Thursday, 2024-10-10

*** mhen_ is now known as mhen01:56
gtemacardoe, I think you need to describe your issue differently, I do not get what you mean/want to achieve. Manager role is a very special one with different meanings being granted on domain and on project. Actually there is big difference granting role on project(s) and on domain04:53
TheJuliao/ Hey Guys, is https://etherpad.opendev.org/p/oct2024-ptg-keystone the right etherpad?06:33
gtemaTheJulia yupp06:41
noonedeadpunkgtema: manager though implies member iirc06:44
noonedeadpunkso if you assign it - you should also get member stuff06:44
gtemanoonedeadpunk, yes, my statement was about different fact (scoping)06:44
noonedeadpunkoh, yes, scoping is very different indeed06:45
noonedeadpunkbut it should not be about role assignment, rather how you issue a token06:45
gtemaWrong, assignment of manager role on domain doesn't give you manager on project, independent on what you request06:46
* noonedeadpunk reading statement again06:47
noonedeadpunkok, yes, you're right06:47
noonedeadpunkor well06:47
noonedeadpunkshould not you get member on project if you assing manager inherited?06:48
noonedeadpunkand manager on domain will come with that as well?06:48
noonedeadpunkand then - it's only about how you issue a token?06:48
gtemaMy point is that cardoe seems to mix few different things in his statement and I want to get precise description of what he wants to achieve06:48
noonedeadpunkso "had manager on a domain but it wasn't inherited" seems as a right description of the issue - if it's inherited it should work06:49
gtemaI just don't want to speculate about something what feels like wrong understanding of what person is trying to reach 06:49
TheJuliaI think business folks perceive domain manager gives self service rights to view/manage resources under projects, so if that spreads *outside* of keystone (which is possibly they way customers might percieve it), then projects which need to or might be able to support that access translation, it would be helpful to streamline the calls/interaction.06:57
TheJuliaI also realize this is likely still being "designed"06:57
TheJuliaahh, I see the earlier manager role discussion06:58
TheJuliabut relates nicely06:58
opendevreviewArtem Goncharov proposed openstack/keystone master: Ruff the code  https://review.opendev.org/c/openstack/keystone/+/93195907:03
TheJuliagtema: just a gentle reminder, if cardoe is coming with a perception, he has others behind him with the same perception. He is just the bearer of operator perception, and thus with greater weight of urgency for community to remedy disconnects and perception challenges.07:05
gtemarepeating myself again: I ask him to rephrase what is he willing to achieve in details without mixing different concepts in a single question. I want to help, but this is ONLY possible once I understand what the person is doing07:06
TheJuliaIt is a two way street. I'm just pointing out that others likely have the same perception, and you both need to work to mutual clarity.07:09
gtemabelieve me I know07:10
noonedeadpunkTheJulia: that statement feels quite off, sounds like cardoe is _the only_ operator around which should be prioritized over other operators07:10
noonedeadpunkI don't feel the same way, that ones should be percepted in a different way then others07:11
TheJuliaOh, to be clear, all operators. I just know from other discussion he is trying to move various items forward with quite a bit of urgency.07:11
gtemapeople - please STOP. Do not speculate07:11
opendevreviewArtem Goncharov proposed openstack/keystone master: Ruff the code  https://review.opendev.org/c/openstack/keystone/+/93195910:00
opendevreviewArtem Goncharov proposed openstack/keystone master: Ruff the code  https://review.opendev.org/c/openstack/keystone/+/93195910:35
cardoeHello all. Sorry I missed the convo it was the middle of the night for me.12:00
opendevreviewArtem Goncharov proposed openstack/keystone master: [WIP] Add new keystone.wsgi module  https://review.opendev.org/c/openstack/keystone/+/93206012:03
cardoeSo I know we (code maintainers) often get zero context in bug reports or questions and it's frustrating so I apologize for not providing enough. I was trying to keep it brief since it was the project team meeting. Somewhere deep in the scroll back when I first asked about OIDC is the full context but no one ever replied to me save for a few folks private messaging me about their setups.12:05
cardoeSo today our usage (and this is just my area of focus and not all usage) of Ironic and other bits of OpenStack are run more like bifrost (and some are actually bifrost) where there is no Keystone. Users aren't really hitting the Ironic API directly. Things have grown up around all this and business processes and tools live atop this.12:10
cardoeIn my role now I own a bunch of those systems and the folks that maintain them and so being the evil PHB that I am I've asked "Why's this all not just OpenStack?"12:12
cardoeI'm clearly oversharing here but just hoping this makes it a bit smoother.12:13
cardoeThe organization I'm talking about is Rackspace. I know a bunch of folks here have had some interaction with Rackspace whether it's working for them or dealing with people working for them so I recognize there's some attached feelings here as well.12:14
cardoeAnd again I'll over share.... Rackspace has this weird attitude internally towards OpenStack as well in that its something to be avoided. Sure you've got the James Denton and Kevin Carter's but they're off in our literal internal OpenStack org. While I'm what's called "main line org".12:18
cardoeKeystone is a funny one for Rackspace as well. Since it really grew up from Rackspace. It's Rackspace's "customer identity" system. But Rackspace doesn't use Keystone afaik. I think it's a Java implementation and it's only using v2. However a lot of the v3 functionality is implemented as extensions on v2.12:20
cardoeSo outside of the OpenStack org, we're clueless as to what real Keystone does. So I'm just tinkering on a keystone.12:21
cardoeI know I mentioned "3 operators are using websso". I'm not counting Rackspace in those 3. I'm counting Vexxhost because that's where the code is hosted. And then 2 others that have messaged me and told me about it when I asked my original OIDC questions.12:22
cardoeSo what I'm trying to achieve is that we have this system CORE (for those former Rackers) where there are accounts which are buckets that hold different types of hardware.12:24
cardoeVery high-level it sounds to me like those are OpenStack projects and devices can be assigned to them.12:25
cardoeBut these accounts don't have users for them. Our employees manipulate them and they have access to it through Microsoft Entra (I think that's the name for their Azure hosted Active Directory now).12:26
cardoeIf you're a member of group X you can do A, B, and C to all CORE accounts. And you'll gain that permission automatically for any new ones created.12:27
cardoeBut it's not really all CORE accounts because there's ACLs. We've got name prefixes on accounts and then different groups are done that way.12:29
cardoeThen there's some accounts that have a name prefix and a suffix.12:30
cardoeBut the prefix determines what ACL group that should be in. It's a lot like https://opendev.org/openstack/project-config stuff where it's not really automatic, someone has to make a git commit to add it to that group.12:31
cardoeBut from my high-level it looked like these accounts could map to Keystone via Domains for the prefix and then sub-projects are the accounts with suffix12:36
cardoeBut I wanted to make the permissions work the same way. So it would be all projects in a domain are allowed to be touched by users with access to that domain12:37
cardoeSo I'm just tinkering. I'm also messing with the manager role like TheJulia talked about. And yeah I perceived that manager meant more than just to Keystone. So I gave myself manager in my test Keystone. Forgot about it when I had an issue with the project permission inheritance.12:40
cardoeI asked if my understanding of inheritance was correct because it wasn't working for me. I read the docs and things weren't clear at all. So I asked.12:43
cardoeNo one really knew and told me I needed to ask specific people. Which I hope we can agree isn't ideal. Then I was suggested to try an API endpoint. So I was reporting back that yes that API endpoint works. This was the CLI command that pokes it. My issue was a misconfiguration on my part. It was just suppose to be a thank you to close the loop.12:45
cardoeSo I'm trying to use OIDC which will get the groups claim to give people permissions to domains and by extension projects. I fully expect we'll be writing custom roles and custom policies.12:48
cardoeAs part of the overall effort I'm pushing my people to contribute back to OpenStack. I'm seeing a lot of forks or downstream work without a lot flowing back up. I think the overall OpenStack project is seeing the same with the number of contributors going down each year for the past few years. So I'm trying to help reverse that trend.12:54
cardoeI'm personal friends with a number of folks at different infrastructure operators that I know use OpenStack and so I'm challenging them to contribute back. I've been met with a lot of "you do it and tell me how it goes"12:56
opendevreviewArtem Goncharov proposed openstack/keystone master: [WIP] Add new keystone.wsgi module  https://review.opendev.org/c/openstack/keystone/+/93206012:57
cardoeAnd if I'm being honest it's been quite a mixed bag. Some projects have said "hey thanks for your contribution but it's wrong cause XYZ" and some have been quite the cold shoulder. I've been told that I won't get a +2 from a commit from an @rackspace.com email address so you'll notice I don't contribute patches from that address any more.12:58
cardoeThe folks that work for me all don't contribute patches from their rackspace emails.12:58
cardoeI listen to the prior TC and the talk about more diversity and getting more contributors and I totally agree. And then when the actual encounter meets the projects there's a difference.12:59
cardoeMy people's complaint has been that OpenStack doesn't feel like regular Python development. It's all different tooling and conventions and such.13:00
cardoeSo my push has been to try and get more contributors and more operator contributors and making it easier from a dev experience. A couple people told me I should throw my hat into the TC election on that platform so I did.13:01
cardoeLast bit of context to the whole convo I think is my 1 docs patch to Keystone.13:01
cardoegtema: you told me you have an issue with my patch because countless others have figured out how to use it just fine. That seems problematic to me overall because it raises the bar to entry. I've not been the only person asking in here about OIDC configuration issues. There's someone on the ML having SAML configuration issues as well.13:03
gtemacardoe: thanks for clarification. I asked for more clarifications because I have not properly understood the message in your "report"13:04
gtemaI strongly suggest you to join PTG Keystone meeting on federation. There are so many things there that people are just not aware of13:04
cardoeThe docs today say "we're gonna use Google as an example. Here's a blob of config to use." They define what some of the options are or mean. So I went and added descriptions to the other options.13:05
gtemalook, the problem is: the doc as well as the implementation were mostly done by people with half a knowledge in the topic and as such it is simply terribly wrong13:05
gtemait works, yes, but it is simply wrong to go this way on my personal opinion after spending more then a year deep in the federation topic13:06
cardoeLastly the mapping docs (so different page from the federation config) say that any list based data must be delimited by a ; but the default in mod_auth_oidc is to use a , so I added the config option to use ;13:06
cardoeI won't disagree with you. It seems awkward with an Apache module and it not being native to keystone. I'm all for helping land better support. BUT I just want to document how the code works today at the same time.13:07
gtemathanks. I hear first time the detail that mod_auth_oidc defaults_to ",". I think if you would have mentioned this in your change it would give some hints to why. Second is that there are some tests with keycloak federation that work now (as well as real deployments), so without adding more tests proving things are working is also necessary.13:12
cardoeTo what TheJulia said about urgency. A couple of us have stuck our necks out in advocacy of OpenStack in a less than friendly to OpenStack environment and we've gotta start showing the benefits and proving the naysayers wrong. We've rejoined OpenInfra and have had folks attend events again so the start of the investment from us is there. We just need to show some progress to continue the investment.13:12
cardoeSo I'm trying to make things happen today with code that exists today.13:13
gtemaIn the current state it looks to me like: I have tried something out and found that it doesn't work for me the described way, so I propose to change the doc without proving I myself did the things right way (disclaimer - no offence) 13:13
cardoegtema: I literally put that in the commit message.13:14
gtemaI do not read it this way13:14
cardoeit uses a comma as its delimiter by default. But keystone uses ; as it's delimiter when using a field in a mapping as a list. So the user must configure mod_auth_openidc to use a ; instead of a ,13:15
cardoeThat's copy and paste.13:15
gtemaok, after you pointed that and I literally re-read the sentence few times I see where you mean it13:15
TheJuliacardoe: Thank you for that level of detail, honesty and clarity. I just want to ensure you understand your not the only person or even operator I'm hearing similar concerns/issues/frustrations and ultimately needs from. The words are a little different, but the overall need, intent, and challenges aligns with slightly different details.13:22
cardoeI appreciate it. Overall I want to see OpenStack be successful and do my best to help the project.13:33
opendevreviewMerged openstack/oslo.policy master: Add timeout in HTTP requests  https://review.opendev.org/c/openstack/oslo.policy/+/91474013:47
opendevreviewMerged openstack/oslo.limit master: Query endpoint id from keystone  https://review.opendev.org/c/openstack/oslo.limit/+/91478313:55
opendevreviewArtem Goncharov proposed openstack/keystone master: [WIP] Add new keystone.wsgi module  https://review.opendev.org/c/openstack/keystone/+/93206015:11
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON schema to `trust` and validation decorators to trust resource.  https://review.opendev.org/c/openstack/keystone/+/93036119:31
opendevreviewOria Weng proposed openstack/keystone master: Add JSON schema to `limits`  https://review.opendev.org/c/openstack/keystone/+/93152819:42
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON schema to `service provider` and validation decorators to service provider resource.  https://review.opendev.org/c/openstack/keystone/+/93061019:47
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON schema to `identity provider` and validation decorators to identity provider resource.  https://review.opendev.org/c/openstack/keystone/+/93063320:45
opendevreviewAntonia Gaete proposed openstack/keystone master: Add JSON schema to `trust` and validation decorators to trust resource.  https://review.opendev.org/c/openstack/keystone/+/93036120:59

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!