Wednesday, 2024-10-30

*** mhen_ is now known as mhen02:54
jovialI'm trying to use Ironic's new secure rbac functionality. Previously, I used to be able to `openstack baremetal node list` with an application credential. Now I'm forced to use `openstack baremetal node list --os-system-scope=all`, but this doesn't work with app creds: `Error authenticating with application credential: Application credentials cannot request a scope. (HTTP 401) (Request-ID: req-5771aacd-7861-4ab3-8278-976551aade72)`. Is there 12:18
jovialanyway to get this to work?12:18
TheJuliajovial: I guess we need some application credential testing13:50
TheJuliajovial: so, your trying to see *everything* or just a limited scope? What version of ironic as well?13:51
jovialTheJulia: This is 2024.1. I was trying to list all the baremetal nodes just to match the old behavior really; at present all of the nodes have the owner set to the admin project. I didn't really want to segregate them between projects i.e I just wanted one big pool of nodes.14:08
fricklerjovial: iiuc app creds carry the scope they were created with. can you create a dedicated app cred with system scope?14:21
jovialfrickler: Ahh, thanks. I will give that a try.14:24
TheJuliajovial: if owner is set, it *should* just work, but we've not explicitly tested app credentials. I wonder if the role is intact. I guess a look at the webserver application log might help14:47
jovialTheJulia, I think in this case the app cred is for a project that isn't the admin project (the one that owns the nodes)14:48
TheJuliaahh, that would do it14:49
TheJuliaAdmin in a project in ironic doesn't permit one to see everything across all projects. We're a bit strict about that because we had prior users doing some fancy policy stuffs to do filtered views14:50
TheJuliaHey, someone recently mentioned a monthly review call. When is that? Is there an agenda? etc?14:55
jovialTheJulia: Just upgraded from 2023.1 and am trying to work out how best to configure this stuff :)14:56
TheJuliajovial: understood, you *can* consider custom policy, but yeah, we took a bit of a hard stance on the default srbac behavior14:58
d34dh0r53#startmeeting keystone15:05
opendevmeetMeeting started Wed Oct 30 15:05:34 2024 UTC and is due to finish in 60 minutes.  The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot.15:05
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:05
opendevmeetThe meeting name has been set to 'keystone'15:05
d34dh0r53o/15:06
xeko/15:06
d34dh0r53    Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct15:06
d34dh0r53    #link https://openinfra.dev/legal/code-of-conduct15:06
d34dh0r53v15:07
d34dh0r53#topic roll call15:07
d34dh0r53admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe15:07
cardoeo/15:08
gtemaO/ but on travel15:08
d34dh0r53#topic review past meeting work items15:09
d34dh0r53no action items from our previous meeting, last week was PTG so we didn't have a weekly meeting15:09
d34dh0r53Thanks everyone who attended and participated in the PTG, I felt like we had some very good sessions15:10
d34dh0r53#topic liaison updates15:10
d34dh0r53nothing from release or VMT at the moment15:11
d34dh0r53#topic specification OAuth 2.0 (hiromu)15:13
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext15:13
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability15:13
d34dh0r53External OAuth 2.0 Specification15:13
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged)15:13
d34dh0r53OAuth 2.0 Implementation15:13
d34dh0r53#link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls15:13
d34dh0r53OAuth 2.0 Documentation15:13
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/838108 (merged)15:13
d34dh0r53#link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged)15:13
d34dh0r53no updates from me, I think I can allocate some time to rebase and resubmit the last remaining work for this one this week15:14
d34dh0r53'v15:14
d34dh0r53#topic specification Secure RBAC (dmendiza[m])15:14
d34dh0r53#link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_15:14
d34dh0r532024.1 Release Timeline15:14
d34dh0r53Update oslo.policy in keystone to enforce_new_defaults=True15:14
d34dh0r53Update oslo.policy in keystone to enforce_scope=True15:14
d34dh0r53we need to clean up this section of the etherpad dmendiza 15:14
d34dh0r53ok, moving on15:17
d34dh0r53#topic specification OpenAPI support (gtema)15:17
d34dh0r53#link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone15:17
d34dh0r53https://review.opendev.org/c/openstack/keystone/+/925020 could now also land to ease api-ref work15:17
d34dh0r53gtema: api-ref work started15:17
gtemaNot many updates, but we need to decide whether OpenAPI or ruff should land first15:18
gtemaBecause also I started wip work on pagination which conflicts lot with ruff reformat15:18
d34dh0r53hmm, openapi then ruff is my thinking, but that's not based on much15:20
gtemaThere are conflicts 15:21
gtemaOpenAPI itself is huge amount of changes and not all are ready 15:22
gtemaI would prefer landing ruff first15:22
d34dh0r53ok, if ruff is actually easier to land first I'm all for it, I thought that since openapi was already well in progress it would be easier to land15:23
gtemaI can't check patches now, am walking to the train15:24
d34dh0r53ok, no problem15:25
d34dh0r53we can look at the ruff stuff during the reviewathon15:25
d34dh0r53moving on15:26
d34dh0r53#topic specification domain manager (mhen)15:26
d34dh0r53still unmerged are:15:26
d34dh0r53documentation: https://review.opendev.org/c/openstack/keystone/+/92813515:26
d34dh0r53tempest tests: https://review.opendev.org/c/openstack/keystone-tempest-plugin/+/92422215:26
d34dh0r53no update from mhen_ 15:29
d34dh0r53next up15:29
d34dh0r53#topic specification Type annotations (stephenfin)15:29
d34dh0r53#link https://review.opendev.org/q/project:openstack/keystoneauth+topic:typing15:29
d34dh0r53This is just pending reviews now. I will push the remaining patches as soon as a sufficient quantity of the current ones land.15:29
* d34dh0r53 needs to review these15:30
gtemaI'll try to review remaining from the train15:31
d34dh0r53thank you gtema (Artem Goncharov) 15:32
d34dh0r53next up15:32
d34dh0r53#topic specification Include bad password details in audit messages (stanislav-z)15:32
d34dh0r53#link https://review.opendev.org/c/openstack/keystone-specs/+/91548215:32
d34dh0r53#link https://review.opendev.org/c/openstack/keystone/+/93242315:32
d34dh0r5330-Oct update: significant spec update including feedback during PTG. WIP implementation test are WIP.15:32
d34dh0r53Thanks for the update Stanislav Zaprudskiy , I haven't yet had a chance to look it over but will15:33
d34dh0r53moving on15:36
d34dh0r53#topic open discussion15:36
gtemaYou've seen first wip for pagination. Do we want spec first or just do it?15:37
gtemaOr not at all (but that would be rather bad ux)15:38
d34dh0r53I think we should just do it, it shouldn't need a spec15:38
d34dh0r53Not having it is really bad UX15:38
gtemaOk, there I fix failing tests (because of changed functionality 15:39
gtemaS/there/then15:39
d34dh0r53ack, thank you!15:40
d34dh0r53#topic bug review15:41
d34dh0r53#link https://bugs.launchpad.net/keystone/?orderby=-id&start=015:41
d34dh0r53no new bugs for keystone15:41
d34dh0r53#link https://bugs.launchpad.net/python-keystoneclient/?orderby=-id&start=015:41
d34dh0r53python-keystoneclient is good15:41
d34dh0r53#link https://bugs.launchpad.net/keystoneauth/+bugs?orderby=-id&start=015:41
d34dh0r53nothing new in keystoneauth either15:42
d34dh0r53#link https://bugs.launchpad.net/keystonemiddleware/+bugs?orderby=-id&start=015:42
d34dh0r53keystonemiddleware is good, there is some low-hanging-fruit in this repo if anyone would like to contribute15:42
d34dh0r53#link https://bugs.launchpad.net/pycadf/+bugs?orderby=-id&start=015:42
d34dh0r53pycadf has no new bugs15:42
d34dh0r53#link https://bugs.launchpad.net/ldappool/+bugs?ordterby=-id&start=015:43
d34dh0r53nor does ldappool15:43
d34dh0r53#topic conclusion15:43
d34dh0r53I don't have anything specific, thanks again for the PTG participation!15:43
d34dh0r53#endmeeting15:43
opendevmeetMeeting ended Wed Oct 30 15:43:58 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:43
opendevmeetMinutes:        https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-10-30-15.05.html15:43
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-10-30-15.05.txt15:43
opendevmeetLog:            https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-10-30-15.05.log.html15:43
cardoeWas hoping to see the OIDC check job land https://review.opendev.org/c/openstack/keystone/+/931675 and my docs update https://review.opendev.org/c/openstack/keystone/+/929315 The former being more important.15:54
*** jjung_ is now known as jjung16:35
jovialfrickler, re system scoped app creds, I did this: https://paste.opendev.org/show/bltZXrw7M8mTbi5scGEm/, which seems to have no project ID set, but even with that I can't list the baremetal nodes. Am I doing something stupid?17:31
jovialFor anyone else, the context is: https://docs.openstack.org/ironic/latest/admin/secure-rbac.html and trying to create an app cred with system scope17:33
*** amorin_ is now known as amorin17:35
TheJuliaI feel curious what the debug log has in it17:41
fricklerjovial: yes, system scope has no project associated, that part is expected, see also https://docs.openstack.org/ironic/latest/admin/secure-rbac.html#system-scoped . not sure about the roles, do you use the baremetal_* roles when using "normal" auth? also as TheJulia says debug logs from both client and server might be helpful18:08
jovialGetting late here. Will try and get some debug logs tomorrow18:27
opendevreviewArtem Goncharov proposed openstack/keystone master: Ruff the code  https://review.opendev.org/c/openstack/keystone/+/93195919:11
-opendevstatus- NOTICE: The Gerrit service on review.opendev.org will be offline momentarily at 20:30 utc (half an hour from now) to apply a configuration change20:02
-opendevstatus- NOTICE: The Gerrit service on review.opendev.org will be offline momentarily to apply a configuration change20:31

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!