> On Jan 8, 2015, at 16:10, Sean Dague <s...@dague.net> wrote:
> 
>> On 01/08/2015 07:01 PM, Morgan Fainberg wrote:
>> 
>>> On Jan 8, 2015, at 3:56 PM, Sean Dague <s...@dague.net> wrote:
>>> 
>>> On 01/08/2015 06:29 PM, Morgan Fainberg wrote:
>>>> As of Juno all projects are using the new keystonemiddleware package for 
>>>> auth_token middleware. Recently we’ve been running into issues with 
>>>> maintenance of the now frozen (and deprecated) 
>>>> keystoneclient.middleware.auth_token code. Ideally all deployments should 
>>>> move over to the new package. In some cases this may or may not be as 
>>>> feasible due to requirement changes when using the new middleware package 
>>>> on particularly old deployments (Grizzly, Havana, etc).
>>>> 
>>>> The Keystone team is looking for the best way to support our deployer 
>>>> community. In a perfect world we would be able to convert icehouse 
>>>> deployments to the new middleware package and instruct deployers to use 
>>>> either an older keystoneclient or convert to keystonemiddleware if they 
>>>> want the newest keystoneclient lib (regardless of their deployment 
>>>> release). For releases older than Icehouse (EOLd) there is no way to 
>>>> communicate in the repositories/tags a change to require 
>>>> keystonemiddleware.
>>>> 
>>>> There are 2 viable options to get to where we only have one version of the 
>>>> keystonemiddleware to maintain (which for a number of reasons, primarily 
>>>> relating to security concerns is important).
>>>> 
>>>> 1) Work to update Icehouse to include the keystonemiddleware package for 
>>>> the next stable release. Sometime after this stable release remove the 
>>>> auth_token (and other middlewares) from keystoneclient. The biggest 
>>>> downside is this adds new dependencies in an old release, which is poor 
>>>> for packaging and deployers (making sure paste-ini is updated etc).
>>>> 
>>>> 2) Plan to remove auth_token from keystoneclient once icehouse hits EOL. 
>>>> This is a better experience for our deployer base, but does not solve the 
>>>> issues around solid testing with the auth_token middleware from 
>>>> keystoneclient (except for the stable-icehouse devstack-gate jobs).
>>>> 
>>>> I am looking for insight, preferences, and other options from the 
>>>> community and the TC. I will propose this topic for the next TC meeting so 
>>>> that we can have a clear view on how to handle this in the most 
>>>> appropriate way that imparts the best balance between maintainability, 
>>>> security, and experience for the OpenStack providers, deployers, and users.
>>> 
>>> So, ignoring the code a bit for a second, what are the interfaces which
>>> are exposed that we're going to run into a breaking change here?
>>> 
>>>    -Sean
>> 
>> 
>> There are some configuration options provided by auth_token middleware and 
>> the paste-ini files load keystoneclient.middleware.auth_token to handle 
>> validation of Tokens then converting the token data to an auth_context 
>> passed down to the service.
>> 
>> There are no external (should be no) interfaces beyond the __call__ of the 
>> middleware and options themselves.
> 
> Ok, so ... if this isn't out on the network, is the only reason this is
> an issue is that keystoneclient version is unbounded in the stable branches?
> 

That is a fair assessment of the situation. 

--Morgan
_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to