14:01:06 #startmeeting Pulp Triage 2019-11-20 14:01:06 #info dkliban has joined triage 14:01:06 !start 14:01:06 Meeting started Wed Nov 20 14:01:06 2019 UTC. The chair is dkliban. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:01:06 Useful Commands: #action #agreed #help #info #idea #link #topic. 14:01:06 The meeting name has been set to 'pulp_triage_2019-11-20' 14:01:06 dkliban: dkliban has joined triage 14:01:30 #info dawalker has joined triage 14:01:30 !here 14:01:30 dawalker: dawalker has joined triage 14:01:57 I think as long as we just use it as is without any "next" commands it will just log everything, right? 14:02:01 we are going to temporarily use this etherpad https://etherpad.net/p/Pulp_-_RBAC_Use_Cases 14:02:09 yep 14:02:22 and then I'll move the content to a drive doc after the meeting and share it back out 14:02:28 sounds good 14:02:35 #info mikedep333 has joined triage 14:02:35 !here 14:02:36 mikedep333: mikedep333 has joined triage 14:03:11 I'd like anyone who has a use case to write it in that doc to get us started 14:03:12 cool 14:06:04 #info daviddavis has joined triage 14:06:04 !here 14:06:05 daviddavis: daviddavis has joined triage 14:06:17 #info dalley has joined triage 14:06:17 !here 14:06:17 dalley: dalley has joined triage 14:06:50 ok I see some there for starters 14:07:25 bmbouter: what's the scope of rbac? just users? not like orgs or anything else 14:08:09 also, are we doing user roles at all? like administrators 14:08:20 I think orgs, to be meaningful (to me) we need to have it apply w/ groups and also those groups can't be defined in pulp 14:08:24 wdyt? 14:08:38 yeah 14:08:58 we definitely wants orgs that are defined outside of pulp 14:09:14 yeah the easiest thing to do is not that 14:09:24 lol 14:09:33 but to be meaningful we can't ask people to "replicate" users in groups into pulp 14:10:40 yeah ... but i think pulp will need to replicate it 14:11:05 i am thinking that we want to apply RBAC at the database level 14:11:14 I imagined not replication but service integration 14:11:25 and in order to do that pulp needs to have information about the users/orgs in the db 14:11:59 perhaps, but let's talk use cases 14:12:11 yep .... do we want to start on line 3? 14:13:46 yes that's the one I submit to capture that requirement 14:14:07 as in "groups" are defined outside of pulp itself 14:14:13 re: line 3. is this any user that can do this? seems like we should have some concept of pulp admin 14:14:30 I call that specifically for groups because authentication already correctly identifies a user today 14:14:52 daviddavis: I want to reword to focus on the user 14:15:35 I reworded it some 14:15:48 that sounds better 14:15:54 also these are starter use cases, not a situation where we accept and we're committed 14:16:01 lol 14:16:19 * mikedep333 writes use cases from a previous job as a Katello/Satellite user. 14:16:50 more questions/idea on L#3, or can we move to the others 14:16:53 i am good with accepting line 3 as is now. 14:17:09 I wrote L#5 but I think it's similar to the one below 14:17:13 We should be thinking of CI pipeline use cases. Where pulp is the artifact storage at the end. 14:17:36 mikedep333: that sounds good 14:17:48 bmbouter: do you mean line 5 and 7 are similar? 14:17:56 yes 14:18:00 I'm removing L#5 (mine) 14:18:05 ok 14:18:20 new line 5 leaves some questions about who has access to give permissions 14:18:45 +1 14:19:30 so line 5 is about giving specific users access and line 7 is about doing the same thing on the group level 14:19:40 that's my understanding 14:20:29 are there any questions about line 5? 14:21:09 are there any other "levels" of access than admin and some level of granted permissions user? 14:21:27 like are there multiple admin levels or anything else we haven't covered? 14:24:38 I'm going to assume just boolean admin yes/no, everyone else is a user. 14:24:52 what we have described so far only has one level of admin and that allows the user to do everything 14:25:02 ok 14:25:05 next? 14:25:34 is that administrative user a pulp user? 14:25:50 I don't imagine the pulp admin is in control as much as whoever is administrating the IDM 14:26:01 identity management system == IDM == ldap 14:26:17 yeah ... the IDM should define who the admin for pulp is 14:26:39 are you all imagining that an IDM will be required to use pulp's rbac? 14:26:48 pulp needs to be configured to know what 'group' in the IDM is the 'admin' group for pulp 14:26:57 daviddavis: it's a good question 14:27:23 I'm hesitatant to try to have a light idm inside of pulp 14:27:33 but I can see why some segment of users would be really into that 14:27:53 noooo 14:28:05 daviddavis: to get the superset of use cases out there could you articulate that need as a use case itself? 14:28:10 I really think we should focus on what we're good at and not reinvent the wheel to add entirely different functionality 14:28:17 I liked the initial interfacing idea 14:28:39 IDM seems like the easy part 14:28:50 getting the perms management right seems hard 14:29:32 I believe articulating that "I don't need a separate" system/service would be valuable 14:29:35 as a use case 14:30:11 yep 14:30:18 what's the largest group size, ballpark? Are we talking an admin and a group of 5 users or are we talking hundreds where manual adding would be out of the question? 14:30:24 yea, at the very least, users should be able to use pulp without an IDM. whether they get rbac or not seems debatable 14:30:29 they come in all the sizes I think 14:30:58 +1 they shouldn't *have* to have another service 14:31:19 w.r.t L#5 and L#6 I was hoping to always use a "group" 14:31:42 as in membership to a group is what gives a user perms, (the Role in RBAC) 14:32:25 so I propose the strikethough edit on L#5 14:32:53 bmbouter: then we should just remove line 5 14:33:07 cause line 7 captures that 14:33:16 oic then +1 to that 14:33:19 I agree 14:33:22 let's strikethrough? 14:33:29 or nevermind 14:33:36 +1 remove to keep content simple 14:34:09 ok so the new L#5, any concerns/thoughts on that? 14:35:27 do admins assign these resources individually? 14:35:46 ah, I see someone's updated the use case 14:35:58 I modified some to call them out as object-level permissions 14:36:34 daviddavis: I think there are two scenarios (at least) 14:37:08 1) these objects already exist and the admin user is applying user/perms to them (that's L#5 and the easy case) 14:37:45 2) the admin assigned users to groups, new objects (content, repos, etc) get created and permissions get auto-created 14:38:55 yep 14:38:56 makes sense, I don't see 2 captured on this etherpad. should we add it? 14:39:05 daviddavis: yes somehow 14:39:23 in my reading prior to this meeting I've been reading that some folks do "object level perms" 14:39:42 that's really (1) btw because each object is owned by 1 role 14:40:03 what about multiple roles owning an object? 14:40:19 and others do "view based permissions" that's a permission model where it's positioned on what actions a user can take, e.g. I can or cannot create a new repo, the existing objects will never tell you that 14:40:55 brb 14:41:07 yes multiple roles owning an object it straightforward in the "assemble the super set of object level perms" but its not straightforward in terms of what a view can do 14:41:51 let's revisit/integrate view perms later I think L#5 captures the object-level concept well 14:42:03 and I'd like to cover all the suggested use cases in the 18 min remaining 14:42:09 ha 14:42:10 moving to L#7? 14:42:17 yea 14:43:59 conceptually this need is simple, content read/access is role based, so two users who sync the same repo will each see their "own"content in the senes that if you delete one (the content not the repo association) the other is still in tact 14:44:09 and this is full re-download for exapmle on the second sync 14:44:18 * bmbouter did not write this use case but has thought about it for a while 14:44:59 I guess we'll have to manage a set of views into content 14:45:00 yeah ... i wrote that one 14:45:20 this use case is key to legit multitenancy 14:45:20 if I "create" a content unit that already exists, I get permissions to view it 14:45:30 yes but you have to re-supply the bits 14:45:38 that seems inefficient (and it is) but it's extremely important 14:46:10 consider sensistive content inside pulp, not consider spoofing the sha256 of that content and you don't resupply the binary data itself, now you can bring in someone else's content... 14:46:19 s/not consider/now consider/ 14:46:55 alice uploads sensitive contnet, eve sync's in a spoofed repo w/ matching sha256 hashes and nevras, pulp makes alice's secure content available to eve 14:47:06 yeah 14:47:56 thoughts on this wording for now? 14:48:03 also, what about content that matches the unique_together fields but the other fields differ? 14:48:38 we'll have to adjust that to rfer to the content role that "owns" the content I imagine 14:48:45 in addition to unique_together 14:49:16 I see 14:50:24 I'm ok to accept L#7 as a descriptoin of that 14:50:53 cool ... i don't have a better description either 14:50:58 yeah. ten minutes. next line? 14:51:03 yes 14:51:17 L#9 looks straightforward and that makes sense to me 14:51:28 also L#12 too 14:51:43 these are well written use cases because they are very clearly rooted in a user workflow 14:51:53 Thanks :) 14:52:25 any concerns/discussion on L#9 or L#12? 14:53:22 nope, both are good 14:53:35 ok stop me we need more discussion on them 14:53:43 L#13 I think captures well what we talked about earlier 14:53:50 L#9 - we need to make it more specific, but i don't thikn we can do that without defining what constitutes an environment ifn Pulp 14:54:16 environment could be a tag that's applied to a Distribution 14:54:20 mmmmm 14:54:30 or an environment could be a specific Distribution 14:54:38 dkliban: want to capture that in an idea section at the bottom? 14:54:46 i will 14:54:56 ty 14:55:14 I need to write something to capture the view permissions but with our time ending I'm going to take an an AI 14:55:24 I propose we meet again in 1 week and I can schedule 14:55:35 +1 14:55:36 wdyt about ^ (or any closing comments?) 14:57:59 I'd like to see more involvement/input from actual users or just more team members if possible, but I'm ok with just this small working group of you all given the quality of research and thought you've put into it as well. 14:59:21 dawalker: +1 to more external input 15:00:13 bmbouter, do you intend to write up what you've got so far and share to a mailing list? 15:03:36 (I noted you mentioned the etherpad was temporary for this meeting since it's getting shut down) 15:05:53 #endmeeting