Wednesday, 2017-01-11

*** harlowja has quit IRC00:09
*** zerick has quit IRC00:12
*** markvoelker has quit IRC00:12
*** markvoelker has joined #openstack-meeting-cp00:12
*** zerick has joined #openstack-meeting-cp00:13
*** ildikov has quit IRC00:13
*** lcastell has quit IRC00:13
*** jroll has quit IRC00:14
*** lcastell has joined #openstack-meeting-cp00:17
*** ildikov has joined #openstack-meeting-cp00:21
*** jroll has joined #openstack-meeting-cp00:21
*** harlowja has joined #openstack-meeting-cp00:25
*** stvnoyes has quit IRC00:47
*** stvnoyes has joined #openstack-meeting-cp00:48
*** mestery has left #openstack-meeting-cp01:17
*** markvoelker has quit IRC01:43
*** markvoelker has joined #openstack-meeting-cp01:44
*** markvoelker has quit IRC01:49
*** gouthamr has quit IRC03:21
*** markvoelker has joined #openstack-meeting-cp03:36
*** kbyrne has quit IRC03:45
*** kbyrne has joined #openstack-meeting-cp03:48
*** ayoung has quit IRC03:53
*** sheel has joined #openstack-meeting-cp04:34
*** itisha has quit IRC06:12
*** dims has quit IRC06:13
*** MarkBaker has joined #openstack-meeting-cp06:28
*** sheel has quit IRC06:37
*** MarkBaker has quit IRC07:20
*** MarkBaker has joined #openstack-meeting-cp07:23
*** MarkBaker has quit IRC07:39
*** hogepodge has quit IRC07:56
*** sheeprine has quit IRC08:05
*** sheeprine has joined #openstack-meeting-cp08:09
*** edtubill has quit IRC08:13
*** lyarwood is now known as lyarwood_08:30
*** MarkBaker has joined #openstack-meeting-cp08:53
*** cartik has joined #openstack-meeting-cp08:59
*** MarkBaker has quit IRC09:27
*** cartik has quit IRC09:50
*** MarkBaker has joined #openstack-meeting-cp09:55
*** lyarwood_ is now known as lyarwood10:02
*** lyarwood is now known as lyarwood_10:03
*** MarkBaker has quit IRC10:31
*** sdague has joined #openstack-meeting-cp11:15
*** MarkBaker has joined #openstack-meeting-cp11:29
*** dims has joined #openstack-meeting-cp11:39
*** MarkBaker has quit IRC11:47
*** MarkBaker has joined #openstack-meeting-cp12:53
*** ducttape_ has quit IRC13:14
*** ducttape_ has joined #openstack-meeting-cp13:17
*** MarkBaker has quit IRC13:22
*** MarkBaker has joined #openstack-meeting-cp13:25
*** MarkBaker has quit IRC13:48
*** david-lyle has quit IRC13:56
*** crinkle_ has quit IRC13:59
*** david-lyle has joined #openstack-meeting-cp13:59
*** crinkle_ has joined #openstack-meeting-cp13:59
*** lamt has joined #openstack-meeting-cp14:01
*** zhipeng has joined #openstack-meeting-cp14:02
*** zhipeng has left #openstack-meeting-cp14:02
*** itisha has joined #openstack-meeting-cp14:11
*** jkomg has joined #openstack-meeting-cp14:13
*** ducttape_ has quit IRC14:14
*** david-lyle has quit IRC14:16
*** MarkBaker has joined #openstack-meeting-cp14:35
*** lamt has quit IRC14:40
*** ducttape_ has joined #openstack-meeting-cp14:45
*** gouthamr has joined #openstack-meeting-cp14:52
*** MarkBaker has quit IRC14:54
*** MarkBaker has joined #openstack-meeting-cp15:08
*** edtubill has joined #openstack-meeting-cp15:14
*** david-lyle has joined #openstack-meeting-cp15:17
*** david-lyle has quit IRC15:21
*** markvoelker has quit IRC15:28
*** jaugustine has joined #openstack-meeting-cp15:29
*** markvoelker has joined #openstack-meeting-cp15:29
*** markvoelker has quit IRC15:35
*** spilla has joined #openstack-meeting-cp15:36
*** diablo_rojo_phon has joined #openstack-meeting-cp15:38
*** MarkBaker has quit IRC15:50
*** diablo_rojo has joined #openstack-meeting-cp15:56
*** markvoelker has joined #openstack-meeting-cp15:57
lbragstadping raildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ruan, ayoung, stevemar16:00
*** edmondsw has joined #openstack-meeting-cp16:00
lbragstad#startmeeting policy16:00
openstackMeeting started Wed Jan 11 16:00:45 2017 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:00
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:00
*** openstack changes topic to " (Meeting topic: policy)"16:00
openstackThe meeting name has been set to 'policy'16:00
*** gagehugo has joined #openstack-meeting-cp16:01
gagehugoo/16:01
rderoseo/16:01
lbragstado/16:01
lbragstadwe'll wait a few minutes16:02
*** lamt has joined #openstack-meeting-cp16:03
lbragstadgagehugo rderose attendance is looking light today16:04
rderose:)16:04
gagehugolbragstad today seems like a slow day16:04
rderoseyep16:04
lbragstadit does16:04
lbragstadit *is* hump day though, so...16:05
gagehugotrue16:05
lbragstadalright - well let's go ahead and start16:05
lbragstadothers can join in whenever16:05
lbragstadit will probably be a quick meeting16:06
gagehugook16:06
lbragstad#topic updates from last meeting16:06
*** openstack changes topic to "updates from last meeting (Meeting topic: policy)"16:06
lbragstadlast time we met i had a couple action items to follow up with nova16:06
lbragstadand discuss their efforts on policy16:06
lbragstadwhich went really well, i ended up having a really good conversation with johnthetubaguy that was really insightful16:07
lbragstadhe was able to highlight some of the motivating factors behind why they wanted to codify their default policy16:07
lbragstadand it essentially boils down to the fact that it allows them to "alias" or deprecate default roles16:08
*** ravelar has joined #openstack-meeting-cp16:08
gagehugoah16:08
lbragstadso - this is similar to what we do when we use oslo.config to deprecate a configuration option16:08
*** ruan_18 has joined #openstack-meeting-cp16:08
lbragstadsomething like this - but for oslo.policy http://docs.openstack.org/developer/oslo.config/cfg.html#option-deprecation16:09
lbragstadbut another interesting side-effect of codifying policy that johnthetubaguy pointed out that I thought was really smart was that they use it as an exercise to assess all the default policy rules/roles16:09
lbragstadessentially going through each operation and asking "does this role assignment make sense for this operation?" "can it be improved?"16:10
lbragstadbecause once we have a way to deprecate things using oslo.policy, we have a way to start fixing those ^ depending on what the answer was16:11
lbragstaddoes that makes sense?16:11
lbragstador does anyone have questions?16:11
samueldmqhi, sorry I'm late16:11
lbragstadsamueldmq no worries16:11
*** ayoung has joined #openstack-meeting-cp16:12
samueldmqlbragstad: deprecate default roles or default rules ?16:12
samueldmq"and it essentially boils down to the fact that it allows them to "alias" or deprecate default roles"16:12
lbragstadsamueldmq so nova has a bunch of policy roles/rules they'd like to improve16:13
lbragstad(this came out of a discussion that I was having with johnthetubaguy about nova's policy work)16:13
samueldmqok, I have a question16:13
lbragstadand it seemed to be the driving factor behind them codifying their policy16:13
lbragstadsamueldmq shoot16:13
samueldmqwhen does the user hits the deprecation notice ?16:13
*** Rockyg has joined #openstack-meeting-cp16:13
samueldmqhit*16:13
lbragstadsamueldmq that'd probably be up to the oslo.policy implementation16:14
lbragstadbut it could be when the policy is registered so that the operator is aware16:14
samueldmqok, maybe when the policy.json is generated from code, that will be commented out in the file16:14
lbragstadjust like when a service starts we log deprecation warnings for deprecated configuration options16:14
samueldmqlbragstad: policy registered?16:14
lbragstadsamueldmq sorry - when the policy is loaded16:15
samueldmqmaybe I am missing something or asking dumb questions, sorry, just making sure I get all the context16:15
samueldmqkk16:15
lbragstadsamueldmq no worries - no dumb questions here16:15
samueldmqso it will be something similiar to:16:15
lbragstadsamueldmq that's another nice thing about codifying policy, is that we can generate policy files instead of maintain them16:15
lbragstad(because right now we maintain two)16:16
samueldmqoslo.policy.enforce(operation, this_is_the_default_rule)16:16
edmondswsamueldmq the policy.json wouldn't be generated from code... it would just stay in the code16:16
lbragstadright16:16
samueldmqif the actual rule in the .json is different than this_is_the_default_rule, thorw a warning ?16:16
lbragstadtechnically anything in the policy.json file would override the defaults in code16:16
edmondswthere is a tool to generate the policy.json from code, but that's not really for operators16:16
samueldmqedmondsw: so hw do operators customize it ?16:16
lbragstadso the policy.json file, if there is one, would only consist of overrides16:17
samueldmqif that's in the code16:17
edmondswsamueldmq they add to the blank policy.json file just the things that they want to customize16:17
lbragstadedmondsw ++16:17
lbragstadif an operator only needs to override the "get_user" operation, their keystone policy.json file would only have to consist of that override16:18
edmondswif they want to customize a whole lot, maybe they would use the tool to generate policy.json, and then go through it line by line and remove what they don't want to change and edit what they do16:18
samueldmqokay, that sounds good, just not getting how oslo.policy will detect an old (deprecated) rule16:18
lbragstadsamueldmq that's currently a gap in oslo.policy16:18
lbragstad(that work hasn't been done yet_16:18
samueldmqbut do we have an approach to it ?16:18
lbragstadwe're just entertaining the idea of what we could accomplish if we had that kind of ability16:18
lbragstadsamueldmq it would be similar to this pattern http://docs.openstack.org/developer/oslo.config/cfg.html#option-deprecation16:19
lbragstador similar developer experience16:19
edmondswlbragstad so how does nova intend to do deprecations?16:19
samueldmqI see, but...16:19
lbragstadedmondsw that's a great question for johnthetubaguy, but from my discussion with him, it sounds like they would include some sort of deprecated kwarg in the policy rule16:19
edmondswI'm not sure I see how deprecation warnings would ever be possible here16:19
samueldmqoption deprecation is for removal, not for changing default16:20
samueldmqwhich is the case of policy rules16:20
samueldmqedmondsw: exactly16:20
edmondswbut anyway... I love having policy in code :)16:21
lbragstadmaybe the word "deprecation" isn't right here16:21
lbragstadlet me try again16:21
edmondswwe probably don't have to design a deprecation strategy today16:21
lbragstadfrom what I understand - nova would want the ability to say this operation and this role is deprecated in favor of x16:21
samueldmqlbragstad: what is x ?16:22
lbragstadi.e. get_user + admin is deprecated in favor of get_user + cloud_admin16:22
edmondswlbragstad the problem is in how you'd allow the deployer to avoid that deprecation warning16:22
gagehugonew role?16:22
lbragstadedmondsw that could technically avoid it by overriding it all they want16:23
lbragstadedmondsw is that what you mean?16:23
lbragstads/that/they/16:23
edmondswlbragstad so at runtime check if the value is "x" which was the old setting, and issue a deprecation warning?16:24
samueldmqedmondsw: what if it was running on default ?16:25
lbragstadedmondsw yeah - that might be one approach16:25
edmondswa) that doesn't really solve the case where I don't care that nova has changed what they want the default to be, I still want to use this16:25
samueldmqif it was running on default, there is no way to issue a warning I think16:25
edmondswI shouldn't have to live with a deprecation warning forever because I have a different opinion on what I want the policy value to be16:25
lbragstadedmondsw true16:26
samueldmqchanging default will potentially have impact on upgrades16:26
samueldmqand a release note is how we notify deployers16:26
lbragstadedmondsw both are valid, how that's implemented in oslo.policy could take that into account16:26
samueldmqwhich is no different than we do thay16:26
edmondswand it doesn't give you a way to warn folks that aren't customizing policy when a default changes16:26
samueldmqtoday16:26
lbragstadedmondsw it could - i think16:27
lbragstadif we have policy in code, like we do with config, we have the ability to write tooling to provide those things16:27
edmondswanyway, I don't think that's a solvable problem, but there are other good reasons to codify policy as we've discussed before16:27
edmondswany other news from nova?16:27
lbragstadthat was pretty much it - they have a strong use case to deprecate specific policy check in favor of better defaults16:27
lbragstadwhich I think is totally valid16:28
lbragstadthere may be a few implementation things to work out16:28
samueldmqkk I would like to understand that better, maybe we should talk to them to clarify that16:28
lbragstadbut it will eventually allow them to deploy with a richer set of RBAC checks out of the box16:28
samueldmqwhat are the other use cases ? do you have some in mind ?16:28
lbragstad^ that's pretty much it16:29
samueldmqkk16:29
samueldmqhow does that fit with role checks on middleware ?16:29
samueldmqhave we thought about it yet ?16:29
edmondswsamueldmq for me the primary use case for codifying policy is that it makes it much easier to customize policy16:29
lbragstaddepending on how things are implemented in olso.policy, we might have a way to get to richer policy16:30
edmondswa) you know your policy.json is ONLY what you've customized16:30
edmondswb) you can see exactly what is using which codified policy settings by seeing where those vars pop up16:30
lbragstadsamueldmq i consider role check in middleware to be a separate approach that can be enabled by a deployer if they want to use it16:30
edmondswtoday it's a nightmare trying to find where different policy rules are actually being checked16:30
samueldmqlbragstad: kk I will very likely be working in a tool to validate policies this year, I'd like to get some input here16:32
samueldmqmaybe in the open discussion topic later16:32
lbragstadso - from a keystone perspective, if we wanted to move in that direction it's going to be extra tough since we have two policy files16:32
lbragstad#topic Update on consolidating policy files16:32
*** openstack changes topic to "Update on consolidating policy files (Meeting topic: policy)"16:32
lbragstadstevemar was going to check and see if henry was available for any discussions around this16:32
lbragstadbut I haven't seen him on in a while16:32
lbragstadwe might just have to dive in and figure things out16:33
lbragstadbecause in order to codify policy, we'd need to work from a file, and right now we have two of them16:33
samueldmqbut we've been always using policy.json16:33
samueldmqthe cloud one is just for reference afaict16:33
lbragstadsamueldmq sure - be we also maintain a separate one for cloud admin and v316:34
samueldmqyes, my opinion is that we should merge them by pulling some things from cloud sample16:34
samueldmqbut again, that would be changing a lot of defaults16:34
samueldmqwhich is a process we're tryign to improve16:35
lbragstadright - and it might take a while to get it right if we don't have the tribal knowledge that henry has around it16:35
stevemarlbragstad: henry has been a bit side tracked lately :(16:35
lbragstadwe should be sure to document things we hit that break it16:35
lbragstadstevemar that's what i figured16:35
lbragstadstevemar if he has any time to have that conversation, I'd be happy to accomodate regardless of the time delta16:36
edmondswlbragstad, you mentioned before how nova used the exercise of codifying policy to go through and check all their values... I think that merging the two policy files would naturally fit into that16:36
lbragstadstevemar or we can start a thread if that works better for everyone16:36
samueldmqlbragstad: that could work well16:36
edmondswas you go through and codify one thing at a time (shouldn't all be in one huge patch set), you look at both of our current policy files and pick a value to codify that will work for both cases16:36
lbragstadedmondsw so - you propose we start with codifying policy.json and then use it as a tool to consolidate the check in policy.v3cloudsample.json16:37
edmondswlbragstad yes16:37
lbragstadedmondsw ++ that's a good idea, too16:37
edmondswthere are a bunch of problems with the current v3cloudsample policy, so don't just grab the values there without looking at them and adding test cases to prove things work16:38
edmondswmore/better testing should be an integral part of this16:38
lbragstadedmondsw i like the idea of trying out the oslo.policy deprecation stuff with our own policy hiccups16:38
stevemarlbragstad: you're probably better off creating a ML post and sending a note to henry to check it out16:38
dstanekedmondsw: is there a documented list of problems anywhere?16:38
lbragstadstevemar ack - does anyone have objections to that?16:39
lbragstadif not all take that as an action item16:39
lbragstadI'll*16:39
dstanekit would be nice to capture all those things somewhere if not16:39
samueldmqdstanek: ml post ?16:39
edmondswdstanek unfortunately no... I just remember last time I tried to use things from it as a basis for my own customization I kept hitting issues16:39
samueldmqdstanek: ++16:39
edmondswI should have opened defects...16:39
samueldmqgoing further, is there a doc with all the roadmap for policy ?16:39
* edmondsw is kicking himself16:39
samueldmqwith usecases etc, that'd be great16:39
lbragstad#action lbragstad to send a note to dev mailing list to work out the mysteries of policy.v3cloudsample.json16:40
lbragstad#topic codifying policy.json into oslo.policy16:41
*** openstack changes topic to "codifying policy.json into oslo.policy (Meeting topic: policy)"16:41
edmondswwell we kinda already covered this :)16:41
lbragstadedmondsw yeah - just recapping16:41
dstanek#link https://etherpad.openstack.org/p/keystone-policy-usecases16:41
dstaneksamueldmq: ^ what we started with usecases16:41
samueldmqdstanek: thanks16:41
lbragstad1.) codify policy.json into oslo.policy using the same approach nova did16:41
lbragstad2.) use oslo.policy deprecation features as an exercise to consolidate policy.v3cloudsample.json16:42
lbragstad3.) continue moving towards richer policy out-of-the-box16:42
samueldmqhow's 1 ? I thought the rules would go in the project's code, not in oslo.policy16:42
lbragstadsamueldmq well - they do16:42
lbragstadthe checks would live in keystone, but still be checked by olso.policy16:43
samueldmqyep16:43
lbragstadthe policy file essentially gets turning into oslo.policy rule objects16:43
samueldmq++16:43
lbragstadso - the 3rd point from above is where it gets interesting16:43
samueldmqI am also a bit concerned about 2, I'd like to understand that better. would be great if we could clarify with nova folks16:43
edmondswI don't think #2 should mention deprecation... as discussed above, there's no deprecation method for this today, and that's probably not even a solvable problem16:43
samueldmqexactly, let's find an approach to it, I think the only way is via releasenotes anyways, just letting deployers know the default has changed16:44
lbragstadedmondsw so 2.) use oslo.policy to improve default policy checks16:44
lbragstad?16:44
edmondsw#2 should just be that as we move things into code, we have decide what values to put in the code... so it's a perfect time to look at both our policy files and see what they have and consider shortcomings and decide what makes the most sense to codify16:44
samueldmqa:X has changed to a:Y. then they can override a:Y with a:X in the file if they want the old rule16:44
lbragstadright16:45
lbragstadok16:45
lbragstadhow does everyone feel about this?16:45
samueldmqedmondsw: create new set of tests for every policy entry ?16:45
samueldmqlbragstad: sounds a good plan for me16:45
edmondsw2.) choose policy rule defaults to codify that will satisfy both single- and multi-domain cases (policy.json vs. policy.v3cloudsample.json)16:46
edmondswsamueldmq yes16:46
lbragstadedmondsw ++ that works16:46
samueldmqnice16:46
lbragstadis anyone interested in taking a stag at codifying what we have in policy.json?16:47
lbragstadstab*16:47
samueldmqthe goal with that is that we get rid of the .json file as much as we can, leaving there just the overrides.16:47
samueldmqis that correct ?16:47
edmondswyes... as you codify something, you remove it from the policy.json and policy.v3cloudsample.json, so those files get progressively shorter16:47
lbragstadout goal should be to get rid of it completely, but leave the ability for deployers to override if they choose16:47
dstaneksamueldmq: ++16:47
lbragstadour*16:47
edmondswyep16:48
lbragstadbecause it's one less thing for us to maintain16:48
samueldmqthat's the opposite of role check in middleware16:48
samueldmqwhich would require a full policy file, with only roles in the rules16:48
samueldmqanyone agree?16:48
edmondswno16:48
lbragstadwell - rbac in middleware could pull the defaults from oslo.policy objects, too16:48
edmondswsamueldmq why would role check in middleware care whether the policy defaults are in code vs json?16:48
lbragstadI don't think it would *require* a policy.json file.. i think it just requires there is a rule16:49
dstaneksamueldmq: i didnt' think so. my understanding is it moved a role check out to middleware, but policy largely does what it currently does16:49
samueldmqhow does the middleware captures the default from the service underneath it ?16:49
edmondswlbragstad ++16:49
edmondswsamueldmq it doesn't...?16:49
samueldmqthe default/the default rule16:49
lbragstadmiddleware is going to capture the operation based on the URL16:49
samueldmqokay, and where the role (to check) part come from ?16:50
ayoungMiddleware16:50
ayoungrole is the middleware part.  Scope is policy16:50
lbragstadfyi - 10 minute warning16:51
samueldmqayoung: where does the role part come from?16:51
samueldmqayoung: a rule is : URL: role.16:51
samueldmqURL comes from the request, where is the required role defined ?16:51
ayounghttps://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/role-check-from-middleware.html16:51
dstaneksamueldmq: keystone16:51
edmondswsamueldmq from what the user sets16:51
samueldmqhmm so the rules will be defined in keystone, and fetched by the middleware16:52
edmondswyep16:52
dstaneksamueldmq: yeah, take a look at the spec. it's pretty interesting16:53
samueldmqI will mull it a bit more, I mean both directions together16:53
lbragstadok - so any takers on the policy.json stuff?16:53
samueldmqif they will be complementary rather than alternatives16:53
samueldmqlbragstad: to write the tests ? or just to analyze the differences?16:54
lbragstadsamueldmq to start trying to get policy.json into code16:54
samueldmqlbragstad: I think we should start with the ML post, and see what henrynash thinks about it16:54
lbragstadsamueldmq i have that one as an action item for me16:54
lbragstadI'll get something written up16:55
dstanekso are we going to use the policy.json or the cloud policy as the base for this?16:55
lbragstaddstanek i think we are going to try and use policy.json as the base16:55
lbragstad(pending discussion with henry)16:55
*** jkomg has quit IRC16:56
dstaneklbragstad: i think that's a good idea otherwise existing deployments would have to have almost a complete policy.json to keep things working16:56
lbragstad++16:56
edmondswlbragstad I will help with reviews, but I'm not sure how much time I'll have to code on it... if i have time I'll pitch in16:56
dstaneki asked because it was started earlier that when things are hard coded they can be removed from policy.json and the cloud policy, but that really isn't true16:56
*** jkomg has joined #openstack-meeting-cp16:56
lbragstadedmondsw that'd be awesome16:57
*** Guinu has joined #openstack-meeting-cp16:57
lbragstaddstanek well - we'd be able to remove them from policy.json but not cloud policy16:57
edmondswdstanek I don't think one or the other is the basis... I think we look at both and pick a value that will work for both cases16:57
ayoungthere are things we need from cloud policy16:57
ayoungthe big one is that a lot of the tests assume admin is sufficient...but need domain scoped tokens16:58
lbragstad(that's gonna be fun)16:58
ayoungconverting over to rules that say "global admin, or admin on this domain" is going to be necessary16:58
edmondswyay!16:58
ayoungsee https://review.openstack.org/#/c/257636/15  for the latest attempot16:59
samueldmq1 minute left16:59
ayoungpasses keystone checks, but fails Tempest due to how roles are assigned (I think)16:59
dstanekedmondsw: i don't think you can mix and match - the cloud policy makes some assumptions that are not compatible without adding in lots of it16:59
edmondswdstanek like?16:59
lbragstadalright - i'll work on getting a ML post out today. let's spill over into #openstack-keystone!16:59
dstanekedmondsw: like ayoung said 'cloud admin' vs 'domain admin'17:00
samueldmqayoung: you still have a minute in -keystone ?17:00
lbragstad#endmeeting17:00
*** openstack changes topic to " (Meeting topic: cinder-nova-api-changes)"17:00
openstackMeeting ended Wed Jan 11 17:00:06 2017 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:00
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-01-11-16.00.html17:00
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-01-11-16.00.txt17:00
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-01-11-16.00.log.html17:00
*** Guinu has quit IRC17:00
*** gagehugo has left #openstack-meeting-cp17:01
*** jkomg has quit IRC17:01
*** ruan_18 has quit IRC17:06
*** jaugustine has quit IRC17:45
*** edmondsw has left #openstack-meeting-cp18:13
*** david-lyle has joined #openstack-meeting-cp18:15
*** david-lyle has quit IRC18:16
*** david-lyle has joined #openstack-meeting-cp18:16
*** jaugustine has joined #openstack-meeting-cp18:20
*** Rockyg has quit IRC18:51
*** jkomg has joined #openstack-meeting-cp18:59
*** jkomg has quit IRC19:03
*** jkomg has joined #openstack-meeting-cp20:02
*** ayoung has quit IRC20:06
*** jkomg has quit IRC20:11
*** jaugustine has quit IRC20:23
*** jaugustine has joined #openstack-meeting-cp20:24
*** jaugustine_ has joined #openstack-meeting-cp20:26
*** jaugustine has quit IRC20:26
*** jkomg has joined #openstack-meeting-cp20:52
*** jkomg has quit IRC20:53
*** jkomg has joined #openstack-meeting-cp20:53
*** xyang1 has joined #openstack-meeting-cp20:55
*** lyarwood_ is now known as lyarwood21:02
*** diablo_rojo_phon has quit IRC21:20
*** MarkBaker has joined #openstack-meeting-cp21:54
*** spilla has left #openstack-meeting-cp21:55
*** MarkBaker has quit IRC22:12
*** ayoung has joined #openstack-meeting-cp22:13
*** markvoelker has quit IRC22:29
*** markvoelker has joined #openstack-meeting-cp22:32
*** edtubill has quit IRC22:34
*** markvoelker has quit IRC22:34
*** markvoelker has joined #openstack-meeting-cp22:34
*** markvoelker_ has joined #openstack-meeting-cp22:39
*** markvoelker has quit IRC22:39
*** kberger has joined #openstack-meeting-cp22:41
*** ayoung has quit IRC22:51
*** ravelar has quit IRC22:53
*** ChanServ changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings"23:04
*** lamt has quit IRC23:11
*** markvoelker_ has quit IRC23:32
*** edtubill has joined #openstack-meeting-cp23:36
*** markvoelker has joined #openstack-meeting-cp23:40
*** edtubill has quit IRC23:40
*** xyang1 has quit IRC23:55

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!