[openstack-dev] [nova][keystone] Austin summit nova/keystone cross-project session recap
Matt Riedemann
mriedem at linux.vnet.ibm.com
Thu May 12 01:07:35 UTC 2016
On Thursday afternoon we had a nova/keystone cross-project design summit
session. The session etherpad with full details is here [1].
This session was mostly about a nova spec [2] to fix a long-standing bug
in Nova. We've actually had several duplicate bugs for this issue, which
is why we're working on the spec again to resolve it.
The issue is that when a nova admin is setting quota or flavor access
they are passing a project id (not their own) which is not validated to
actually exist with keystone. So if there is a typo, or a name is passed
rather than an id, Nova will persist that and say the operation was
successful, but it's useless.
Some attempts have been made to do at least checking on the id so that
it's a UUID, but project IDs don't have to be UUIDs, so we've rejected
those types of fixes for now. And we don't really want python-novaclient
doing the check with keystone since we really need to handle this in the
Nova REST API for all clients.
The spec was originally written to add new policy to keystone and add
keystone admin credentials to nova.conf to perform the lookup, but
that's since been rejected (it's not a good idea for Nova to have
keystone admin credentials).
We then talked about whether or not to rely on a nova service user, but
ultimately decided against that.
So the plan is to re-use the Nova admin context passed in to perform a
check in keystone (HEAD or GET) with the given project_id which will
either fail or pass, and Nova can handle the result appropriately:
* If Nova gets a 200, then the ID exists and we continue processing the
request.
* If Nova gets a 403 then we don't have access to Keystone to perform
the check (the deployer would have to adjust Keystone's policy.json to
allow this). In this case I think we continue as we do today, maybe
logging a warning. Details on that will be sorted out in the spec review.
* If Nova gets a 404 then the ID isn't valid and we return a 400 to the
user.
There were some clarifying questions already in the dev list [3].
We also agreed that the Nova REST API won't be accepting a tenant name
lookup, that convenience can happen in clients like
python-openstackclient which already accepts name or id for project inputs.
We had some time left at the end of the session to cover two other items.
oslo.policy changes for policy defaults in code
-----------------------------------------------
This was just a nod to the Keystone team to review Andrew Laski's specs
[4], one of which is already approved (thanks Keystoners - is that what
you call yourselves?).
Service users between projects to avoid token timeouts
------------------------------------------------------
The idea here is to pass user information (user, role, project IDs) and
service token and KSA will check the expiration on the service token.
This is not yet implemented in KSA. The Keystone team is hoping to merge
this code in Newton so Nova could use it in Ocata. The good news is most
everything Nova is using for clients, e.g. cinderclient, glanceclient,
neutronclient, etc, are already using KSA.
This would also be an additive change to the context so it will work
with older computes. The only catch with this is you can't set the token
timeouts low until your nova computes are upgraded and using the updated
context. A multi-node CI job should be able to tease out issues with
this though.
[1] https://etherpad.openstack.org/p/newton-nova-keystone
[2] https://review.openstack.org/#/c/294337/
[3] http://lists.openstack.org/pipermail/openstack-dev/2016-May/094096.html
[4]
https://review.openstack.org/#/q/project:openstack/oslo-specs+branch:master+topic:policy_generation
--
Thanks,
Matt Riedemann
More information about the OpenStack-dev
mailing list