Tuesday, 2022-06-07

*** bhagyashris_ is now known as bhagyashris08:03
gibi_summitgmann: we are created the etherpad for the nova feedack session and mentioned SRBAC https://etherpad.opendev.org/p/nova-berlin-meet-and-greet09:06
gibi_summits/are//09:06
gibi_summitfeel free to add to it09:09
gibi_summitactually, anybody, feel free to add to that etherpad ^^09:10
chateaulavAlso see the etherpad for Emulation as well:. https://etherpad.opendev.org/p/Emulation_going_beyond_local_QEMU09:54
sean-k-mooneychateaulav: ^ sound interesting10:07
*** dasm|ruck|off is now known as dasm|ruck13:32
*** tbachman_ is now known as tbachman13:54
*** dasm|ruck is now known as dasm|ruck|afk15:49
gmanngibi_summit: thanks. I added few details there but you or bauzas really need to explain what 'scope' means to get the feedback otherwise it might be a very silent topic as hardly anyone from operator understand the 'scope' concept - https://etherpad.opendev.org/p/nova-berlin-meet-and-greet#L5216:58
gmanngibi_summit: bauzas: main goal is if we can get answer to "is Scope useful for you?" that will be great feedback for us to proceed on community-wide goal.16:59
sean-k-mooneygmann: write now we dont really have any usages of scope17:01
sean-k-mooneywell we have system scope and proejct scope17:02
sean-k-mooneybut evnthing tha tis system scopd is all one scope17:02
gmannsean-k-mooney: did not get you completely? can you please explain or rephrase 17:03
sean-k-mooneywe have scope_type system but system_scope:all? or something like that17:03
sean-k-mooneywe dont have say system:comptue vs system:networking17:04
sean-k-mooneyso you cant grant system_admin on nova but nothing on other services17:04
sean-k-mooneyim trying to rememebr what thats actully called 17:05
gmannsean-k-mooney: ohk, yes. that is why scope has to be explained in a detail to have operator understand what it is like you mentioned17:05
gmannmay be showing nova policy doc can help..17:06
sean-k-mooneyim not sure if the system:all thing  still extis by the way based on https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html17:09
sean-k-mooneyi think that was form before we did the policy reset17:09
sean-k-mooneyhttps://specs.openstack.org/openstack/keystone-specs/specs/keystone/queens/system-scope.html#authenticating-for-a-system-scoped-token17:10
gmannsean-k-mooney: it is not a things as per new direction in Yoga ^^. we have isolated the 'scope' from check_str17:10
sean-k-mooneyits the     "scope": {17:10
sean-k-mooney            "system": {17:10
sean-k-mooney                "all": true17:10
sean-k-mooney          17:10
sean-k-mooneypart17:10
sean-k-mooneyhttps://specs.openstack.org/openstack/keystone-specs/specs/keystone/queens/system-scope.html#authenticating-for-a-system-scoped-token17:10
gmannyes it was before and that is why it was not useful so we separated that out from check_str17:10
sean-k-mooneyack17:11
sean-k-mooneyso i woudl not say its not use to have multiple systems17:11
sean-k-mooneybut we might not want to do it via the check sting17:11
sean-k-mooneyeventually i think it would to be abel to issue a token that was readonly on say neutron but could do nothing on glance17:12
sean-k-mooneyim not sure how to model that but that was the orginal usecase for system:all vs system:compute17:13
sean-k-mooneywhen i say token i really am thinking of app creditials by the way17:14
sean-k-mooneyit woudl be nice ot be abel to generate an app credential that hand much more fine grained scope17:15
gmannyeah, with no scope coupled in check_str we cannot have SYSTEM_READER until we enable scope by default and make it non-configurable 17:15
sean-k-mooneyany way that proably a differnt topic then you wanted feedback on 17:16
sean-k-mooneyone day it woudl benice if openstack coudl support the same aplication keys like funcationaltiy you get with github or other modern apis17:17
sean-k-mooneyhttps://docs.github.com/en/rest/overview/permissions-required-for-github-apps17:20
sean-k-mooneythey map all api endpoints endpoint to a permssiosn which is like a role17:21
sean-k-mooneyand then you create a topen with a set of permmison and either read or write capablity on each17:21
sean-k-mooneysome day it woudl benice if you coudl do the same with keystone app credetials or just in gneral17:22
gmannyeah, may be good to have it separate as it can make things more complex to understand17:25
gmanngibi_summit: bauzas I created a central etehrpad to get RBAC feedback from various forum/places. and linked it in nova etherpad also, please use that https://etherpad.opendev.org/p/rbac-operator-feedback17:26
opendevreviewTakashi Kajinami proposed openstack/placement master: Update python testing as per zed cycle testing runtime  https://review.opendev.org/c/openstack/placement/+/84505923:15

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!