Wednesday, 2025-04-23

*** mhen_ is now known as mhen01:19
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix wrong argument to determine identity endpoint  https://review.opendev.org/c/openstack/oslo.limit/+/94790204:53
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Remove unused adapter options  https://review.opendev.org/c/openstack/oslo.limit/+/94790305:19
skraynev@gtema: thank you for the answers. I was offline, so I read them recently. Regarding the first question (about domain token) I have not any questions - your answer totally covers my question. For the second question (about validation based on attributes) it's also about Neutron, Did I get right, that I could NOT validate resource attribute for modify operations ? as I understand it happens, because Neutron evaluate policy check befor05:19
skrayneve fetching resource from neutron 05:19
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix ignored KSA options  https://review.opendev.org/c/openstack/oslo.limit/+/94790405:25
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix ignored KSA adapter options  https://review.opendev.org/c/openstack/oslo.limit/+/94790405:27
gtemaskraynev: yes, but it depends. Neutron has a dedicated field check that makes you feel it can be used for that. However, as I said, you can't implement a policy that will reject request based on the current resource state using only oslo.policy. I  am working on integration with open policy agent and certain things would be possible there. But that is not going to land soon upstream (it's more a deployment question)05:40
skraynev@gtema got it, thank you. Do you have a reference on code with this "dedicated filed check" ? It will safe some time for me. otherwise I will find it myself. regarding support open policy agent - is the link in blueprint or design doc? 05:44
gtemahttps://opendev.org/openstack/neutron/src/commit/9dc0d0fd2f44e348705804f1f99403086c138010/neutron/policy.py#L383 and https://github.com/gtema/oslo.policy.opa05:45
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix wrong argument to determine identity endpoint  https://review.opendev.org/c/openstack/oslo.limit/+/94790209:05
opendevreviewDaniel Bengtsson proposed openstack/oslo.config stable/2024.1: Fix concurrent access crash in _all_opt_infos()  https://review.opendev.org/c/openstack/oslo.config/+/94791710:26
opendevreviewDaniel Bengtsson proposed openstack/oslo.service master: Add threading backend implementation using cotyledon and standard threads  https://review.opendev.org/c/openstack/oslo.service/+/94572010:46
opendevreviewDaniel Bengtsson proposed openstack/oslo.service master: Add threading backend implementation using cotyledon and standard threads  https://review.opendev.org/c/openstack/oslo.service/+/94572011:09
gtematkajinam: would you pls approve https://review.opendev.org/c/openstack/releases/+/946535 for releasing openstackdocstheme. os-api-ref was released but not the theme11:48
skraynev_@gtema thank you13:02
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix ignored KSA adapter options  https://review.opendev.org/c/openstack/oslo.limit/+/94795313:56
tkajinamsean-k-mooney, ^^^ this is pretty ugly but would be the only viable way to fix ignored adapter options which we have discussed. stephenfin may have a better idea, though13:59
tkajinamIt was a huge surprise that these adapter options are not at all used. phhh14:00
tkajinamgtema, jfyi I've voted my +114:00
gtemathanks a lot14:00
sean-k-mooneyi guess one of the qution i woudl ahve with any fix14:01
sean-k-mooneyis do you plan to backport it to older release14:01
sean-k-mooneybecause this is a capablity that we would expect to work in older release and adding new config options is doable but non trivail for some installers14:02
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix ignored KSA adapter options  https://review.opendev.org/c/openstack/oslo.limit/+/94795314:02
sean-k-mooneyits actully trivial for the one i work on14:02
sean-k-mooneybut that slightly beside the point14:02
sean-k-mooneyanyway i didnt want to interupt but it was also a surpise to me14:04
sean-k-mooneyi was fully expecting https://github.com/openstack-k8s-operators/nova-operator/blob/main/templates/nova.conf#L329-L338 to result in usign the internal endpoint14:05
sean-k-mooneyill have to add valid_interface to that ot ensure the corerct behavior but as i noted that a trivial chagne14:06
tkajinamyeah14:07
tkajinamI think we can backport that fix because it's an actually bug fix to make the registered options work14:08
tkajinamthese have been registered and is added to config file so ignoring these options is apparently a bug14:08
tkajinamit allows us to avoid adding that interface option (which can't be backported)14:09
tkajinamthis is the bug which was introduced even before the endpoint lookup according to endpoint_* options were implemented14:12
sean-k-mooneyright regardless of the endpoint stuff it it ignored those options then it woudl have taken the default enpoint for keystone14:21
sean-k-mooneywhich assume is public? i would have to check14:21
sean-k-mooneyvalid_interfaces also has the benift of being a list so it can fall back if the endpoitn is not aviable14:22
sean-k-mooneywhich is useful even if 99% of the time that fallback shoudl not be needed14:23
tkajinamafair the public endpoint is used by default14:29
tkajinamyeah. I don't expect that any user may use a list value, but accepting a list allows us to use ['internal', 'public'] as the default value, which usually works better in deployments with multiple endpoint interfaces while it works in deployments with only public endpoint14:30
sean-k-mooneyyep, it also allow you to perfer not to go over the wan if you have a local api deployed in the current dc but fallback to a remote dc if that local api is unaviabel for whatever reaons14:31
sean-k-mooneyinternal is ment ot be for unmetered apis and shoudl be aviabel to service and tenants within a cloud14:32
opendevreviewTakashi Kajinami proposed openstack/oslo.limit master: Fix ignored KSA adapter options  https://review.opendev.org/c/openstack/oslo.limit/+/94795314:33
sean-k-mooneytkajinam: by the way thanks for working on this. i didnt want to create extra work for you but i wanted to undersand this better before we potentially adapted nova for this bug14:35
sean-k-mooneywith https://review.opendev.org/c/openstack/oslo.limit/+/947953 we likely wont need to modify nova just update the verion of oslo.limits to adress the bug14:36
tkajinamnp. fixing this may also save my life as I already added a few adapter options such as valid_interfaces to puppet-nova14:36
tkajinamand it was caught in a good timing because the interface option was added AFTER 2025.1 release so it's not yet released14:36
sean-k-mooneyya so tripleo/packstack that leverage pupet-nova were the installer i was refering to where adding new optisn woudl be heavy wieght14:37
sean-k-mooneybasically anythin that has multipel layers of indrection to render the config files14:37
tkajinamwe could probably make the puppet modules simpler to replicate the same set of values of similar options instead of exposing individual options separately14:38
tkajinambut that is the design created in quite old days, which can't be changed easily nowadays :-P14:39
sean-k-mooneywell for things like devsatck we have a common function to handel all the ksa options14:39
sean-k-mooneyi think installer like kolla that supprot config overried instead of having an option (i.e. puppet parmater) per service cofnig14:40
sean-k-mooneyhave proved to be more maintainable in this regard over time14:40
tkajinampuppet does support config override (by passing dictionary values) though that interface often conflicts with native parameters implemented14:41
tkajinamregarding the management of keystoneauth options, there are some complexity caused by the old decision to suggest using service user of target service14:41
tkajinamI mean, in the install guide afair we suggest using neutron user for [neutron] section in nova while cinder user for [cinder] section14:42
tkajinamwhile the configurations could be pretty simplified if we use the nova user consistently for all interaction from nova14:42
* frickler is a strong advocate of the latter fwiw14:43
tkajinamyeah14:43
opendevreviewDaniel Bengtsson proposed openstack/oslo.service master: Add threading backend implementation using cotyledon and standard threads  https://review.opendev.org/c/openstack/oslo.service/+/94572014:45
sean-k-mooneytkajinam: using the neutorn user for neutorn is really an anti pattern14:56
sean-k-mooneyin nova the nova user shoudl be used to talk to all other services14:57
sean-k-mooneythat was one of the secutiry enhancment we made in the new installe to stop using the neutron user in the nova config14:58
sean-k-mooneywhat i really wanted to do and still want to do14:58
sean-k-mooneyis move to use applciation creditial instead14:58
sean-k-mooneyfrickler: you will be happy to see this then https://github.com/openstack-k8s-operators/nova-operator/blob/main/templates/nova.conf#L314-L31514:59
sean-k-mooneyfrickler: long term i would prefer to allocate an applciation credital either per service or host14:59
sean-k-mooneyi.e. have an appcliation credteial that is revoakble for nova or even for each comptue node15:00
sean-k-mooneyto limit the blast radius if its ever leaked15:00
sean-k-mooneyit would make password rotation simpler too in that you can allocate the new one before the old one expires15:00
sean-k-mooneyand have both be vaild while your doing the rotaion in the config files15:01
fricklersean-k-mooney: indeed, I started implementing that for devstack to give it some test coverage, but didn't have time to finish it yet15:01
fricklerfor production one dedicated credential per service per host (or per container in the kolla case) would seem optimal to me15:02
sean-k-mooneymy only concen with tha twas really how well does keystone scale15:03
sean-k-mooneyike if you have 1000 compute with 1 secret per service per host that your talking about 1000s of app creds just for the infra 15:04
sean-k-mooneybut it does create the tightest secuity envelope15:04

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!