Wednesday, 2016-12-21

*** ducttape_ has quit IRC00:01
*** ducttape_ has joined #openstack-meeting-cp00:32
*** harlowja has joined #openstack-meeting-cp01:06
*** ducttape_ has quit IRC01:10
*** ducttape_ has joined #openstack-meeting-cp01:11
*** ducttape_ has quit IRC01:15
*** ducttape_ has joined #openstack-meeting-cp01:37
*** harlowja has quit IRC01:44
*** ducttape_ has quit IRC01:56
*** ducttape_ has joined #openstack-meeting-cp01:57
*** ducttape_ has quit IRC02:17
*** gouthamr has quit IRC02:58
*** coolsvap has joined #openstack-meeting-cp03:13
*** diablo_rojo has joined #openstack-meeting-cp03:13
*** ducttape_ has joined #openstack-meeting-cp03:18
*** ducttape_ has quit IRC03:23
*** diablo_rojo has quit IRC03:40
*** diablo_rojo has joined #openstack-meeting-cp03:54
*** jaugustine has quit IRC04:33
*** ducttape_ has joined #openstack-meeting-cp04:49
*** ducttape_ has quit IRC04:53
*** prateek has joined #openstack-meeting-cp05:18
*** ducttape_ has joined #openstack-meeting-cp06:19
*** ducttape_ has quit IRC06:24
*** diablo_rojo has quit IRC06:43
*** ducttape_ has joined #openstack-meeting-cp07:50
*** ducttape_ has quit IRC07:54
*** ducttape_ has joined #openstack-meeting-cp08:50
*** ducttape_ has quit IRC08:55
*** ducttape_ has joined #openstack-meeting-cp09:00
*** ducttape_ has quit IRC09:05
*** ducttape_ has joined #openstack-meeting-cp10:02
*** ducttape_ has quit IRC10:07
*** ttx has quit IRC10:45
*** ttx has joined #openstack-meeting-cp10:46
*** ducttape_ has joined #openstack-meeting-cp11:02
*** persia has quit IRC11:07
*** ducttape_ has quit IRC11:07
*** persia has joined #openstack-meeting-cp11:09
*** ducttape_ has joined #openstack-meeting-cp12:03
*** ducttape_ has quit IRC12:08
*** sdague has joined #openstack-meeting-cp12:17
*** ducttape_ has joined #openstack-meeting-cp13:04
*** ducttape_ has quit IRC13:06
*** ducttape_ has joined #openstack-meeting-cp13:06
*** ducttape_ has quit IRC13:07
*** gouthamr has joined #openstack-meeting-cp13:18
*** ducttape_ has joined #openstack-meeting-cp13:23
*** ducttape_ has quit IRC13:51
*** xyang1 has joined #openstack-meeting-cp13:52
*** lamt has joined #openstack-meeting-cp14:10
*** jaugustine has joined #openstack-meeting-cp14:52
*** diablo_rojo_phon has joined #openstack-meeting-cp15:07
*** markvoelker has quit IRC15:29
*** markvoelker has joined #openstack-meeting-cp15:31
*** prateek has quit IRC15:51
*** gagehugo has joined #openstack-meeting-cp15:56
*** ruan_ has joined #openstack-meeting-cp15:56
*** ruan_ is now known as Guest8825515:57
*** Guest88255 has quit IRC15:57
*** ruan_11 has joined #openstack-meeting-cp15:57
lbragstad#startmeeting policy16:01
openstackMeeting started Wed Dec 21 16:01:04 2016 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:01
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:01
*** openstack changes topic to " (Meeting topic: policy)"16:01
openstackThe meeting name has been set to 'policy'16:01
lbragstadping raildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ruan_11 , ayoung16:01
lbragstadstevemar16:01
lbragstad#link agenda https://etherpad.openstack.org/p/keystone-policy-meeting16:01
dolphmo/16:01
lbragstado/16:01
ruan_11o/16:01
lbragstadi imagine there are a few folks on vacation already - but we'll give it a minute or two16:02
stevemaro/16:02
gagehugoo/16:02
lamto/16:03
jaugustine:)16:04
lbragstadalrighty - let's get started16:05
lbragstad#topic other project work around capability APIs16:05
*** openstack changes topic to "other project work around capability APIs (Meeting topic: policy)"16:05
lbragstadI'm curious if anyone else has see or looked at what other projects are doing with policy?16:05
lbragstadBarcelona session #link https://etherpad.openstack.org/p/ocata-xp-unified-capabilities-api16:05
lbragstadCinder spec #link https://review.openstack.org/#/c/306930/16:05
lbragstadnova and cinder have a need for a capabilities API, which they seem to have specs in place for16:06
lbragstadand the capability relates to not only policy, but also the abilities of the hardware incorporated into the deployment16:06
dolphmso, i did not attend the capabilities session in barcelona, but i thought it wasn't authorization-related at all?16:08
dolphm* nova's capabilities session16:08
lbragstadtrue16:08
lbragstadit sounds like the capabilities work is mostly focused on letting people know what a deployment supports from an infrastructure perspective16:09
*** ayoung has joined #openstack-meeting-cp16:09
lbragstadi did read the cinder spec and they mention using policy.json https://review.openstack.org/#/c/306930/12/specs/newton/discovering-system-capabilities.rst16:10
lbragstad#link https://review.openstack.org/#/c/306930/12/specs/newton/discovering-system-capabilities.rst16:10
lbragstadspecifically around line 13616:10
ayoungSome day OpenStack is actually going to discover Rest16:10
dolphmnot that they should rename it, but i think you could call it a "features" API16:10
lbragstadyeah16:11
dolphmayoung: yeah...16:11
samueldmqhi I am late16:11
lbragstadeither way - i noticed the bits specific to the policy.json file while I was reading their spec16:11
lbragstadand i wanted to added it so that others could get up to speed on it if they wanted to16:12
lbragstadalso - i followed up with johnthetubaguy on some of the work they have left in nova for the pulling policy into oslo.policy - https://etherpad.openstack.org/p/ocata-xp-unified-capabilities-api16:13
ayoungthe key piece that is missing between policy.json and the APIs is the mapping.  THE API-refs, while a great start, are outside knowledge, and not part of the workflow.  This effort seems to be targetting that16:13
ayoungAnd, to be fair, there seems to be no standard way of doing RBAC via REST16:13
ayoungideally, it would be discoverable, say by making a call that does not have the role data on it, that fails, and comes back with a 401 + Here are the roles you need16:14
ayoungfrom a capabilities standapoint, the way we do version discovery is the right approach:16:14
ayoungfor a keystone server, from /v3/  we should have links to the underlying APIs16:15
lbragstadsure - that makes sense16:15
ayoungperhaps we would only show those to an authenticated user16:15
ayoungit also seems like the AUTH_URL should point to a separate microservice than the rest of Keystone, and that micro service should be end user specific.  Pretty much just the stuff we have under OS_FEDERATION.16:16
ayoungI;'m working backwards here, of course16:16
ayoungbut...this is why, all those years ago, I wrote the HTML rendering code for Keystone.  All this stuff is super clear when you try to do it from a web browser:16:16
ayoung*everything* should be discoverable16:17
ayoungto include "what role do I need to give to dolphm so he can do work in this new project"16:17
ayoungand that is what this cinder propsal is attacking16:17
* ayoung surrenders the conch16:17
lbragstadright16:17
lbragstadthat's the main reason i wanted to bring that up here - because both cinder and nova are trying to solve that problem and it kinda relates to some discussions we've had around policy16:18
lbragstadi was thinking it would be a good point of view to consider as we hold this meeting, and keep their perspective in mind (hopefully we can get them in here for discussions that require both teams - but I thought it was a little early for that step right now)16:19
lbragstaddoes anyone have questions on this?16:20
ayoungsooo lets say I get my RBAC work done16:20
ayounghow would we use it?16:20
lbragstadayoung you mean how would *they* use it?16:20
ayounglbragstad, yes16:21
ayoungideally, the policy names they have right now would be *like* roles16:21
lbragstadwell - in my eyes, the thing they need from keystone is "what role is required to do this operation"16:21
lbragstador - specifically, the information in order to make that decision16:22
ayoungI think the current query interface would let them answer that question16:22
lbragstadonce they know that, it is up to them how they want to determine capabilities specific to their project16:22
ayoungbut it is at the URL level16:22
ayoungand there is still no mapping between URL and policy except in the code16:22
lbragstadthat's another reason why I think having their input on your spec would be useful16:22
ayoungeven the Nova mechanism does not really provide a way to go from URL to policy rule16:22
*** ducttape_ has joined #openstack-meeting-cp16:23
lbragstadwell - that's because it was derived off the policy.json file16:23
ayoungis there anyone from cinder around?  Can we pull them into this meeting?16:23
lbragstadayoung not that I know of - but I didn't explicitly ask for them to be here16:23
lbragstador nova for that matter16:23
smcginnisCinder meeting is going on right now.16:23
lbragstadi think it would be good due diligence for us to review each of the their specs16:23
lbragstadsmcginnis o/16:24
smcginniso/16:24
lbragstadhow about we, as a group, review #link https://review.openstack.org/#/c/377756/ and #link https://review.openstack.org/#/c/306930/16:25
lbragstadto get a feel for how the different projects plan on interacting with keystone for the bits they need, and if there is a way we can smooth that out if possible?16:26
smcginnislbragstad: That would be great to get your input on those.16:26
lbragstadas a follow up - I'd like the next part of that discussion to be involving  ayoung's RBAC in middleware spec16:26
ayoungLet me find the readable link16:27
lbragstadat that point - i think it would make sense to come together as a larger group and start discussing the overall direction16:27
ayounghttp://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/role-check-from-middleware.html16:27
*** ducttape_ has quit IRC16:27
lbragstadso, since we won't be having a policy meeting next week16:28
ayoungTHanks to all who reviewed it.  I'd like to remind people that specs, just like code, can and should be amended as we learn more16:28
ayoung#link http://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/role-check-from-middleware.html16:28
ayounga couple points worth pulling out:16:28
ayoungDefaults are going to be super important16:28
ayoungif we can make it so the default role for normal operations is "Member" and we can get that enforced everywhere, it makes it safe to then have a read-only role explicitly identified for certain operations16:29
ayoungthis has been requested for a long, long time16:29
lbragstadI'll take an action item to follow up with the nova folks about their work with policy (specifically oslo.policy) and #link https://review.openstack.org/#/c/377756/16:30
lbragstadis anyone interested in doing the same with the cinder team?16:31
lbragstadFYI - our next policy meeting will be Tuesday, January 3rd16:31
dolphmayoung: ++16:32
lbragstad#action lbragstad to follow up with the nova team on #link https://review.openstack.org/#/c/377756/16:32
lbragstad#action lbragstad to follow up with the cinder team on #link https://review.openstack.org/#/c/306930/16:34
lbragstaddoes anyone have questions on this so far?16:35
ayoungAs a reference to my earlier HTML statements16:35
ayoungthis is the code here that needs to be primarily changed to make it wo0rk16:35
ayounghttp://git.openstack.org/cgit/openstack/keystone/tree/keystone/middleware/core.py#n7616:35
ayoungThe JSON middleware assumes only JSON comes in or out, and that middleware, or a comparable one would have to look at the accepts headers.16:36
ayoungI have an abandonded review from back in the XML-also days...16:36
ayounghttps://review.openstack.org/#/c/24443/16:36
lbragstadayoung ready to move on to the next topic?16:36
ayoungyep16:36
lbragstadcool16:37
lbragstad#topic review policy use cases16:37
*** openstack changes topic to "review policy use cases (Meeting topic: policy)"16:37
lbragstad#link https://etherpad.openstack.org/p/keystone-policy-usecases16:37
lbragstaddstanek has been collapsing a bunch of usecases and documenting them ^16:37
lbragstadwe've been spending the last few weeks going through them16:37
lbragstadI wanted to double check with folks to give them another look - and see if we're missing anything16:38
ayoungNicely cleaned up16:38
ayoungI wonder if this should now be posted as something like a cross-project spec?16:38
lbragstadayoung i would agree with that - as the next logical step16:39
lbragstadmaybe not so much as a cross project spec - but some formal document16:39
lbragstadsomething saying "these are things we need in a policy engine"16:40
lbragstadwhich actually is a nice transition to our next topic16:40
lbragstad#topic project tag for RBAC capabilities16:40
ayoungHeres a thought16:40
*** openstack changes topic to "project tag for RBAC capabilities (Meeting topic: policy)"16:40
ayoungwhy don't we move the standard roles to the top of that doc16:40
ayoungahhhh...too slow16:40
ayoungbefore we transition...16:41
lbragstadayoung go ahead16:41
ayounglets move the standard roles to the top of the etherpad, and break the use cases up under them16:41
ayoungfor example, we don't wamt a use case with any other actores16:41
ayoungliek the one16:41
ayoungs a protected resource I want to enforce some level of admin before you can operate on me??  (is this 6.2 above?)16:41
ayoungTHe protected resource is not the actor,  that one should be moved to either the user or the admin16:42
lbragstadsure - that's one way we could organize it16:42
ayoungLet me do that now, and we can drive on.16:42
lbragstadayoung want to do that at the bottom so we can keep the original?16:42
lbragstadayoung just so we don't lose information16:43
ayoungShould not lose info... see?16:43
lbragstadayoung yeah - that works16:44
lbragstadthe reason for this topic was that there were discussion in Barcelona about proposing a tag for RBAC16:44
lbragstads/tag/project tag/16:45
lbragstadI think dolphm was the one who told me about that(?)16:45
lbragstadand I'm pretty sure this ties back to the cross project dolphm and jamielennox had for standarizing roles across projects16:46
lbragstadcross project spec*16:46
lbragstadI personally think its a good idea - and it would be really cool to be able to take a proposal to the PTG in Atlanta16:47
lbragstaddoes anyone else have thoughts?16:47
samueldmqlbragstad: I agree with you16:48
samueldmqlbragstad: we keystone bootstrap should have a command to setup the default roles16:49
samueldmqfor an openstack deployment16:49
lbragstadit would be similar to our rolling upgrade tags16:49
ayoungIt would be great to get the Nova and Cinder teams to agree to have their capabilites meetings jointly, and then make sure we attend16:49
samueldmqdefault roles/base roles16:49
lbragstadhttps://governance.openstack.org/tc/reference/tags/index.html#project-assertion-tags16:49
lbragstad#Link https://governance.openstack.org/tc/reference/tags/index.html#project-assertion-tags16:49
lbragstadit would be similar to those  - but geared towards RBAC16:50
lbragstadIt would require some work from us before the PTG to come up with some documentation16:50
lbragstada document for new projects to go to for understand how policy works today and what they need to do to get it to work16:51
lbragstadand a document for existing projects to be able to use as a roadmap for getting RBAC support16:51
ayoungOne thing that might be good to flesh out is the service specific roles they would want16:52
ayoungI've alluded to that in the past in Neutron16:52
lbragstad++16:52
lbragstadright now that kind of documentation doesn't exist16:52
ayoung"I can create a network"  "I can only attach to existing networks" seem to be the most common stratification.  I wonder if the same exists for Cinder16:53
*** Kiall has quit IRC16:53
lbragstadayoung that's a good question16:53
lbragstadand something we'll need to ask them in order to flesh these things out16:53
lbragstadbut it would be awesome to get a start on this right away in the new year so that we can bring it to the PTG in the event we want to propose a project assertion tag for RBAC16:54
ayoungany other actions you think we need to do?16:55
lbragstadayoung for an RBAC project assertion tag?16:55
ayoungor to prep for PTG in general?16:56
lbragstadwell - by the time the PTG is here I want to have detailed discussion with other projects about their approach to RBAC and policy in general16:56
lbragstadas well as have a document documenting policy in openstack for new and existing projects16:57
lbragstad(something they can use to achieve sensible RBAC)16:57
lbragstadand start using keystone as an example16:57
ayoungSo, based on who submitted the specs, we know who to talk to in Nova and CInder.  SHould we id people in the other core projects?16:58
lbragstad(it's going to be hard to get other projects to follow our lead when we haven't followed it)16:58
ayoungAnd, how wide a net do we need to cast?16:58
lbragstadI'd love to cast a wider net16:58
lbragstadbut I think we have plenty to work on with the nova and cinder folks to get some work rolling - in the event other projects aren't ready16:59
lbragstadgoing to have to wrap up here - if anyone has left over questions, let's head to #openstack-keystone16:59
lbragstadthanks folks!17:00
lbragstad#endmeeting17:00
*** openstack changes topic to " (Meeting topic: cinder-nova-api-changes)"17:00
openstackMeeting ended Wed Dec 21 17:00:03 2016 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:00
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-12-21-16.01.html17:00
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-12-21-16.01.txt17:00
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-12-21-16.01.log.html17:00
*** gagehugo has left #openstack-meeting-cp17:00
*** ruan_11 has quit IRC17:01
*** openstack has quit IRC17:02
*** openstack has joined #openstack-meeting-cp17:04
*** ChanServ sets mode: +o openstack17:04
*** diablo_rojo has joined #openstack-meeting-cp17:18
*** ducttape_ has joined #openstack-meeting-cp17:23
*** ducttape_ has quit IRC17:36
*** ducttape_ has joined #openstack-meeting-cp17:44
*** ducttape_ has quit IRC17:57
*** brault is now known as brault|away17:58
*** ducttape_ has joined #openstack-meeting-cp18:00
*** ducttape_ has quit IRC18:18
*** ducttape_ has joined #openstack-meeting-cp18:30
*** hogepodge has quit IRC18:46
*** ducttape_ has quit IRC19:00
*** stvnoyes1 has joined #openstack-meeting-cp19:08
*** stvnoyes has quit IRC19:11
*** hogepodge has joined #openstack-meeting-cp19:12
*** stvnoyes1 has quit IRC19:22
*** stvnoyes has joined #openstack-meeting-cp19:23
*** ducttape_ has joined #openstack-meeting-cp19:35
*** gouthamr has quit IRC19:39
*** ducttape_ has quit IRC19:48
*** ducttape_ has joined #openstack-meeting-cp19:52
*** gouthamr has joined #openstack-meeting-cp20:03
*** robcresswell has left #openstack-meeting-cp20:10
*** ducttape_ has quit IRC20:12
*** diablo_rojo_phon has quit IRC20:30
*** diablo_rojo has quit IRC21:02
*** ducttape_ has joined #openstack-meeting-cp21:12
*** ducttape_ has quit IRC21:17
*** diablo_rojo has joined #openstack-meeting-cp21:36
*** gouthamr has quit IRC21:58
*** sdague has quit IRC22:35
*** ducttape_ has joined #openstack-meeting-cp22:43
*** ducttape_ has quit IRC22:48
*** gouthamr has joined #openstack-meeting-cp22:53
*** xyang1 has quit IRC22:58
*** lamt has quit IRC23:32

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!