Wednesday, 2017-02-08

*** ducttape_ has quit IRC00:11
*** ducttape_ has joined #openstack-meeting-cp00:16
*** ducttape_ has quit IRC00:26
*** ducttape_ has joined #openstack-meeting-cp00:32
*** david-lyle has quit IRC00:42
*** diablo_rojo has quit IRC00:46
*** david-lyle has joined #openstack-meeting-cp01:04
*** Rockyg has quit IRC03:12
*** ducttape_ has quit IRC03:47
*** gouthamr has quit IRC03:49
*** ricolin has joined #openstack-meeting-cp03:55
*** ducttape_ has joined #openstack-meeting-cp04:12
*** ducttape_ has quit IRC04:27
*** ducttape_ has joined #openstack-meeting-cp04:28
*** ducttape_ has quit IRC04:38
*** ducttape_ has joined #openstack-meeting-cp05:39
*** ducttape_ has quit IRC05:48
*** cartik has joined #openstack-meeting-cp06:12
*** david-lyle_ has joined #openstack-meeting-cp07:37
*** alij has joined #openstack-meeting-cp07:42
*** ducttape_ has joined #openstack-meeting-cp07:45
*** ducttape_ has quit IRC07:52
*** alij has quit IRC07:52
*** alij has joined #openstack-meeting-cp07:52
*** alij has quit IRC07:55
*** alij has joined #openstack-meeting-cp08:09
*** alij has quit IRC08:09
*** david-lyle_ has quit IRC08:28
*** alij has joined #openstack-meeting-cp08:31
*** stevemar has quit IRC08:33
*** stevemar has joined #openstack-meeting-cp08:35
*** alij has quit IRC08:36
*** ricolin has quit IRC09:24
*** ricolin has joined #openstack-meeting-cp09:38
*** luzC- has joined #openstack-meeting-cp09:42
*** lbragstad_ has joined #openstack-meeting-cp09:43
*** topol_ has joined #openstack-meeting-cp09:44
*** dolphm_ has joined #openstack-meeting-cp09:44
*** dims_ has joined #openstack-meeting-cp09:44
*** dansmith_ has joined #openstack-meeting-cp09:44
*** dims has quit IRC09:45
*** topol has quit IRC09:45
*** dansmith has quit IRC09:45
*** luzC has quit IRC09:45
*** dolphm has quit IRC09:45
*** lbragstad has quit IRC09:45
*** rosmaita has quit IRC09:45
*** dolphm_ is now known as dolphm09:45
*** dansmith_ is now known as dansmith09:45
*** luzC- is now known as luzC09:45
*** rosmaita has joined #openstack-meeting-cp09:46
*** dansmith is now known as Guest4449209:46
*** cartik has quit IRC09:46
*** ducttape_ has joined #openstack-meeting-cp09:48
*** ducttape_ has quit IRC09:56
* ricolin test10:03
*** alij has joined #openstack-meeting-cp10:32
*** alij has quit IRC10:32
*** MarkBaker has joined #openstack-meeting-cp11:20
*** sdague has joined #openstack-meeting-cp11:38
*** ducttape_ has joined #openstack-meeting-cp11:47
*** ricolin has quit IRC11:54
*** ducttape_ has quit IRC12:20
*** david-lyle has quit IRC12:24
*** ducttape_ has joined #openstack-meeting-cp12:32
*** _ducttape_ has joined #openstack-meeting-cp12:34
*** _ducttape_ has quit IRC12:36
*** _ducttape_ has joined #openstack-meeting-cp12:36
*** ducttape_ has quit IRC12:37
*** MarkBaker has quit IRC12:39
*** _ducttape_ has quit IRC12:51
*** ducttape_ has joined #openstack-meeting-cp12:51
*** lbragstad_ is now known as lbragstad13:29
*** ducttape_ has quit IRC13:31
*** gouthamr has joined #openstack-meeting-cp13:34
*** gouthamr has quit IRC13:35
*** ricolin has joined #openstack-meeting-cp13:36
*** ducttape_ has joined #openstack-meeting-cp14:10
*** lamt has joined #openstack-meeting-cp14:26
*** Guest44492 is now known as dansmith14:28
*** dansmith is now known as Guest9404614:28
*** ducttape_ has quit IRC14:31
*** ducttape_ has joined #openstack-meeting-cp14:31
*** Guest94046 is now known as dansmith14:35
*** _ducttape_ has joined #openstack-meeting-cp14:37
*** ducttape_ has quit IRC14:38
*** lamt has quit IRC15:01
*** lamt has joined #openstack-meeting-cp15:12
*** gouthamr has joined #openstack-meeting-cp15:23
*** diablo_rojo_phon has joined #openstack-meeting-cp15:27
*** gouthamr has quit IRC15:30
*** spilla has joined #openstack-meeting-cp15:48
*** raj_singh_ has joined #openstack-meeting-cp15:48
*** scottda is now known as scottda_phone15:56
*** edmondsw has joined #openstack-meeting-cp16:00
lbragstad#startmeeting policy16:00
openstackMeeting started Wed Feb  8 16:00:47 2017 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:00
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:00
*** openstack changes topic to " (Meeting topic: policy)"16:00
openstackThe meeting name has been set to 'policy'16:00
*** ruan_20 has joined #openstack-meeting-cp16:00
lbragstadping raildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ruan, ayoung, stevemar, ravelar, morgan, raj_singh16:01
lbragstadagenda #link https://etherpad.openstack.org/p/keystone-policy-meeting16:01
*** gagehugo has joined #openstack-meeting-cp16:01
dstanekhowdy16:02
lbragstadnot sure if johnthetubaguy is around?16:02
lamto/16:02
lbragstaddstanek gagehugo edmondsw o/16:02
rderoseo/16:02
lbragstadlamt o/16:02
gagehugoo/16:02
edmondswo/16:03
ruan_20o/16:03
lbragstadwe'll give folks another minute to join before we get started16:03
lbragstadagenda #link https://etherpad.openstack.org/p/keystone-policy-meeting for those who need it16:04
*** Rockyg has joined #openstack-meeting-cp16:04
lbragstad#topic Nova's policy goals for Pike16:05
*** openstack changes topic to "Nova's policy goals for Pike (Meeting topic: policy)"16:05
lbragstadwe don't have much for announcements - so we can jump right in16:05
lbragstadjohnthetubaguy proposed a set of goals nova wants to accomplish for Pike16:05
lbragstad#link https://review.openstack.org/#/c/427872/16:06
johnthetubaguywe have a talk at the nova-api meeting today about things, we may be shifting focus a bit after that16:06
johnthetubaguybut its stuff we are actively discussing right now16:06
lbragstadjohnthetubaguy this one? #link http://eavesdrop.openstack.org/#Nova_API_Meeting16:07
johnthetubaguyyeah16:07
lbragstadjohnthetubaguy awesome - i'll see if I can swing by16:08
*** ravelar has joined #openstack-meeting-cp16:08
lbragstadthat spec has a lot of relevance with this meeting - so feel free to review it16:08
lbragstadI'm attempting to keep tabs on it - but i assume it will make for some good discussion at the PTG16:09
lbragstadwhich moves into our next topic16:09
lbragstad#topic Keystone specs for richer policy16:09
*** openstack changes topic to "Keystone specs for richer policy (Meeting topic: policy)"16:09
johnthetubaguyso I could cover quickly the discussion if that helps16:10
lbragstadafter seeing the work johnthetubaguy did for nova - i took a stab at doing the same for keystone #link https://review.openstack.org/#/q/status:open+project:openstack/keystone-specs+branch:master+topic:bp/richer-policy16:10
johnthetubaguysorry half in a stand up that was running long16:10
johnthetubaguyah, cool16:10
lbragstadjohnthetubaguy go for it16:10
johnthetubaguyso we are thinking we should focus on the docs16:10
*** jaugustine has joined #openstack-meeting-cp16:10
lbragstadjohnthetubaguy new docs or existing ones?16:11
johnthetubaguyso using olso.polcy16:11
johnthetubaguylet me get a link16:11
johnthetubaguy#link http://docs.openstack.org/developer/nova/sample_policy.html16:12
johnthetubaguythis is what nova today generates from the code16:12
lbragstadjohnthetubaguy nice16:12
*** antwash has joined #openstack-meeting-cp16:12
*** scottda_phone is now known as scottda16:12
johnthetubaguyso there is one doc comment in there alreday16:13
lbragstadjohnthetubaguy are the docs going to describe what each operation does?16:13
johnthetubaguyis terrible, but we have a route forward there16:13
johnthetubaguyso there is a nice way to think about this16:13
johnthetubaguyoperators should be able to read this sample policy file, and no longer have to read the code16:13
*** raj_singh_ has quit IRC16:14
johnthetubaguyif thats true, we did it right16:14
lbragstadjohnthetubaguy so exactly like configu16:14
johnthetubaguythats what we are doing for the configuration16:14
johnthetubaguyyeah16:14
lbragstadconfiguration*16:14
johnthetubaguyif you search for os_compute_api:os-attach-interfaces:create16:14
johnthetubaguyit has a quick note16:14
johnthetubaguyits almost good enough actually, and its just a one liner16:14
*** stvnoyes has quit IRC16:14
lbragstadso - would it look like? #link https://github.com/openstack/keystone/blob/029476272fb869c6413aa4e70f4cae6f890e598f/keystone/conf/auth.py#L22-L2816:15
*** stvnoyes has joined #openstack-meeting-cp16:15
johnthetubaguyso in the code we have this16:15
johnthetubaguyhttps://github.com/openstack/nova/blob/4f91ed3a547965ed96a22520edcfb783e7936e95/nova/policies/attach_interfaces.py#L2516:15
johnthetubaguyso yeah, basically the same16:15
johnthetubaguyright now all our rules have to be registered, and you get the chance to specify the docs16:15
lbragstadah - so the RuleDefault as a description attribute16:16
johnthetubaguyyeah16:16
johnthetubaguythe other side of this:16:16
johnthetubaguyhttps://github.com/openstack/nova/blob/master/tox.ini#L9116:16
johnthetubaguyits basically just like config16:16
lbragstadaha16:17
lbragstadwhen did the RuleDefault object get a description attribute?16:17
johnthetubaguythere is the upgrade conversation if we want to do renames, but basically I am thinking in pike we might focus on just getting some docs in there16:17
johnthetubaguylbragstad: not sure actually16:17
lbragstadi swear i checked for that last week16:17
johnthetubaguyhttps://github.com/openstack/oslo.policy/blob/9e3d46b1707152094cc2c2bdd45e22898d79140c/oslo_policy/policy.py#L79116:18
* johnthetubaguy shrugs16:18
johnthetubaguyseems like it got added with rule default16:19
lbragstadhuh - cool16:19
johnthetubaguythat was always our intention at least16:19
johnthetubaguyhttps://github.com/openstack/oslo.policy/commit/bb1127232695c07eb8e3622714b7de7cf7219ccc16:19
johnthetubaguyauto gen docs that match the config16:19
lbragstadso the auto generation already pulls the description16:19
johnthetubaguyyep16:19
lbragstadit looks like16:19
lbragstadthat's aweesome16:19
lbragstadthat is essentially the next topic i had on the agenda16:20
johnthetubaguyso yeah, for pike, we plan to fill that in16:20
dstanekjohnthetubaguy: i like this idea16:20
edmondswso just docs... any thought being given to the code changes that need to happen, like https://review.openstack.org/#/c/384148/16:20
dstanekjohnthetubaguy: you don't do anything dynamic with the rules through right? like at import time change the stuff that is in the list (besides the % operator stuff)?16:21
edmondswand one of the things I find most confusing in nova is that scope is restricted to the current project via code in some places (like it should be) but in other places you have to worry about scope in the policy file16:21
edmondswgood luck making that clear in docs...16:21
johnthetubaguyso right now, I have put about 1 billion things on the table to consider, I need to trim that down into some stages16:21
edmondswit needs to be fixed in code16:21
johnthetubaguydstanek: dynamic? why would you want that?16:21
johnthetubaguyedmondsw: yeah, thats on the "to fix" list, admin vs non admin used to be hardcoded to, but we have carefully removed that now, baby steps16:22
edmondswcool16:22
dstanekjohnthetubaguy: i wouldn't :-)16:22
dstanekjohnthetubaguy: i was just wondering if you guys did that16:22
johnthetubaguydstanek: heh, no worries16:22
johnthetubaguydstanek: I don't see any use case for it, most folks want to audit policy, dynamic seems to fight that somewhat16:22
lbragstadjohnthetubaguy the registration steps is what determines if you're going to use the default or a policy defined in an existing policy.json/yml file somewhere, right?16:23
johnthetubaguythe registration step is the default16:23
johnthetubaguywe don't have any policy file in tree any more16:23
lbragstadaha16:23
johnthetubaguyby default Nova works with no policy file being present on the disk16:23
*** david-lyle has joined #openstack-meeting-cp16:23
edmondswjohnthetubaguy, I would love to be involved in helping you fix the project scope check issue when you can get to it16:23
dstanekjohnthetubaguy: yeah, i agree. i was thinking that someone will eventually want to change policy based on config, or something else16:23
dstanekthen it's hard to know what is happening16:23
johnthetubaguyedmondsw: cool, more hands on there could really help16:24
johnthetubaguydstanek: now available capabilities of the system is a different thing, policy always stays static for me, like you say16:24
lbragstadjohnthetubaguy so far nova is the only project to put policy into code, right?16:24
johnthetubaguylbragstad: AFAIK, yes16:24
edmondswcinder has a spec for it, but didn't make ocata16:25
lbragstadso for keystone - that'd be our first step #link https://review.openstack.org/#/c/428453/16:25
johnthetubaguyso there is some fun tooling that helps you merge a file with the defaults in the code, and to help find what duplicates you have in your file, to help with upgrades16:25
edmondswlbragstad +116:25
johnthetubaguyhaven't had feedback on if that works for people yet, but its what they asked for16:25
smcginnisReally no progress on that on the Cinder side for now.16:26
lbragstadwe might be able to coordinate parallel efforts to fill in descriptions as we do that?16:26
dstaneklbragstad: this should be pretty easy to get in right? you haven't heard of any pushback have you?16:26
lbragstaddstanek no real pushback yet - but i'm continuing to advertise it16:26
lbragstadand still looking for feedback and people to help out with the effort16:27
lbragstad(the sooner we do that the sooner we'll be on the same page as nova/other projects)16:27
lbragstadwhich would make doing what johnthetubaguy wants easier16:27
dstaneklbragstad: let push in it before the haters have a chance to see it :-D16:27
lbragstaddstanek :)16:27
johnthetubaguyso there are some interesting thoughts earlier on turning the policy file upside down16:28
lbragstad"nothing to see here, move along citizen, move along"16:28
lbragstadjohnthetubaguy how so?16:28
johnthetubaguyright now we say { p1: admin_or_owner, p2: admin, p3:admin ...}16:28
johnthetubaguyas in define who can do each rule16:28
johnthetubaguybut as an operator really you want to see16:29
johnthetubaguy{ owner_can_do: [p1], admin_can_do: [p2, p3] }16:29
johnthetubaguyor something like that16:29
edmondsw+116:29
lamt+116:29
lbragstad++16:29
edmondswthat was popular quickly :)16:29
lbragstadi imagine that would play into capability APIs nicely16:30
johnthetubaguyso its totally sdague who brought that up, it seems to make sense16:30
lbragstadnova and cinder both have specs for capability APIs16:30
johnthetubaguynow that pivot might make sense before we add lots of roles16:30
sdagueI think the more important thing, is this could be new stanzas in the policy16:31
sdaguewhich wouldn't conflict with existing ones16:31
sdagueso there is a smooth transition across as it's additive16:31
lbragstadsdague ++16:31
edmondswhow would they not conflict?16:31
johnthetubaguythey take preference, and it looks different to the old cruft16:32
johnthetubaguyinteresting16:32
lbragstadyou would have to define both to be consistent, but then tell the enforcement point which one to use?16:32
johnthetubaguyI would say the new one wins, or you just fail to start if it conflicts16:32
johnthetubaguybut it means the old one still works16:33
lbragstadright16:33
johnthetubaguyand the new one would work16:33
johnthetubaguywhich is more important16:33
lbragstadso - that would be an alternative to the richer policy roles?16:33
edmondswso it's not the old way OR checks from the new way?16:34
lbragstador a prerequisite?16:34
johnthetubaguya way of making the richer policy defaults easier to deal with maybe?16:34
johnthetubaguyI quite like it as a prerequisite myself, the more I think about it16:34
edmondswI assume the new way still lets you do things besides just check role... e.g. operator can do p1 if xyz16:34
lbragstadput policy into code -> redefine policy by role instead of operation -> introduce more granular roles ?16:35
johnthetubaguyfor the record, there is loads to go through here, which is why I think I want to focus on getting the docs started :)16:35
lbragstadjohnthetubaguy yeah - i would think that'd be something we'd have to do regardless16:35
johnthetubaguylbragstad: I nova I we have some other de-cruft-i-fy bits that edmondsw hinted at earlier, but yeah, something like that16:35
johnthetubaguylbragstad: totally16:35
johnthetubaguyhmm, typing failed me there16:36
johnthetubaguyinsert some grammar bits as you see fit16:36
lbragstadi was able to parse it :)16:36
lbragstadso - does anyone see any red flags with the policy in code + documentation around the current operations?16:37
edmondswthese new stanzas being organized by role is pretty much the opposite of the approach ayoung was pushing to pull role checks out to middleware16:37
edmondswyou wouldn't do both16:38
johnthetubaguyso we would never be able to have all policy checks in middleware, unless it implemented most of our API for us16:39
johnthetubaguynow it would bring consistency, but the APIs already existing, and they aren't consistent enough16:39
edmondswyeah, that wasn't the proposal... just to do role checks, not the rest16:39
edmondswI think I like this better, at first glance16:39
johnthetubaguyhaving said that, maybe we want a "can access nova API" role check for all requests, that could be a thing I see people liking16:39
edmondswthis = sdague's proposal16:39
johnthetubaguyso we can still have standards to help with names etc16:40
johnthetubaguybut in reality we still need a list of all the rules, with documentation, else no one will have a clue whats going on16:40
sdagueedmondsw: don't consider this as formal as a proposal at this point, it is an observation of the way that admins think about and want to interact with our stuff16:40
lbragstadjohnthetubaguy ++16:41
lbragstadjohnthetubaguy that should only make "standardizing" a set of roles easier16:41
johnthetubaguythey are solving a different set of problems of course, some of this is agreeing on the most important problems to solve16:41
sdaguealso, having fought over all the complexity of roles for even the most basic things today in working through issues to cut the stable/ocata branch, I am skeptical the current course and speed on roles is helping operators16:42
edmondswsdague i.e., someone else should drive that if they think it's a good idea? :)16:42
edmondswsdague can you elaborate on that last comment a bit more?16:42
sdagueedmondsw: https://bugs.launchpad.net/keystone/+bug/166291116:43
openstackLaunchpad bug 1662911 in OpenStack Identity (keystone) "v3 API create_user does not use default_project_id" [Undecided,New]16:43
sdagueanyway, this is probably going to divert from the core discussion here16:43
sdagueI think the important thing on policy is to remember that it is an interface for operators for them to clearly express their intent of how they expect the system to work16:44
johnthetubaguysdague: ++16:44
sdagueand if that expression doesn't align with the way people think about it, they will introduce bugs and security issues16:44
johnthetubaguysomething tells me we need less granular rules for many things16:45
johnthetubaguyan operator cares about reading servers for a project, not listing, getting, filter, etc16:45
lbragstadjohnthetubaguy less granular than what we have today?16:46
sdaguejohnthetubaguy: right, though that's a project artifact16:46
johnthetubaguymaybe grouped or hierarchical16:46
lbragstadah - so grouping similar operations16:46
johnthetubaguythe other thing is we let people basically make the API non-interoperable today, which also feels bad (and I don't just mean fix it with API discoverability)16:46
johnthetubaguys/API/capability/16:46
sdaguejohnthetubaguy: yeh, one thing at a time16:47
johnthetubaguyyeah, sorry, as you see, I keep getting carried away16:47
lbragstadi think this is good - because it helps us figure out what the big picture should be16:47
johnthetubaguythe doc would should help us better understand what we have today, and should help operators come back with more interesting questions16:47
sdaguebecause I think the biggest concrete concern today is the system is confusing enough that it is really easy to have a giant security hole and not realize it16:47
johnthetubaguysdague: +100016:48
lbragstadsdague ++16:48
johnthetubaguy"oh that rule means any user can destroy my cloud now, whoops"16:48
lbragstadso - it still sounds like in order to do any of this we will need in-code policy16:49
johnthetubaguyI think so16:49
lbragstador in-code policy will make it much easier16:49
johnthetubaguyyeah, that16:49
lbragstaddoes anyone disagree with that assessment?16:50
*** ricolin has quit IRC16:50
edmondswjohnthetubaguy, I think we need to allow folks to customize listing, getting, etc individually... but I would love to see sensible defaults that use common rules... e.g. "os_compute_api:servers:show": "os_compute_api:servers:list" so if you want to change both you only have to change the list one16:51
* johnthetubaguy is hoping thats the silence of agreement16:51
edmondswor a new rule that both show and list point to by default, and you change that to change them both16:51
johnthetubaguyyeah, I am really meaning about adding a new rule as a default, at least at first16:52
johnthetubaguyhaving said that, I don't really get the use case for different rules for each of those16:52
*** david-lyle has quit IRC16:52
edmondsw99.8% of the time they're the same, but I do have cases where I've customized them differently16:53
lbragstadedmondsw can you share the 0.2%?16:53
johnthetubaguybut was the 0.2% a real deal break, or just because you could?16:53
edmondswI'll have to go find them...16:53
edmondswI think they were pretty important16:53
johnthetubaguyedmondsw: would be great to get data on that16:54
johnthetubaguynow if enable list would create a ddos, thats probably a slightly different case16:54
lbragstadFYI - we're at the 5 minute mark16:55
lbragstadedmondsw would you be interesting in bringing those use cases to the meeting next week?16:58
edmondswI will try to run them down16:58
lbragstadedmondsw cool16:58
lbragstaddoes anyone have any last minute things?16:58
lbragstadjohnthetubaguy sdague thanks for sharing16:59
johnthetubaguythanks, was a good discussion16:59
lbragstaddo we want to propose the upside-down-policy thing?17:00
lbragstadin a spec or something like that?17:00
lbragstadeither way - i can look into that. thanks for coming everyone!17:01
lbragstad#endmeeting17:01
*** openstack changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings"17:01
johnthetubaguyI don't have the bandwidth right now I am afraid17:01
openstackMeeting ended Wed Feb  8 17:01:16 2017 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:01
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-02-08-16.00.html17:01
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-02-08-16.00.txt17:01
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-02-08-16.00.log.html17:01
*** ravelar has left #openstack-meeting-cp17:04
*** gagehugo has left #openstack-meeting-cp17:09
*** david-lyle has joined #openstack-meeting-cp17:12
*** _ducttape_ has quit IRC17:19
*** ducttape_ has joined #openstack-meeting-cp17:20
*** breitz has left #openstack-meeting-cp17:28
*** topol_ is now known as topol17:33
*** gouthamr has joined #openstack-meeting-cp17:45
*** gouthamr has quit IRC17:50
*** diablo_rojo has joined #openstack-meeting-cp17:55
*** robcresswell has quit IRC18:35
*** soren has quit IRC18:35
*** nikhil has quit IRC18:35
*** patrickeast has quit IRC18:37
*** ediardo has quit IRC18:37
*** DuncanT has quit IRC18:37
*** igormarnat_ has quit IRC18:37
*** asingh_ has quit IRC18:37
*** ildikov has quit IRC18:37
*** ducttape_ has quit IRC18:39
*** spilla has left #openstack-meeting-cp18:44
*** morgan has quit IRC18:45
*** scottda has quit IRC18:45
*** sballe_ has quit IRC18:45
*** TheJulia has quit IRC18:45
*** ameade has quit IRC18:45
*** antwash has left #openstack-meeting-cp18:45
*** DuncanT has joined #openstack-meeting-cp19:31
*** ameade has joined #openstack-meeting-cp19:32
*** DuncanT has quit IRC19:35
*** sballe_ has joined #openstack-meeting-cp19:37
*** ducttape_ has joined #openstack-meeting-cp19:40
*** scottda has joined #openstack-meeting-cp19:44
*** soren has joined #openstack-meeting-cp19:48
*** DuncanT has joined #openstack-meeting-cp19:51
*** robcresswell has joined #openstack-meeting-cp19:55
*** david-lyle has quit IRC19:57
*** ildikov_ has joined #openstack-meeting-cp20:01
*** ildikov_ is now known as ildikov20:01
*** nikhil has joined #openstack-meeting-cp20:03
*** ducttape_ has quit IRC20:04
*** ducttape_ has joined #openstack-meeting-cp20:05
*** TheJulia has joined #openstack-meeting-cp20:05
*** patrickeast has joined #openstack-meeting-cp20:05
*** edtubill has joined #openstack-meeting-cp20:05
*** edtubill has left #openstack-meeting-cp20:06
*** morgan has joined #openstack-meeting-cp20:12
*** ediardo has joined #openstack-meeting-cp20:12
*** igormarnat_ has joined #openstack-meeting-cp20:13
*** david-lyle has joined #openstack-meeting-cp20:15
*** asingh_ has joined #openstack-meeting-cp20:16
*** david-lyle has quit IRC20:20
*** MarkBaker has joined #openstack-meeting-cp20:39
*** MarkBaker has quit IRC20:46
*** ducttape_ has quit IRC20:47
*** ducttape_ has joined #openstack-meeting-cp21:27
*** jaugustine has quit IRC22:13
*** gouthamr has joined #openstack-meeting-cp22:20
*** MarkBaker has joined #openstack-meeting-cp22:24
*** edmondsw has quit IRC22:41
*** edtubill has joined #openstack-meeting-cp22:54
*** edtubill has quit IRC23:05
*** ducttape_ has quit IRC23:48

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!