Thursday, 2024-02-22

*** diablo_rojo is now known as Guest50003:09
*** enick_952 is now known as diablo_rojo03:09
opendevreviewjamesjordanblack604@gmail.com proposed openstack/python-openstackclient master: Bug Fix, Default SG Rule Custom SG  https://review.opendev.org/c/openstack/python-openstackclient/+/90981504:17
opendevreviewLajos Katona proposed openstack/python-openstackclient master: Router flavor_id can be a name  https://review.opendev.org/c/openstack/python-openstackclient/+/90265408:37
opendevreviewLajos Katona proposed openstack/openstacksdk master: Add sort_key and sort_dir to core Neutron resources  https://review.opendev.org/c/openstack/openstacksdk/+/90965611:43
stephenfingtema: You might know this. When would I want to use OS_USER_DOMAIN_ID or OS_PROJECT_DOMAIN_ID rather than OS_DOMAIN_ID?12:17
gtemaUSER_DOMAIN_ID is to tell which domain to search user in (auth part)12:18
gtemaPROJECT_DOMAIN_ID is for project scope12:18
gtemaDOMAIN_ID is for domain scope12:18
stephenfinIf we have a clouds.yaml file without DOMAIN_ID provided, can we assume USER_DOMAIN_ID == DOMAIN_ID?12:18
gtemanope12:19
gtemathen unscope auth would be used12:19
stephenfinAre there any domain-scoped APIs? I thought most APIs were project-scoped or system-scoped (where domain presumably doesn't matter)?12:23
stephenfin(btw, context is that gophercloud integration tests inside on a domain ID or name, but I've never seen a clouds.yaml with domain_id/domain_name defined so I'm trying to figure out why it needs it/if I can remove that requirement)12:25
gtemaOpenTelekomCloud uses domain scope actively and currently in Keystone there is work on improving it12:26
gtemaso you definitely should keep the stuff12:26
stephenfinsorry for being slow on the uptake, but could you give me an example of an API that would use domain scope?12:27
stephenfinyou'd use it to...create a new project within a domain?12:28
gtemain OTC all of the Identity ops require domain scope, but lemme check in Keystone what is currently in works12:29
gtemahttps://review.opendev.org/c/openstack/keystone/+/908524 is one of the recent changes there12:33
gtemait is currently under the RBAC hat12:34
gtemabut in principle you are right: creating a new user is a typical domain scope operation (it has no relation to the project)12:35
opendevreviewMridula Joshi proposed openstack/python-openstackclient master: Add CLI support for adding multiple tags  https://review.opendev.org/c/openstack/python-openstackclient/+/90987014:27
opendevreviewjamesjordanblack604@gmail.com proposed openstack/python-openstackclient master: Bug Fix, Default SG Rule Custom SG  https://review.opendev.org/c/openstack/python-openstackclient/+/90981515:31
opendevreviewjamesjordanblack604@gmail.com proposed openstack/python-openstackclient master: Bug Fix, Default SG Rule Custom SG  https://review.opendev.org/c/openstack/python-openstackclient/+/90989915:32
johnsomgtema On this DNS patch, what other methods are you talking about, can you provide an example? When this was added to the Designate API, designate was the only project that had this capability.16:43
gtemajonsom: I disagree with this statement. Nova (i.e. list servers), Neutron (i.e. list networks), Cinder (i.e. list volumes) support either same or some form of filtering by project_id (independent on whether endpoint already contains project_id) and some also support "all_projects" query parameter. And this is like that since (maybe) beginning?17:00
gtemajohnsom ^^ (sorry for typo)17:00
johnsomNova for example, has no way to create a server on behalf of another project.17:01
johnsomLikewise, nova has "all_tenants" as a query parameter on list, but neutron does not.17:01
johnsomI think this is a meta-issue across all of the services and something that should be standardized via the api-wg (if there is a member left)17:01
johnsomI was just adding that comment to the patch17:01
johnsomThis isn't for filtering, those query params are the same.17:02
johnsomIt's for impersonating a project or acting across projects17:02
gtemaI am left in api-wg, but something like that will not be easy: there is no power to force projects to follow it17:02
johnsomAgreed, but if we at least document a "standard" it's a step in the right direction17:03
johnsomThen it could become a "goal" (not that I am a fan of those)17:03
gtemaI agree with the problem and I see it in different places17:03
gtematoken scoping is something many people have problem with17:03
johnsomI do17:03
johnsomDon't get me started on system scoped tokens. lol17:04
gtemaI think idea of introducing headers is very bad, since once you go into the OpenAPI area this is just going to blow17:05
gtemabetter approach would be (my personal opinion) is to address token scoping itself17:05
johnsomAt one time headers were all the rage in OpenStack. This is very old code in designate, at least 10 years old17:06
gtemait is also unclear in the current implementation: what is the effect for the regular user, can he also use "x-auth-sudo-project" if he do not have roles on that project17:06
johnsomWe can't remove that, but if we standardize on another approach I think we would be open to adding it. token scoping is not the solution though, that just adds complexity17:07
gtemareally 10 years? I somehow never noticed those17:07
johnsomsudo-project has RBAC rules in the middleware17:07
johnsomYeah, it was in havana17:09
gtemahmm, I will need to think how to generally address that. I guess for listing "all_projects" and "project_id" as simple query parameter is a de-facto standard, and not headers. Impersonation is something we really need to discuss in wider round (maybe during vPTG)17:12
johnsomneutron does not use those query params17:12
gtemait has tenant_id/project_id17:13
johnsomas a filter on list maybe, but not for create, etc.17:13
gtemaright, creation everywhere (well except Designate) is based on the token scope for the current project17:14
johnsomI think designate has that filter too, but they have different purposes.17:14
gtemawell, I see Neutron does support setting project_id also for create resources17:14
johnsomThink of this use case, as an admin I want to create a zone for project 123 because they called the help line.17:14
gtemait just states: "Only administrative and users with advsvc role can specify a project ID other than their own. You cannot change this value through authorization policies."17:15
johnsomRight, and nova doesn't. It's just inconsistent across the projects.17:15
gtemawell right in that sense. Nova does not allow this17:16
gtemacinder supports17:17
gtemaOctavia supports17:17
gtemaI think we can observe some mass of core projects that does support that17:17
johnsomYeah, octavia mirrors neutron in a lot of ways as it had to be API compatible with neutron-lbaas17:18
gtemaDNS is also related to networking ;-)17:19
johnsomSo, on the designate patch, is it the addition of "headers" the the list method that is of concern or was it just that you thought the headers were new in designate?17:19
gtemaas stated I thought it was something new17:20
johnsomCan we move forward with this patch and then work on an api-wg "standard" we can move all of the project towards in the future?17:20
gtemaI think in this case it is "ok"17:21
gtemabut I am surely very unhappy with that style17:21
johnsomOk. I am also very happy to work together on creating a standard for this stuff. It would be nice to have a consistent way to do this across the projects.17:23
gtemagreat17:24
johnsomHmmm, did the openstack/api-wg repo go away?17:26
gtemahttps://opendev.org/openstack/api-sig17:27
johnsomYeah, just found that. The link on the https://specs.openstack.org/openstack/api-wg/ page is wrong17:27

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!