now increased dramatically15:50
noonedeadpunkand how to restart them in proper order on upgrade :D15:51
NeilHanlonyeah, there's a bunch more daemons to start or enable now, basically15:51
NeilHanloni will chat with the libvirt packagers for fedora and see what I can glean15:54
noonedeadpunkthat can be extremely helpful :)15:55
NeilHanlonat a glance, it appears the libvirt packaging takes care of restarting during upgrade15:55
noonedeadpunkoh rly?15:55
noonedeadpunkas I got used that in RH world that's responsibility of user15:55
NeilHanlonhttps://src.fedoraproject.org/rpms/libvirt/blob/rawhide/f/libvirt.spec#_168415:56
NeilHanlonanyways, i can ask and translate from the spec for what services it does and doesn't reload 15:57
NeilHanlonor restart15:57
NeilHanloncause that's a pretty dang verbose specfile...15:57
noonedeadpunkbut this somehow looks like monolythinc one to me https://src.fedoraproject.org/rpms/libvirt/blob/rawhide/f/libvirt.spec#_177115:57
noonedeadpunkbut can be wrong15:58
noonedeadpunkbut actually I think it answers the question on order!15:58
noonedeadpunkok, thanks! That;s indeed a good read for me15:59
noonedeadpunkand it all might be easier then expected15:59
NeilHanloni hope so! lol15:59
NeilHanloni will still reach out to the maintainers via email and ask for some guidance16:00
noonedeadpunksounds good, thanks!16:00
noonedeadpunk#endmeeting16:00
opendevmeetMeeting ended Tue Mar 11 16:00:33 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:00
opendevmeetMinutes:        https://meetings.opendev.org/meetings/openstack_ansible_meeting/2025/openstack_ansible_meeting.2025-03-11-15.01.html16:00
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/openstack_ansible_meeting/2025/openstack_ansible_meeting.2025-03-11-15.01.txt16:00
opendevmeetLog:            https://meetings.opendev.org/meetings/openstack_ansible_meeting/2025/openstack_ansible_meeting.2025-03-11-15.01.log.html16:00
NeilHanlonThanks for running noonedeadpunk! :) (as always ;))16:00

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!