Wednesday, 2016-12-14

*** lamt has quit IRC00:02
*** itisha has quit IRC00:12
*** ativelkov has quit IRC00:15
*** ativelkov has joined #openstack-meeting-cp00:17
*** ducttape_ has joined #openstack-meeting-cp00:17
*** harlowja has joined #openstack-meeting-cp00:30
*** ducttape_ has quit IRC00:53
*** markvoelker has quit IRC01:29
*** piet has joined #openstack-meeting-cp01:29
*** ativelkov has quit IRC01:40
*** ativelkov has joined #openstack-meeting-cp01:40
*** ducttape_ has joined #openstack-meeting-cp01:53
*** ducttape_ has quit IRC01:55
*** ducttape_ has joined #openstack-meeting-cp01:55
*** ducttape_ has quit IRC02:09
*** ducttape_ has joined #openstack-meeting-cp02:21
*** ducttape_ has quit IRC02:56
*** EmilienM has quit IRC03:19
*** EmilienM has joined #openstack-meeting-cp03:20
*** coolsvap has joined #openstack-meeting-cp03:27
*** markvoelker has joined #openstack-meeting-cp03:30
*** markvoelker has quit IRC03:35
*** piet has quit IRC03:35
*** prateek has joined #openstack-meeting-cp03:49
*** ducttape_ has joined #openstack-meeting-cp03:57
*** ducttape_ has quit IRC04:01
*** prateek has quit IRC04:31
*** ducttape_ has joined #openstack-meeting-cp04:33
*** ducttape_ has quit IRC04:44
*** prateek has joined #openstack-meeting-cp05:09
*** prateek has quit IRC05:09
*** prateek has joined #openstack-meeting-cp05:14
*** markvoelker has joined #openstack-meeting-cp05:31
*** markvoelker has quit IRC05:37
*** ducttape_ has joined #openstack-meeting-cp05:44
*** ducttape_ has quit IRC05:49
*** markvoelker has joined #openstack-meeting-cp07:00
*** ducttape_ has joined #openstack-meeting-cp07:04
*** markvoelker has quit IRC07:06
*** ducttape_ has quit IRC07:24
*** MarkBaker has quit IRC08:07
*** ducttape_ has joined #openstack-meeting-cp08:25
*** ducttape_ has quit IRC08:30
*** markvoelker has joined #openstack-meeting-cp09:02
*** markvoelker has quit IRC09:07
*** itisha has joined #openstack-meeting-cp09:39
*** ducttape_ has joined #openstack-meeting-cp09:56
*** ducttape_ has quit IRC10:00
*** MarkBaker has joined #openstack-meeting-cp10:02
*** paquito12323 has joined #openstack-meeting-cp10:31
paquito12323hello10:32
*** paquito12323 has quit IRC10:33
*** MarkBaker has quit IRC10:56
*** markvoelker has joined #openstack-meeting-cp11:02
*** markvoelker has quit IRC11:07
*** sdague has joined #openstack-meeting-cp11:08
*** prateek_ has joined #openstack-meeting-cp11:21
*** prateek has quit IRC11:21
*** ducttape_ has joined #openstack-meeting-cp11:26
*** ducttape_ has quit IRC11:31
*** MarkBaker has joined #openstack-meeting-cp11:52
*** prateek_ has quit IRC12:14
*** ducttape_ has joined #openstack-meeting-cp12:57
*** ducttape_ has quit IRC13:01
*** markvoelker has joined #openstack-meeting-cp13:03
*** markvoelker has quit IRC13:08
*** ducttape_ has joined #openstack-meeting-cp13:09
*** bastafidli has joined #openstack-meeting-cp13:17
*** markvoelker has joined #openstack-meeting-cp13:24
*** bastafidli has quit IRC13:33
*** lamt has joined #openstack-meeting-cp13:35
*** lamt has quit IRC13:39
*** ducttape_ has quit IRC13:45
*** tongli has joined #openstack-meeting-cp13:56
topolreminder: InteropChallenge meeting is now held in #openstack-meeting-5 and due to DST starts at 9am EST (NOW!)14:04
*** bastafidli has joined #openstack-meeting-cp14:05
*** ducttape_ has joined #openstack-meeting-cp14:15
*** ducttape_ has quit IRC14:34
*** MarkBaker has quit IRC14:38
*** gouthamr has joined #openstack-meeting-cp14:43
*** tongli has left #openstack-meeting-cp14:48
*** MarkBaker has joined #openstack-meeting-cp14:49
*** jaugustine has joined #openstack-meeting-cp15:00
*** Rockyg has joined #openstack-meeting-cp15:08
*** gouthamr has quit IRC15:13
*** gouthamr has joined #openstack-meeting-cp15:15
*** ducttape_ has joined #openstack-meeting-cp15:16
*** jaugustine has quit IRC15:18
*** cebreidian_ has quit IRC15:30
*** spilla has joined #openstack-meeting-cp15:55
*** jaugustine has joined #openstack-meeting-cp15:57
*** _ducttape_ has joined #openstack-meeting-cp15:57
*** ayoung has joined #openstack-meeting-cp15:58
*** ruan_05 has joined #openstack-meeting-cp15:59
lbragstad#startmeeting policy16:00
openstackMeeting started Wed Dec 14 16:00:07 2016 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:00
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:00
*** openstack changes topic to " (Meeting topic: policy)"16:00
openstackThe meeting name has been set to 'policy'16:00
ayoungOyez oyez16:00
lbragstadping raildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ayoung, ruan_0516:00
*** ducttape_ has quit IRC16:00
rderoseo/16:00
*** edmondsw has joined #openstack-meeting-cp16:01
*** MarkBaker has quit IRC16:01
*** gouthamr has quit IRC16:01
*** gagehugo has joined #openstack-meeting-cp16:02
lbragstadwe'll give it a minute or two16:02
ayoungAgenda link?16:02
edmondswgonna try to be in 2 meetings at once, so we'll see how that goes16:02
lbragstad#link https://etherpad.openstack.org/p/keystone-policy-meeting16:02
ruan_05you have a question for me during the last meeting?16:02
*** dolphm has joined #openstack-meeting-cp16:03
ruan_05    External PDP and PEP hooks in oslo.policy [ruan]16:03
lbragstadruan_05 you had a topic on the agenda last meeting16:03
*** diablo_rojo_phon has joined #openstack-meeting-cp16:03
lbragstadruan_05 do you want to go through that today?16:03
ruan_05yes16:03
lbragstadruan_05 alright - i'll add it16:03
ayoungSo...how would we write the following as a use case?16:04
*** gouthamr has joined #openstack-meeting-cp16:04
lbragstadlet's wait for dstanek to show up16:04
lbragstadhe's been trying to collect a bunch of them16:04
ayoungTwo users need to collaborate.  They need a shared Network for their servers to talk on, but they each want to maintain controll of their own resources16:04
ayoungAnd, related16:05
ayoungTwo users want to collaborate.  One owns the quota for the servers, the other the storage16:05
ayoungare those embedded in the existing use cases, or are they new ones?16:05
*** gouthamr has quit IRC16:06
lbragstad#topic Review policy use cases16:06
*** openstack changes topic to "Review policy use cases (Meeting topic: policy)"16:06
lbragstad#link https://etherpad.openstack.org/p/keystone-policy-usecases16:06
lbragstadayoung those sound like new usecases16:06
rderoselbragstad:++16:07
lbragstadayoung so - as a user I want to be able to share resources with other users within my domain/project?16:08
ayoungthe second one is actually the MOC  Hardware federation one, but scaled back a bit16:08
ayounglbragstad, I was trying to avoid talking about projects in the definition16:08
lbragstadayoung are we talking about collaboration across all users regardless of the domain they are in?16:09
lbragstaddomain/project/whatever?16:09
ayoungI had been thinking about these in terms of HMT, but yes,  the idea is that, the way that Nova is defineid, all of the resources in play need to be in the same project , at least for the second use case16:09
ayoungfor the first one, it might be possible to link two servers together in different projects, making all the trickiness happen at the Neutron level16:10
lbragstadayoung what exactly do you mean by owning the quota and owning the storage?16:10
edmondswayoung I just assumed that first usecase would have the network shared across 2 projects... which you can already do16:10
ayoungedmondsw, yes, but don't you need an admin to set up that network for you now?16:11
ayoungas a non-admin user, there is no way to share a resource across projects16:11
lbragstadbut don't users really only care about things *in* their project?16:11
edmondswayoung oh, you want the non-admin to actually be the one to initiate sharing? I didn't get that from the first read16:11
edmondswayoung I don't know if you could do that today or not16:12
ayoungedmondsw, lbragstad so, lets think alongthe lines of "how can we push capabilities down to the lowest level without breaking security"16:12
ayoungright now, everything is in a project, and a user has the same power on all resources of the same class16:13
*** MarkBaker has joined #openstack-meeting-cp16:13
edmondswhttps://github.com/openstack/neutron/blob/master/etc/policy.json#L50 looks like allowing non-admin would require a policy change16:13
ayoungif we want people to have different levels of access in a single compute setup, how do we enforce that?16:13
ayoungIs i a question of mixing things from two different projects, or do we need to provide some gradiation of capability for the same type of resource withing a single project?16:14
ayoungedmondsw, is a shared network a global resource, or is it explicitly shared between two projects?16:15
lbragstadit sounds like the gradient comes from service attributes about the resource16:15
edmondswayoung a shared network belongs to one project, but can also be seen/used in others16:15
ayoungedmondsw, see, that is the abstraction I would like to see across the board16:16
ayounginode vs dentry in Filesystem speak16:16
edmondswneutron has done some good things with policy as far as allowing flexibility16:16
edmondswI assume the solution to your second usecase about quotas would follow some examples from neutron, actually16:16
lbragstadi agree that it should be possible to do that - but I'd still like to maintain the ability to keep my project a black box, too16:17
ayoungedmondsw, yeah, the volume created in cinder is kindof like the shared network16:17
edmondswneutron doesn't just have a check for create_network... they also have multiple other checks that they'll test if you try to create networks with certain parameters.16:17
ayoungI want it owned by Proj1, but used in Proj216:17
*** bastafidli has quit IRC16:18
edmondswyou could do the same kind of thing for different types of quotas16:18
edmondswhave one check to determine whether you're allowed to change quotas at all, and another to determine if you're allowed to change a specific quota16:18
ayoungedmondsw, I think of quoats in terms of HMT. They are resources managed by the containing project16:19
lbragstadayoung I added your first use case to the etherpad16:19
ayounglbragstad, Thanks16:19
ayounglbragstad, that is one of the questions that lead to this group being forms16:20
ayoungfomred16:20
edmondswayoung I don't think I said anything conflicting with that16:20
ayoungformed16:20
ayoungedmondsw, right, I think that they go hand in hand16:20
edmondswayoung maybe I didn't understand your use case16:20
lbragstadayoung edmondsw are we talking about the second one from above or a different one?16:20
ayoungIf I have a "quota" role on the parent, I can adjust the quota levels on the child projects16:21
edmondswayoung I thought you wanted project-level quota A to be changeable by user A and another project-level quota B (for the same project) changeable by another user16:21
ayoungbut I don't know if that is relvant here16:21
ayoung I think quota even in my use cases would be applied only on the project where the resource is created16:21
ayoungedmondsw, Ah, no.  I didn't specify that.16:22
*** thinrichs has joined #openstack-meeting-cp16:22
ayoungIt kind of implies a level between user and project, though16:23
ayoungwhich is one way we coud go:  resource groups inside a project.16:23
edmondswI'm confused :)16:23
ayoungIt would be a more granular label than just the project ID, but more course grained than userid16:23
ayoungedmondsw, all of this resolves to scope check16:23
lbragstadI am, too... I'm not sure what use case we're talking abou t16:24
ayoungright now, the only scope check we have is the project one16:24
ayoungand openstack (with small exceptions) assumes all resources for something are in the same project16:24
ayoungand all resources of the same type have the same access control16:24
ayoungwe've had several requests for "you can't power off my VMs" type access control16:25
lbragstadan example being all instances created within a project16:25
ayounglbragstad, right16:25
ayounglbragstad, say we havea project which is the development area for a project team16:25
lbragstadso - as a user, you want to tie operations to specific resources in a project16:25
ayounglbragstad, that is one way to define it16:26
ayoungI'm trying to make the use case more general16:26
ayoungsuch that we don't necessariuly need to redefinie the project scoping everywhere16:26
lbragstadit sounds like project scoping would be the loosened version of this type of checking16:27
ayoungbut we don't currentl have any operationes which check your roles on two different projects16:27
ayoungone possibility is that you use two tokens, one for each project in an operation16:27
ayoungsay we have a "mount" operation that exposes a volume created in one project to be mountable in a second project16:28
ayoungwould that be better or worse than trying to change the scope/permissions inside a single project?16:28
lbragstadfrom a usability perspective - that only really makes sense for operations across projects, which i think is a different use case from being able to tighten operations other people can do on resources I've created16:28
ayoungWould it be more useful, more powerful?16:28
ayounglbragstad, ah, but with HMT, we can solve the "what can yo udo on my resources"16:29
ayoungcreate a parent project for dev, give each developer their own sub projects16:29
ayoungSo if You do this, and the developers themselves want to be able to set up networking accross their individual projects to collaborate, we should be able to do that without making any of them admin16:30
lbragstadwell - that kind of solves the problem because you're creating more isolation which leads to using role assignments for access across the projects16:30
ayoungor if they want to share volumes, etc16:31
ayounglbragstad, right, that is how I've been thinking of the problem thus far16:31
lbragstadbut what happens if I don't have HMT16:31
lbragstadand I want to be able to give my users the same type of flexibility16:31
ayounglbragstad, why would you not have HMT?16:31
ayoungIt is par of Keystone16:31
lbragstadsure - just thinking about cases16:31
ayoungyou mean, what if you don't want to use it in a specific case?16:31
lbragstadsure16:32
ayoungright, so that is why I was trying to phrase the use case moregenerally16:32
ayoungI think you all get the point I was trying to make.16:32
lbragstadlet's say I have a set of users and they all live within the same project, is it useful to have the same flexibility16:32
lbragstadright16:32
*** _ducttape_ has quit IRC16:32
lbragstadso the use case sounds like 'as a user, i want to be able to restrict or open up specific operations on resources I create'16:33
lbragstads/create/own/16:33
ayoungSo, if they are in the same project, we need a way to distinguish access rights on two different resources of the same type16:33
*** ducttape_ has joined #openstack-meeting-cp16:33
ayounglbragstad, but what if *you* leave the project16:33
lbragstadwhich could span the same project or multiple16:33
ayoungI need to be able to transition your resources to, say ruan_0516:33
lbragstadright16:33
ayoungwithout tearing them down?16:33
lbragstador delete them, or whatever16:33
lbragstadthat would seem to fall on the admin's shoulders either way16:34
ruan_05fine granularity of access control inside a project16:34
lbragstadright?16:34
ayoungadmin scoped to the project should probably be OK with tearing them down, but that implies that we solve 96869616:34
ayoung4we need the power of something like admin scoped to a project without that admin being able to go all over the cloud and break things16:35
ayoungSo RBAC can handle that piece16:35
lbragstadsay i rage quit the project and my manager has to come in an dedicate my resources to ruan_05, or delete them, or both16:35
ayounglbragstad, purely theoretical16:35
ayoung:)16:36
lbragstadright16:36
lbragstad;)16:36
ayoungso manager delete can be done with RBAC16:36
ayoungtransition...I guess is just a new API on the resource16:36
lbragstadbut they would have to transition something16:36
ayounga PATCH with user_id....16:36
ayoungIFF we do user level ownership16:36
lbragstadthat way ruan_05 would get all the abilities i had when i was on the project16:37
ayoungand, how do we distinguish that a resource should have user level policy versus project level16:37
ayoungmix and match that in the same cloud?16:37
lbragstadwell - i can only think of cases where user level is more strict that project level16:37
ruan_05why can't we have both?16:37
lbragstadwhich sounds like keeping project level the default and opting into user level16:38
lbragstadruan_05 that's a good point, too16:38
lbragstadsay I don't care about exposing my instances to the rest of the people in my project, but I *do* care about my cinder volumes because that's where my data is16:38
ayoungso, this gets into what ruan_05 did with Moon. They extracted that information, what policy, who owns etc, into an external database16:38
ayoungThe unix model is 3 tiered:  user, group, world16:39
ruan_05our approach is one access control policy per project16:39
ayoungruan_05, so how many distinct projects are we talking about?16:40
ayoungand...is that for all apis, or just a subset?16:40
ruan_05as many as you want16:40
thinrichsruan_05: and can you share resources between projects?16:40
thinrichs(which policy would govern shared resources?)16:41
ayoungruan_05, its not what *I* want, it is what is the intention of the deployment.  If there are millions of projects, its going to be essnetially a new policy for each operations,16:41
ruan_05currently, we cannot share them between projects due to the openstack project isolation, theorically that's possible16:41
thinrichsayoung: people have *millions* of projects?16:42
thinrichseven thousands?16:42
ayoungthinrichs, is that really inconceivable?16:42
ruan_05ayoung: i consider this mechanism as an option, they can deactivate it16:42
ayoungthinrichs, thousands certainly16:42
lbragstadyeah16:42
ayoungruan_05, so...lets back off the solutions for a bit...I was trying to use them to illuminate the use cases16:43
ruan_05if user doesn't want finer control, they use default policy16:43
thinrichsHow do they get to thousands of projects?  One per user?16:43
lbragstadi attempted to add the user cases to the etherpad16:43
ayoungthinrichs, multiple per user16:43
lbragstadthinrichs that's a possibility, too16:43
ayoungone per user per task16:43
lbragstadthinrichs as a sign up service, i could create a new project for every customer that signs up for my service16:44
thinrichsThen sharing resources across projects seems like a clear use case.16:44
ruan_05ayoung: if you only have one user in a project, you don't need access control16:44
ayoungruan_05, only one user creating the project, but then they provide access to other users16:44
ayounglike directories16:44
ayoungI'm admin on my projects, you get _memer_16:44
thinrichslbragstad, ayoung: thanks for the background!16:44
ayoungmember16:44
ruan_05in this case, the owner decides who can access which resource16:45
lbragstadbut we're implying owner because there is only one admin per project16:45
ayoungright, but who decides what policy approach they can take?16:45
ruan_05if the owner doesn't want to do that, he uses default policy16:45
lbragstadowner isn't being implied by the actual resource itself16:45
ayoungIs the default policy always the baseline, and then they can "tighten it up" from there?16:46
ruan_05ayoung: you can leave this choice to users16:46
lbragstad14 minute mark16:46
lbragstadwe've got some additional use cases and i'll continue to clarify them with dstanek (and anyone else who is interested)16:46
ayoungruan_05, no you can't, because if a user can change policy on any API, it is an elevation of privs attack16:46
ayoungone other possiblity is to do something like "project specific roles"16:47
ruan_05when a user creates a project, he can decide whether to use default policy or create his own16:47
ayoungie...a set of roles, or groups, that only apply within a specific project16:47
ayoungand you could label resources, and have matching rules between roles and labels16:48
ayoungmore complex than I really want to get in to16:48
ruan_05ayoung: there jobs should be done by project owner16:48
ayoungDo we need to run through any of the other use cases explicitly?16:49
lbragstadi think that's it16:49
lbragstadi encourage everyone to keep thinking about them though16:49
lbragstadand revisiting the ones we came up with last wekk16:49
lbragstadweek*16:49
lbragstadsound good?16:50
lbragstadi want to give ruan_05 some time to go through the topic he had last week16:50
lbragstadi'll push the capabilities topic to next week16:51
lbragstad#topic External PDP and PEP hooks in oslo.policy16:51
*** openstack changes topic to "External PDP and PEP hooks in oslo.policy (Meeting topic: policy)"16:51
lbragstadruan_0516:51
lbragstadyou're up16:51
ruan_05we've tried to modify oslo.policy to redirect requests to an external PDP16:52
ruan_05it seems work well16:52
lbragstadruan_05 did you base that work on what ktychkova was doing?16:52
lbragstadruan_05 or was this a separate effort?16:52
ruan_05yes, the AP review16:53
lbragstadso #link https://review.openstack.org/#/c/237521/ specifically16:53
lbragstadruan_05 did you end up getting around the global role problem?16:53
ruan_05i think we can provide a general policy "hook" to support external PDP16:54
ruan_05in our test, we bypasse the global role16:54
lbragstadhow so?16:55
lbragstadapache fortress treats roles globally across the deployment, right?16:55
ruan_05we don't use AF, but another PDP16:55
lbragstadoh16:55
lbragstadwhat did you use?16:55
ruan_05Moon16:56
ruan_05Moon is an attribute-based access control policy engine16:56
lbragstadruan_05 right - did you have to make any additional modifications to the oslo.policy review?16:56
ruan_05some slight one16:56
lbragstadruan_05 are they documented anywhere?16:57
lbragstador is there a review?16:57
ruan_05no, not yet, we just want to test if https://review.openstack.org/#/c/237521/  can support other PDP16:57
ruan_05and we are convinced that https://review.openstack.org/#/c/237521/  is a good approch16:58
ruan_05for you information, before, we added the policy hook in Keystonemiddleware16:58
lbragstadruan_05 i'd be curious to see what the changes were and how it worked16:58
ruan_05I can send you some code, but not the final version16:59
lbragstadruan_05 posting a review publicly would be nice, that way others can see it and try it out, too16:59
thinrichsI'd be interested too16:59
ruan_05ok, I'll do it16:59
*** piet has joined #openstack-meeting-cp17:00
lbragstadruan_05 cool - i'll document that in the agenda17:00
lbragstadthat about wraps up our meeting17:00
lbragstadthanks for coming!17:00
lbragstadif there are additional things to discuss - head over to #openstack-keystone17:00
lbragstad#endmeeting17:00
*** openstack changes topic to " (Meeting topic: cinder-nova-api-changes)"17:00
openstackMeeting ended Wed Dec 14 17:00:36 2016 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:00
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-12-14-16.00.html17:00
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-12-14-16.00.txt17:00
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-12-14-16.00.log.html17:00
*** thinrichs has left #openstack-meeting-cp17:00
*** gagehugo has left #openstack-meeting-cp17:01
*** spilla has left #openstack-meeting-cp17:01
*** piet has quit IRC17:05
*** edmondsw has left #openstack-meeting-cp17:06
*** ruan_05 has quit IRC17:07
*** edtubill has joined #openstack-meeting-cp17:14
*** MarkBaker has quit IRC17:17
*** piet has joined #openstack-meeting-cp17:45
*** Rockyg has quit IRC18:07
*** david-lyle has quit IRC18:21
*** markvoelker has quit IRC18:29
*** david-lyle has joined #openstack-meeting-cp18:30
*** piet has quit IRC18:31
*** markvoelker has joined #openstack-meeting-cp18:35
*** ducttape_ has quit IRC18:39
*** diablo_rojo_phon has quit IRC18:50
*** ducttape_ has joined #openstack-meeting-cp18:50
*** lamt has joined #openstack-meeting-cp19:03
*** jgriffith is now known as jgriffith_AutoAw19:10
*** coolsvap has quit IRC19:19
*** bastafidli has joined #openstack-meeting-cp19:25
*** sdague has quit IRC19:43
*** sdague has joined #openstack-meeting-cp19:46
*** ayoung has quit IRC19:59
*** jgriffith_AutoAw is now known as jgriffith20:02
*** stvnoyes has quit IRC20:24
*** stvnoyes has joined #openstack-meeting-cp20:24
*** gouthamr has joined #openstack-meeting-cp20:33
*** ayoung has joined #openstack-meeting-cp20:46
*** ayoung has quit IRC20:49
*** jgriffith is now known as jgriffith_AutoAw20:53
*** _ducttape_ has joined #openstack-meeting-cp20:58
*** ducttape_ has quit IRC21:02
*** lamt has quit IRC21:02
*** _ducttape_ has quit IRC21:09
*** ducttape_ has joined #openstack-meeting-cp21:10
*** jgriffith_AutoAw is now known as jgriffith21:18
*** jgriffith is now known as jgriffith_AutoAw21:40
*** itisha has quit IRC21:42
*** jgriffith_AutoAw is now known as jgriffith21:45
*** bastafidli has quit IRC22:01
*** beekhof has quit IRC22:05
*** lamt has joined #openstack-meeting-cp22:17
*** edtubill has quit IRC22:26
*** jgriffith is now known as jgriffith_AutoAw22:39
*** gouthamr has quit IRC22:45
*** jgriffith_AutoAw is now known as jgriffith22:51
*** ducttape_ has quit IRC22:51
*** gouthamr has joined #openstack-meeting-cp22:57
*** jaugustine has quit IRC23:12
*** ducttape_ has joined #openstack-meeting-cp23:24
*** sdague has quit IRC23:31
*** bastafidli has joined #openstack-meeting-cp23:52
*** bastafidli has quit IRC23:57

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!