Re: [openstack-dev] [Sahara] Swift authentication and backwards compatibility

2014-08-15 Thread Trevor McKay
Thoughts, rapidfire :)

In short, I think we should plan on backward compat unless some stubborn
technical problem gets in our way 

I think backward compatibility is a good idea.  We can make the
user/pass inputs for data objects optional (they are required
currently), maybe even gray them out in the UI with a checkbox to turn
them on, or something like that.

Sahara can detect whether or not the proxy domain is there, and whether
or not it can be created.  If Sahara ends up in a situation where it
thinks user/pass are required, but the data objects don't have them,
we can return a meaningful error.

The job manager can key off of the values supplied for the data source
objects (no user/pass? must be proxy) and/or cluster configs (for
instance, a new cluster config could be added -- if it's absent we
assume "old" cluster and therefore old hadoop swfit plugin).  Workflow
can be generated accordingly.

The hadoop swift plugin can look at the config values provided, as you
noted yesterday, and get auth tokens in either manor.

Best,

Trev


On Thu, 2014-08-14 at 22:20 -0400, Michael McCune wrote:
> hello Sahara folks,
> 
> I am working to get the revamped spec[1] finalized and I'd like to know the 
> group's thoughts on the idea of backward compatibility. It is possible to 
> implement the new authentication method and remain backward compatible, but 
> we will need to keep the username and password inputs in the Swift data forms.
> 
> Having the backward compatibility would also give Sahara a way to react in 
> situations where the proxy domain is not available or the administrator 
> doesn't wish to use it. I'm not sure this is the behavior we want, but I 
> don't know if it is proper for Sahara to exit if no proxy domain can be found.
> 
> If we choose not to remain backward compatible then we are requiring Sahara 
> operators to create the new proxy domain needed, and they must update all 
> virtual machine images.
> 
> Thoughts?
> 
> regards,
> mike
> 
> [1]: https://review.openstack.org/#/c/113591/
> 
> ___
> OpenStack-dev mailing list
> OpenStack-dev@lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev



___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] [Sahara] Swift authentication and backwards compatibility

2014-08-15 Thread mike mccune

thanks for the thoughts Trevor,


On 08/15/2014 09:32 AM, Trevor McKay wrote:

I think backward compatibility is a good idea.  We can make the
user/pass inputs for data objects optional (they are required
currently), maybe even gray them out in the UI with a checkbox to turn
them on, or something like that.


This is similar to what I was thinking. We would allow the username and 
password inputs to accept a blank input.


I also like the idea of giving some sort of visual reference, like 
graying out the fields.



Sahara can detect whether or not the proxy domain is there, and whether
or not it can be created.  If Sahara ends up in a situation where it
thinks user/pass are required, but the data objects don't have them,
we can return a meaningful error.


I think it sounds like we are going to avoid having Sahara attempt to 
create a domain. It will be the duty of a stack administrator to create 
the domain and give it's name in the sahara.conf file.


Agreed about meaning errors.


The job manager can key off of the values supplied for the data source
objects (no user/pass? must be proxy) and/or cluster configs (for
instance, a new cluster config could be added -- if it's absent we
assume "old" cluster and therefore old hadoop swfit plugin).  Workflow
can be generated accordingly.


This sounds good. If there is some way to determine the version of the 
hadoop-swiftfs on the cluster that would be ideal.



The hadoop swift plugin can look at the config values provided, as you
noted yesterday, and get auth tokens in either manor.


exactly.



mike

___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] [Sahara] Swift authentication and backwards compatibility

2014-08-18 Thread Dmitry Mescheryakov
Hello people,

>> I think backward compatibility is a good idea.  We can make the
>> user/pass inputs for data objects optional (they are required
>> currently), maybe even gray them out in the UI with a checkbox to turn
>> them on, or something like that.
>
>
> This is similar to what I was thinking. We would allow the username and
> password inputs to accept a blank input.

I like the idea of keeping backward compatibility by supporting
username/password. And also I really dislike one more config (domain
for temp users) to be mandatory. So supporting old behaviour here also
simplifies deployment, which is good especially for new users.

Thanks,

Dmitry


2014-08-15 18:04 GMT+04:00 mike mccune :
> thanks for the thoughts Trevor,
>
>
>
> On 08/15/2014 09:32 AM, Trevor McKay wrote:
>>
>> I think backward compatibility is a good idea.  We can make the
>> user/pass inputs for data objects optional (they are required
>> currently), maybe even gray them out in the UI with a checkbox to turn
>> them on, or something like that.
>
>
> This is similar to what I was thinking. We would allow the username and
> password inputs to accept a blank input.
>
> I also like the idea of giving some sort of visual reference, like graying
> out the fields.
>
>
>> Sahara can detect whether or not the proxy domain is there, and whether
>> or not it can be created.  If Sahara ends up in a situation where it
>> thinks user/pass are required, but the data objects don't have them,
>> we can return a meaningful error.
>
>
> I think it sounds like we are going to avoid having Sahara attempt to create
> a domain. It will be the duty of a stack administrator to create the domain
> and give it's name in the sahara.conf file.
>
> Agreed about meaning errors.
>
>
>> The job manager can key off of the values supplied for the data source
>> objects (no user/pass? must be proxy) and/or cluster configs (for
>> instance, a new cluster config could be added -- if it's absent we
>> assume "old" cluster and therefore old hadoop swfit plugin).  Workflow
>> can be generated accordingly.
>
>
> This sounds good. If there is some way to determine the version of the
> hadoop-swiftfs on the cluster that would be ideal.
>
>
>> The hadoop swift plugin can look at the config values provided, as you
>> noted yesterday, and get auth tokens in either manor.
>
>
> exactly.
>
>
>
> mike
>
>
> ___
> OpenStack-dev mailing list
> OpenStack-dev@lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev