Wednesday, 2021-08-25

opendevreviewCyril Roelandt proposed openstack/glance_store stable/wallaby: Add cinder's new attachment support  https://review.opendev.org/c/openstack/glance_store/+/80592602:27
opendevreviewCyril Roelandt proposed openstack/glance_store stable/wallaby: Glance cinder nfs: Block creating qcow2 volumes  https://review.opendev.org/c/openstack/glance_store/+/80592702:27
opendevreviewMerged openstack/glance master: Check policies for image import operation in API  https://review.opendev.org/c/openstack/glance/+/80459006:20
opendevreviewAbhishek Kekane proposed openstack/glance master: Move metadef property policy checks in the API  https://review.opendev.org/c/openstack/glance/+/79963506:32
opendevreviewAbhishek Kekane proposed openstack/glance master: Move metadef tag policy checks in the API  https://review.opendev.org/c/openstack/glance/+/79963606:32
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for Image Tags in API  https://review.opendev.org/c/openstack/glance/+/80458806:37
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for image tasks information in API  https://review.opendev.org/c/openstack/glance/+/80559006:37
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for Image Cache in API  https://review.opendev.org/c/openstack/glance/+/80579706:37
*** akekane_ is now known as abhishekk08:19
opendevreviewErno Kuvaja proposed openstack/python-glanceclient master: Add support for Cache API  https://review.opendev.org/c/openstack/python-glanceclient/+/80017208:37
opendevreviewRajat Dhasmana proposed openstack/glance stable/wallaby: Cinder Store: Update legacy images tests  https://review.opendev.org/c/openstack/glance/+/80596708:38
opendevreviewErno Kuvaja proposed openstack/glance master: Cache API endpoints  https://review.opendev.org/c/openstack/glance/+/79202208:39
opendevreviewRajat Dhasmana proposed openstack/glance master: Replace FakeObject with mock.MagicMock  https://review.opendev.org/c/openstack/glance/+/80597409:05
opendevreviewErno Kuvaja proposed openstack/glance master: Cache API endpoints  https://review.opendev.org/c/openstack/glance/+/79202209:14
opendevreviewMerged openstack/python-glanceclient master: setup.cfg: Replace dashes with underscores  https://review.opendev.org/c/openstack/python-glanceclient/+/78975709:22
opendevreviewMerged openstack/glance master: Get rid of deprecated xml.etree.cElementTree  https://review.opendev.org/c/openstack/glance/+/80214611:18
opendevreviewMerged openstack/glance master: tests: Remove use of 'oslo_db.sqlalchemy.test_base'  https://review.opendev.org/c/openstack/glance/+/80276211:30
*** lbragstad_ is now known as lbragstad14:39
*** abhishekk is now known as akekane|home15:08
*** akekane|home is now known as abhishekk15:08
opendevreviewRajat Dhasmana proposed openstack/glance stable/wallaby: Cinder Store: Update legacy images tests  https://review.opendev.org/c/openstack/glance/+/80596715:08
dansmithlbragstad: replied here, which I think is what abhishekk would say: https://review.opendev.org/c/openstack/glance/+/80458815:11
abhishekk++15:11
lbragstaddansmith abhishekk ack - thanks for following up 15:16
dansmithabhishekk: question for you though: https://review.opendev.org/c/openstack/glance/+/80458815:17
abhishekkadded on patch ?15:17
dansmithjust now15:17
abhishekkack15:17
abhishekkIn legacy behavior it is enforcing both policies, get_image and modidy_image15:18
abhishekkhmm, makes sense15:19
dansmithwhere?15:20
dansmithI didn't see it in auth or policy15:20
abhishekkline no #51 will enforce get_image and image.save will call modify_image I think15:21
dansmithoh I see you just mean because of the implicit db check15:22
dansmithbut same for image, yet we're not doing that double check15:22
abhishekkyeah15:23
dansmithtoday if someone wants to grant someone tag ability, they have to grant them get and modify,15:23
dansmithafter we fix that by making the db not override our checks,15:23
dansmiththat person would be granted the same amount of privilege, but it will be more than they need, so nothing will break15:23
dansmithyet an operator *could* reduce their privilege after the change15:23
dansmithso I don't think that we're breaking anything by enforcing the policy we want here15:23
abhishekkyep, make sense15:24
dansmithI think the test will be the same since you're asserting the 404 behavior which we should still get15:24
abhishekkyes15:25
abhishekkdansmith, apart from current patches we will need a releasenote patch15:26
dansmithfor this specific change?15:27
abhishekkno, no for all work we have done15:28
dansmith...for all the policy work15:28
dansmithare you thinking we need to be super detailed about that or just say "we've moved to policy enforcement in the API so some details may have changed?15:29
abhishekkno, small one with additional note about legacy behavior is maintained if RBAC is not enabled 15:30
dansmithokay, I think that I've also learned as part of this that we're not as close on rbac as I thought we were, because of all the other checks,15:31
dansmithso maybe just one that says "We're in the middle of a policy refactor. Some things are more flexible than they were, especially if RBAC is enabled, but not everything is possible that should be. And if rbac is disabled we're largely still enforcing the legacy admin-or-owner on most everything." ?15:32
abhishekksounds good15:33
dansmithI'm assuming you're telling me this so I'll write it? :)15:34
abhishekk:D15:35
abhishekkI need to rebase all patches on image tags and then secure-rbac rebasing on metadef patches so that croelandt can look at those before going on leave15:36
opendevreviewDan Smith proposed openstack/glance master: Add release note about policy-refactor  https://review.opendev.org/c/openstack/glance/+/80601715:39
dansmithabhishekk: something like that? ^15:39
abhishekksuperdan15:39
dansmithfor writing some words? more like clark dan.15:41
abhishekknope, for perfection 15:41
abhishekklooks perfect15:42
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for Image Tags in API  https://review.opendev.org/c/openstack/glance/+/80458815:52
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for image tasks information in API  https://review.opendev.org/c/openstack/glance/+/80559015:52
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for Image Cache in API  https://review.opendev.org/c/openstack/glance/+/80579715:52
* abhishekk going for dinner15:52
abhishekkare we going to give another crack at remaining reviews today17:33
croelandtI think I reviewed all the policy refactoring patches (except one)17:36
croelandtI can do another pass in a few hours before going to bed17:37
abhishekkack17:40
abhishekkI will keep ready rbac patches for you by tomorrow17:41
croelandtI see 11 of them with a conflict right now :/17:48
abhishekkignore glance-tempest-plugin at the moment17:50
abhishekkI have 5 rebased in local just waiting for metadef policy related stuff to get merged17:51
dansmithabhishekk: I thought you were going to stack them all remaining so we could get them in one order?17:51
abhishekkimage related are stacked17:52
dansmithokay, and lbragstad had a question on one but I see you answered17:52
abhishekkare you talking about metadef RBAC ?17:52
dansmithno17:52
abhishekkyes17:53
dansmithcroelandt: you were +2 on this before, abhi removed one duplicate check for me, but probably an easy re-ack: https://review.opendev.org/c/openstack/glance/+/80458817:56
abhishekklbragstad, around ?17:56
dansmithabhishekk: the cache image policy refactor is going to conflict with the cache api patch itself18:06
dansmithI assume you want to merge the refactor now in case the api patch doesn't make it or something?18:07
abhishekkcorrect18:07
dansmithokay18:07
lbragstadabhishekk o/18:32
abhishekklbragstad, In glance-tempest-plugin I need to create namespace for two different projects18:33
abhishekkSo can I use DynamicCredentialProvider to create two diffetent clients ?18:33
lbragstadabhishekk i think gmann baked that into tempest18:35
lbragstadso - you can use the credentials class attribute to have tempest create the clients for you 18:35
abhishekkok, need to look out for that as well18:36
lbragstadlet me see if i can dig up the documentation now 18:42
lbragstadhttps://docs.openstack.org/tempest/latest/keystone_scopes_and_roles_support.html18:43
lbragstadhttps://docs.openstack.org/tempest/latest/keystone_scopes_and_roles_support.html#project-scoped-personas18:43
croelandtdansmith: I'm not the biggest fan of gerrit, but being able to compare 2 specifc patchsets is a fantastic feature18:44
dansmithyup18:44
lbragstadabhishekk i think you could use that to wire up the clients for different projects so you can create different namespaces in each 18:45
abhishekklbragstad, ack, looking18:46
lbragstadhttps://paste.opendev.org/show/808319/ is a really rough example18:51
abhishekklooking18:51
lbragstadif you want two different project clients18:51
lbragstadto test tenancy18:51
abhishekkyes18:52
abhishekkthis could be helpful18:52
*** timburke_ is now known as timburke20:27
abhishekkdansmith, we still have two patches remaining for metadef policies, when you get time please have a look20:37
*** timburke_ is now known as timburke20:55
opendevreviewAbhishek Kekane proposed openstack/glance-tempest-plugin master: WIP Add protection testing for metadef namespaces  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80090220:55
abhishekklbragstad, just wip, I guess this can be refactored aw well20:56
abhishekkPlease have a look when you get time20:56
dansmithabhishekk: I know, I'm trying!21:03
abhishekksorry for pushing so much21:03
* dansmith cowers from abhishekk's whip21:04
abhishekklol21:04
abhishekki definitely need to work on my looks :P21:05
dansmithlbragstad: https://review.opendev.org/c/openstack/glance/+/799635/19..21/glance/api/v2/metadef_properties.py21:21
dansmithlbragstad: did I misunderstand your intent on the previous set?21:21
lbragstaddansmith no - i dont' think so 21:22
lbragstadi was concerned about running the same check N times when it wouldn't change 21:22
dansmithyeah, same, okay21:22
dansmithabhishekk: was that a misunderstanding or did you remove it entirely for some other reason?21:23
abhishekkdansmith, I remove it entirely21:23
abhishekkearlier we were checking each property in a loop with .check('get_metadef_property') whereas now making single check outside loop does not sounds correct 21:25
dansmithabhishekk: why? The way you have it, they can't show the individual things but they can see them in index right? that's not right21:26
dansmithlike, I can do a list and see them all, but if I try to show one of those directly, I'll get a 40321:26
abhishekkshow is different call right?21:26
abhishekkfor example namespace property index call returns 5 properties for namespace A21:27
dansmithyes, but aren't we including the full property in the index?21:27
abhishekkif I do a get_property check then it will return empty list to me21:28
abhishekkbecause it will fail for all, as it belongs to one namespace only21:29
abhishekkor may be I am confused now :/21:29
dansmithabhishekk: L120 will cause show to return 403 if I'm not allowed, I won't see an empty list right?21:30
dansmithso if I'm not allowed to see them, I would expect the index to also not show them to me (i.e. advertise that I could show them, which I can't)21:30
abhishekkjust a minute21:30
dansmithcan I just remind everyone that I hate the metadef api? kthx.21:31
abhishekkdansmith, ack21:33
abhishekkthese metadef policies are useless21:33
abhishekkBut are we not changing behavior here?21:34
abhishekkearlier in index api call we were not checking for individual checks21:34
abhishekkin case of image we are excluding that from the list21:35
abhishekkbut now in case of metadef we are going to raise 403 or just catch that and return empty list to user?21:35
dansmithidfk, I'm sick of caring about it21:40
dansmithyou're saying that nowhere in policy or auth are we currently checking get_ policy yeah?21:41
abhishekkfor index call, no21:42
dansmithaight21:42
abhishekkmy brain will explode now 21:47
* dansmith schedules an extra beer for this evening21:47
* abhishekk cheers21:51
opendevreviewAbhishek Kekane proposed openstack/glance-tempest-plugin master: WIP Add protection testing for metadef namespaces  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80090222:02
* abhishekk signing out for the day22:03
dansmithyou mean signing out for yesterday22:03
abhishekk:D22:04
abhishekkneed to add recheck on tasks info patch, tempest failed on it after 3 hours :/22:06
dansmithugh22:07
dansmithI will try to check on those once more before my eod22:07
abhishekkcool, thank you22:08
gmannabhishekk: yes, as lbragstad mentioned. you can request different type of token clients within tests - https://github.com/openstack/tempest/blob/master/tempest/lib/common/cred_provider.py#L51-L10722:38
abhishekkgmann, ack22:39

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!