Wednesday, 2021-09-01

opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Implement API protection testing for metadef objects  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80279305:27
opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Implement API protection testing for metadef resource types  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80279205:27
opendevreviewAbhishek Kekane proposed openstack/glance-tempest-plugin master: [DNM] Refactored - Add protection testing for metadef namespaces  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80684907:00
*** yoctozepto1 is now known as yoctozepto07:49
opendevreviewMridula Joshi proposed openstack/glance master: Add doc support for delete-from-store API  https://review.opendev.org/c/openstack/glance/+/80618010:30
opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Add protection testing for metadef namespaces  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80090213:09
opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Implement API protection testing for metadef objects  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80279313:09
opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Implement API protection testing for metadef resource types  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80279213:09
opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Implement API protection testing for metadef properties  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80279413:09
opendevreviewPranali Deore proposed openstack/glance-tempest-plugin master: Implement API protection testing for metadef tags  https://review.opendev.org/c/openstack/glance-tempest-plugin/+/80279513:09
abhishekk@all cores, I am giving nod for python-glanceclient Xena release, 14:57
abhishekk#link https://review.opendev.org/c/openstack/releases/+/80658614:57
abhishekkI will not be around tonight due to some medical urgency, signing out for the day, reachable via e-mail15:03
*** erbot_ is now known as erbot__15:09
*** erbot__ is now known as erbot___15:09
*** erbot___ is now known as erbot____15:09
*** erbot____ is now known as erbot_____15:09
*** erbot_____ is now known as erbot______15:09
opendevreviewMerged openstack/glance master: Check policies for Image Cache in API  https://review.opendev.org/c/openstack/glance/+/80579716:20
dansmithlbragstad: is there any reason not to make all these metadef persona things system scope only?16:47
lbragstadseems reasonable to me 16:47
lbragstadsince they seem admin-only 16:47
dansmithwe've been saying admin-only for the change interfaces, and I'm not sure we need a project affiliation for those to create namespaces for project16:47
dansmithand we only enforce the scope if some flag is set, right?16:47
lbragstaddepending on how the check string is written 16:48
lbragstadif the check str is role:admin and system_scope:all then scope will ultimately enforced or checked regardless of the enforce_scope option16:49
dansmithoh I thought the scope was not a check string thing16:49
dansmithI thought it was based on scope_types16:49
lbragstadyes - it can be 16:49
lbragstadif you do role:admin 16:49
lbragstadand scope_types = ['system', 'project']16:50
lbragstadthen project-admin and system-admin can access that API 16:50
lbragstadif enforce_scope = False16:50
dansmith...right, what I meant was.. remove project from that list16:51
lbragstadoh - yeah 16:51
dansmithscope_types=system only16:51
lbragstadi think that would allow project-admin to access it until enforce_scope=True16:51
dansmiththen if enforce_scope is on, it's only system admins. .right16:52
lbragstadyes 16:52
dansmithwhat does role:admin mean if enforce_scope=True and scope_types=system?16:52
dansmithI was thinking maybe this would let us massively simplify our rules and our tests16:52
lbragstadscope_types = ['system'] means that the context object must be system-scoped16:53
lbragstador derived from a system-scoped token16:53
dansmithright16:53
dansmithbut do all system scope people have role:admin ?16:53
lbragstadno16:53
dansmithI guess not, but probably in practice they would right?16:53
lbragstadinitially, yes16:54
lbragstad$ openstack role add --user dansmith --system all admin 16:54
dansmithlater you could have scope=system,role:metadefadminguy16:54
lbragstadwould mean you could do metadef things16:54
dansmithI guess we're still doing rule:metadef_admin and most of the test complexity is around the user view stuff so I guess just restricting to system scope doesn't do much for us16:55
dansmithbut seems like having project scope in scope_types is probably not really what we want16:56
lbragstadyeah - i think we'd need to make sure glance can hanlde a system scoped token16:59
lbragstadand then see if we can move metadef_admin -> system-admin16:59
opendevreviewMerged openstack/glance master: Add release note about policy-refactor  https://review.opendev.org/c/openstack/glance/+/80601717:05
dansmithack17:07
pdeoredansmith, test_reload is still failing on rbac metadef namespaces patch and passing on all dependent patches.. 19:34
pdeoreany idea why this is so? rush in gate ?19:35
dansmithpdeore: okay I hadn't noticed.. surely it's not related though right?19:35
pdeoreyeah19:36
dansmithyeah, not sure.. could be load related although surprisingly the gate doesn't seem super busy at the moment19:37
dansmithand obviously I wouldn't expect your patch to be related, although it does seem to reload some policy on restart, but I would think all the above patches would be hit as well19:38
dansmithI'll run it locally a bunch and see if I can poke it to fail;19:41
pdeoredansmith, yeah the above patches would have hit too, not getting whta exactly happening..19:44
dansmithI think it's luck.. what do you do in india for good luck? :)19:44
pdeoredansmith, :D don't know .. because my luck is not good always :P19:46
dansmithhah19:46

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!