Wednesday, 2017-02-15

*** lamt has quit IRC00:08
*** sdague has joined #openstack-meeting-cp01:31
*** sdague has quit IRC01:40
*** gouthamr has quit IRC02:45
*** gouthamr has joined #openstack-meeting-cp02:46
*** markvoelker_ has joined #openstack-meeting-cp03:02
*** robcresswell_ has joined #openstack-meeting-cp03:04
*** igormarnat__ has joined #openstack-meeting-cp03:04
*** nikhil_ has joined #openstack-meeting-cp03:05
*** nikhil_ is now known as Guest1620003:05
*** tonyb_ has joined #openstack-meeting-cp03:06
*** dmellado_ has joined #openstack-meeting-cp03:06
*** reed_ has joined #openstack-meeting-cp03:06
*** rosmaita_ has joined #openstack-meeting-cp03:07
*** mugsie|a1t has joined #openstack-meeting-cp03:07
*** phealy has quit IRC03:07
*** docaedo_ has joined #openstack-meeting-cp03:07
*** igormarnat_ has quit IRC03:07
*** nikhil has quit IRC03:07
*** dmellado has quit IRC03:07
*** markvoelker has quit IRC03:07
*** smcginnis has quit IRC03:07
*** reed has quit IRC03:07
*** tonyb has quit IRC03:07
*** rosmaita has quit IRC03:07
*** bswartz has quit IRC03:07
*** robcresswell has quit IRC03:07
*** docaedo has quit IRC03:07
*** lbragstad has quit IRC03:07
*** mugsie|alt has quit IRC03:07
*** igormarnat__ is now known as igormarnat_03:07
*** smcginnis_ has joined #openstack-meeting-cp03:07
*** phealy has joined #openstack-meeting-cp03:07
*** smcginnis_ is now known as smcginnis03:07
*** reed_ is now known as reed03:08
*** lbragstad has joined #openstack-meeting-cp03:08
*** robcresswell_ is now known as robcresswell03:09
*** Guest16200 is now known as nikhil03:09
*** rosmaita_ is now known as rosmaita03:18
*** tonyb_ is now known as tonyb03:21
*** ricolin has joined #openstack-meeting-cp03:29
*** docaedo_ is now known as docaedo03:59
*** gouthamr has quit IRC04:01
*** MarkBaker has joined #openstack-meeting-cp06:16
*** cmurphy has quit IRC09:16
*** cmurphy has joined #openstack-meeting-cp09:17
*** ricolin has quit IRC09:35
*** sdague has joined #openstack-meeting-cp11:34
*** ricolin has joined #openstack-meeting-cp12:21
*** gouthamr has joined #openstack-meeting-cp13:14
*** bswartz has joined #openstack-meeting-cp13:39
*** lamt has joined #openstack-meeting-cp13:45
*** lamt has quit IRC13:49
*** lamt has joined #openstack-meeting-cp14:20
*** dmellado_ is now known as dmellado14:27
*** lamt has quit IRC14:32
*** lamt has joined #openstack-meeting-cp14:49
*** lamt has quit IRC14:56
*** lamt has joined #openstack-meeting-cp14:56
*** ricolin has quit IRC15:07
*** ricolin has joined #openstack-meeting-cp15:08
*** lamt has quit IRC15:23
*** lamt has joined #openstack-meeting-cp15:29
*** diablo_rojo has joined #openstack-meeting-cp15:44
*** MarkBaker has quit IRC15:51
*** diablo_rojo_phon has joined #openstack-meeting-cp16:00
*** edmondsw has joined #openstack-meeting-cp16:00
lbragstad#startmeeting policy16:01
openstackMeeting started Wed Feb 15 16:01:08 2017 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:01
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:01
*** openstack changes topic to " (Meeting topic: policy)"16:01
openstackThe meeting name has been set to 'policy'16:01
lbragstadping antwash, raildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ruan, ayoung, stevemar, ravelar, morgan, raj_singh16:01
johnthetubaguyo/16:02
lbragstadjohnthetubaguy o/16:02
lamto/16:02
rderoseo/16:02
lbragstadwe will wait for a few others to show up16:02
*** MarkBaker has joined #openstack-meeting-cp16:03
lbragstadwho's excited for next week?!16:03
*** ayoung has joined #openstack-meeting-cp16:03
raj_singho/16:03
edmondswo/16:03
*** antwash has joined #openstack-meeting-cp16:03
*** gagehugo has joined #openstack-meeting-cp16:03
gagehugoo/16:03
lbragstadthere we go - now we're getting some people16:03
antwasho/16:04
dstaneko/16:04
gagehugothis meeting always sneaks up on me16:04
edmondswgatehugo +116:04
lbragstad#topic PTG Policy Meeting16:04
*** openstack changes topic to "PTG Policy Meeting (Meeting topic: policy)"16:04
lbragstadso it looks like we were able to find a time to get a couple projects together to talk at the PTG16:05
lbragstadspecifically nova, cinder, and keystone16:05
lbragstadwe're going to meet on Thursday 1:30 - 2:30 PM in South Capital (level 1)16:05
* lbragstad is still in the middle of scheduling sessions16:05
lbragstadbut I plan to send out something a little more official along with a dedicated etherpad by the end of the week (at the absolute latest)16:05
lbragstadI wanted to bring it up here so that folks could get it on their calendars if they are planning to participate in that discussion16:06
edmondswwill plan on it16:06
lbragstadany questions on the time or the place?16:06
ayounglbragstad, let me know if you can get remote presence16:07
lbragstadayoung ack16:07
* lbragstad sticks a post-it on his monitor 16:07
lbragstadalright - moving on16:08
lbragstad#topic Review/discuss policy specs16:08
*** openstack changes topic to "Review/discuss policy specs (Meeting topic: policy)"16:08
lbragstad#link https://review.openstack.org/#/c/433010 (nova-specs: Add policy-docs spec)16:08
lbragstad#link https://review.openstack.org/#/c/433037 (nova-specs: Add policy-remove-scope-checks spec)16:08
lbragstad#link https://review.openstack.org/#/c/427872 (nova-specs: Add additional-default-policy-roles spec)16:08
lbragstad#link https://review.openstack.org/#/c/428453 (keystone-specs: Policy in code)16:08
lbragstadso - johnthetubaguy has been doing a bunch of work in nova-specs that outline what they are trying to do16:08
dstaneklbragstad: are these part of what we'll be discussing at the PTG?16:09
lbragstaddstanek yeah16:09
lbragstadthose are likely going to be required reading before the session16:09
*** morgan_ is now known as morgan16:10
lbragstadjohnthetubaguy do you have anything in particular you want to discuss about any of those?16:10
johnthetubaguythe remove scope checks one is interesting16:10
lbragstadjohnthetubaguy i know you recently reworked a couple of them based on the outcomes of last weeks meeting16:10
johnthetubaguyidea came from dstanek's comment16:11
johnthetubaguybasically I am proposing we remove the use of target from all our policy checks16:11
johnthetubaguyroughly speaking16:11
ayoungjohnthetubaguy, you are aware of the work I was doing to fix is_admin, right?16:11
johnthetubaguyayoung: roughly yeah, its very similar idea I think16:12
ayoungjohnthetubaguy, can you take that and fix the whole thing?16:12
ayoungjohnthetubaguy, https://review.openstack.org/#/c/384148/16:12
ayoungit needs changes to the Tempest tests in order to pass16:12
johnthetubaguyoh, didn't know there was a patch out there16:12
johnthetubaguyso if tempest fails, we broke the API right, so thats really bad surely?16:12
edmondswno, just bad tests16:13
ayoungjohnthetubaguy, nope16:13
ayoungit is just test assumptions:16:13
ayoungthat admin can be in any random project16:13
johnthetubaguyso my proposed change is quite different to your proposal16:13
ayoung and with that patch, and enforcement turned on, admin needs to be in the admin_project16:13
ayoungbad tests16:13
ayoungjohnthetubaguy, I know.  I am not working on Keystone full time anymore. If you don't take it and run with it, it is not going to happen16:14
ayoungand without nova support, nothing happens in OpenStack16:14
edmondswayoung I'm still trying to find time to push that patch16:14
edmondswbut could definitely use some nova core help16:14
johnthetubaguyso lets turn that around a second16:15
johnthetubaguyif we implemented it the way proposed here: https://review.openstack.org/#/c/43303716:15
*** ravelar has joined #openstack-meeting-cp16:15
johnthetubaguyI believe that also fixes the bug you are trying to fix in the above patch (and fixes a few other gremlins too)16:15
ayoungjohnthetubaguy, um...does it fix it, or just push it around?16:15
johnthetubaguyI believe it fixes it16:16
johnthetubaguyif it doesn't thats great feedback to get16:16
johnthetubaguyprobably means I miss understood the bug16:16
ayoungjohnthetubaguy, does not look like it.  But the solution could be rewritten in terms of that spec16:16
edmondswjohnthetubaguy I'll add that to my reading list and let you know :)16:16
ayoungjohnthetubaguy, there are 2 types of admin checks16:16
johnthetubaguyah, so maybe its this spec that fixes it all together16:16
ayoungproject scoped and global16:16
johnthetubaguyhttps://review.openstack.org/#/c/42787216:16
lbragstadi've review a couple of them ( #link https://review.openstack.org/#/c/433010 is really straight forward)16:17
ayoungjohnthetubaguy, yes, that looks better16:17
johnthetubaguybasically doing the fix in two steps16:17
johnthetubaguyforgot how I split that up, oops16:17
ayoungjohnthetubaguy, there was a cross project spec along those lines years ago.  I think you are on the right track16:17
lbragstadayoung ++16:17
johnthetubaguyyeah, its using lots of stuff from that one16:18
ayounglbragstad, meanwhile, the Keystone patches are also sitting there...16:18
ayounghttps://review.openstack.org/#/c/387161/16:18
lbragstadayoung I need to finish reading johnthetubaguy final proposal (I ran out of battery last night)16:18
ayounghttps://review.openstack.org/#/c/387710/16:18
ayoungand then16:18
ayounghttps://review.openstack.org/#/c/257636/1616:19
ayounglbragstad, this is very tactical, practical, and acheiveable goals.  I am not going to continue to update the patches. Merge them, or abandon them as you see fit.  Let someone else hack on them...I'm, willing to review16:21
lbragstadayoung added them to my list16:21
ayoungbut this is pre-req to any future policy work being on a sound footing16:21
lbragstadwe also have #link https://review.openstack.org/#/c/428453 (keystone-specs: Policy in code)16:21
lbragstadwhich ravelar and antwash have spoken for16:22
lbragstad(thanks guys)16:22
antwashlbragstad : you're welcome ++16:22
ayounglbragstad, there are comparable patches for Glance and Cinder.  But, if johnthetubaguy is going to redo Nova's approach, perhaps we wait to see wha he learns before redoing those patches16:22
lbragstadayoung totally on board there16:22
johnthetubaguyso I was also adding the nova-member thing16:23
lbragstadi'm excited to get into these discussions at the PTG to see what the consensus is *as a group*16:23
johnthetubaguyso folks by default have zero access to nova16:23
lbragstadjohnthetubaguy by access do you mean write-access?16:24
johnthetubaguyI mean *any* access16:24
johnthetubaguyso no access by default16:24
ayoungantwash, I'd recommend grabbing johnthetubaguy 's follow on specs and doing a keystone version of them as well.  Let Nova set the approach for Policy enforcement makes it easier to implement consistently in the other projects16:24
* lbragstad is a fan of deny-all by default16:24
johnthetubaguynow, there might be a big hole in my proposal somewhere16:24
ayoungjohnthetubaguy, define "Default" here?  An unscoped token should be rejected by Nova.16:25
johnthetubaguyit just feels like the current best bet16:25
*** ricolin has quit IRC16:25
johnthetubaguyayoung: good question, if you have no roles assigned16:25
johnthetubaguyso with no roles assigned, you get no access16:25
ayoungjohnthetubaguy, no role mean you cannot get a token scoped to that project16:25
ayoungbut a second check is not going to hurt16:25
johnthetubaguyyou are scoped to a project, thats cool16:25
johnthetubaguybut then you can't do anything, becuase you don't have a role in that project16:26
ayoungjohnthetubaguy, I have a follow on proposal.16:26
edmondswjohnthetubaguy I think you mean you can't just have any role assigned (the current state), but rather have to have a role that nova has allowed to do something16:26
lbragstadedmondsw ++16:26
edmondswno?16:26
ayoungjohnthetubaguy, looking for the spec...16:26
johnthetubaguyedmondsw: oh, right, I was missing you need a role to be "in" a project, so yet16:27
edmondswcool16:27
ayoungjohnthetubaguy, http://specs.openstack.org/openstack/keystone-specs/specs/keystone/ongoing/role-check-from-middleware.html16:27
johnthetubaguyI keep meaning to do a spec on supporting domains as well16:27
ayoungmove the role check into middleware16:27
lbragstadand right now the evaluation is *any* role on a project implies membership (right?)16:27
edmondswjohnthetubaguy what do you mean when you say "supporting domains"?16:27
johnthetubaguyayoung: yeah, our API is too screwed up for that to work, unless I am missing something16:27
*** sneti has joined #openstack-meeting-cp16:27
ayoungNo, it should work16:27
johnthetubaguyedmondsw: we just ignore domain right now16:27
ayoungjohnthetubaguy, the scope check stays in code16:27
johnthetubaguyayoung: we do policy based on random things in the body of the API payload16:28
ayoungjohnthetubaguy, Oh, wait, you mean the "pack everything into one post call"  API16:28
edmondswjohnthetubaguy, I know, but that's true in a lot of senses... and some of them rightly... which ones are you thinking of addressing?16:28
ayoungjohnthetubaguy, yeah...so you can still make use of the mechanism.16:28
johnthetubaguywe could do a basic "can I access Nova at all" check16:28
ayoungyou just have to manually implement that same logic:16:29
ayounginstead of the URL being the URL, it becomes some magic string16:29
lbragstadso nova would have to maintain the mapping?16:30
johnthetubaguythe problem is I want policy checks to be simpler and easier to audit, I think having to do two levels of checks is going to bad, but I could be missing this16:30
lbragstadbecause we coded to store a URL?16:30
johnthetubaguywe could create some "magic" to make action work, for sure16:30
ayoungjohnthetubaguy, I want the same things16:32
ayoungthe scope check should be immutable16:33
johnthetubaguyanyways, lets step back, right now I am trying to work through a set of deployer problems really, much less worried about the how, open to options, we should look at them at the PTG16:33
ayoungall end users can do is break that16:33
ayoungthe only part people should be morphing is the role->api mapping16:33
ayoungjohnthetubaguy, it supports your spec16:33
johnthetubaguyah, OK, I missed that being the aim16:33
ayoungthis will allow you to get the granularity of readonly/readwrite/projectadmin etc16:33
ayoungjohnthetubaguy, so, here is how I see it working16:34
ayoungwe get the proposed mechanism built and deployed. but nothing changes on day 116:34
ayoungif a user has Member, oon a projhect, every thing works the same16:34
ayoungadmin iplies member, so admin on a project can still do everything16:34
ayoungthen, we change member implies read_only16:35
ayoungthat starts showing up in the tokens...nothing changes16:35
*** raildo has joined #openstack-meeting-cp16:35
ayoungwe modify a set of APIs to be read_only....16:35
ayoungeverything keeps working.16:35
ayoungnow....we create a new users, and, instead of granting them Member, we grant them "read_only"16:36
ayoungnow that use can only do the read_only APIs, not all of them16:36
ayoungthe process is backwards compatble16:36
johnthetubaguyyeah, I think thats basically what I am shooting for in my spec, it falls back to use the old roles for a cycle or so16:37
johnthetubaguywith some warnings if haven't updated your users roles to match the "future"16:37
ayoungjohnthetubaguy, note that implied_roles are already in keystone16:37
ayoungso, the big thing is to make sure that Nova only enforces the current standard.  If you go too far, you ruin it for everyone16:38
ayoungdon't bake the roles into code.  Only scope check16:38
ayoungadmin we treat as a special16:38
johnthetubaguyso not quite sure if thats what we have done16:39
edmondswbut scope checks should be baked into code for the most part. For a select few APIs where we want scope to be more malleable, have an additional policy check to control that, but should be the exception16:39
johnthetubaguythe stuff we have in the code is more about the default policy16:39
johnthetubaguyedmondsw: yeah, there are a few exceptions, we are trying to slowly kill those, in the name of interop16:40
edmondsw++16:40
ayoungjohnthetubaguy, right, and the default should be "you need a token with a project that matches"16:40
johnthetubaguyedmondsw: FWIW, we need to fix hierarchical multi-tenancy to get rid of those16:40
ayoungand, for some "you need admin on the admin_project"16:40
edmondswoh?16:41
johnthetubaguyyeah, I don't like that16:41
johnthetubaguyit means you get access to everywhere by default16:41
johnthetubaguyso I must have missed something16:41
lbragstadi think by default we should have a granular set of roles that are well-defined16:41
johnthetubaguyso "by default" is causing confusion here16:42
johnthetubaguyI think what I mean is...16:42
johnthetubaguywhen in a project, you don't automatically get access to Nova16:42
johnthetubaguyyou can do implied roles, to make sure all Members get the nova-member rule, or some such16:42
johnthetubaguyif thats what you want16:42
johnthetubaguyah, there is the whole in my proposal...16:43
johnthetubaguyyou can't have a token say read access to the world, but write access to just my project16:44
johnthetubaguybut I think thats probably OK16:44
ayoungjohnthetubaguy, you cannot get a token scoped to a project without having a role on that project16:45
ayoungjohnthetubaguy, yes you can....16:45
ayoungiff those are done by separate roles16:45
lbragstadbut you can't do that with a single token though, tokens are either unscoped or scoped16:46
ayoungyou still need a token scoped to the project to perform operations on that project16:46
johnthetubaguyright, you could if its separate roles, but I was proposing not to do that16:46
lbragstadwhat it sounds like johnthetubaguy wants it a token that means two different things depending on where you're using it16:46
lbragstadis a*16:46
ayoungis_admin_project being the backdoor to allow admins global access16:46
johnthetubaguyright, I have gone for is_admin and is_global_scope being separate roles16:46
ayoungyou could do something comparable like role:read_only with a scope checkthat enforces is_admin_project=yes16:47
ayoungscope is not role.  role is not scope16:47
johnthetubaguyso its a problem with my proposal, but I also don't think its a valid use case16:47
johnthetubaguyI just should pull that out explicitly16:47
johnthetubaguyyou just re-authenticate in the project where you have the permissions you want16:48
johnthetubaguy(as a work around)16:48
ayoungyep16:48
dstanekjohnthetubaguy: ++ on calling that out16:48
edmondswand you can get a token from a token, as long as you're ok with the new token having the same expiration of the first token, without requiring credentials again... so getting a second token with a different scope shouldn't be too problematic16:49
*** aunnam has joined #openstack-meeting-cp16:50
johnthetubaguytrue, I don't think its a big deal16:50
johnthetubaguyjust a non-obvious restriction of the system I am proposing16:50
dstanekyeah, calling it out will let others looking at the docs/specs know that it was thought about16:51
lbragstad++16:51
lbragstad9 minute mark16:51
johnthetubaguyso I think I have a much better understanding of some of the background here, which is great16:52
johnthetubaguyso domains...16:53
johnthetubaguyI am thinking about how to add that16:53
edmondswwhat about them?16:53
johnthetubaguyI am thinking everywhere we have project_id we also need to add domain_id16:53
johnthetubaguywell, project_id and user_id16:53
edmondswwhy?16:53
johnthetubaguyoh, is project_id unique in the system?16:54
edmondswyes16:54
johnthetubaguyso I totally missed that16:54
* johnthetubaguy face palm16:54
lbragstadproject name is not16:54
edmondswproject_name is only unique within a domain, but project_id is unique globally16:54
lbragstadproject name must be unique within the domain16:54
johnthetubaguyright, that makes *way* more sense to me now16:54
lbragstad:)16:54
johnthetubaguyhmm, maybe this is over kill16:55
johnthetubaguyif you put domain_id everywhere....16:55
johnthetubaguywhen we get a domain scoped token16:55
johnthetubaguywe could simply update the scope check to look up things limited to the domain_id16:55
edmondswtoday nova doesn't work with domain scoped tokens at all, does it?16:55
lbragstadedmondsw i don't believe so16:55
johnthetubaguyedmondsw: I don't know what we do, honestly16:56
johnthetubaguywe might just call it a project16:56
edmondswI'm pretty sure the only service that handles domain-scoped tokens is keystone16:56
johnthetubaguyand get on with things as normal16:56
edmondswand that may be fine16:56
johnthetubaguyI was thinking about an admin that wanted visibility only in their domain16:56
edmondswor there may be use cases where it would be nice for nova/etc. to allow domain-scoped tokens... I don't know16:56
lbragstadjohnthetubaguy i have a question about policy in code too if you have a minute16:57
johnthetubaguylbragstad: yeah, thats probably a better use of our time16:57
* johnthetubaguy needs to go learn domains, and come back to that16:57
lbragstadjohnthetubaguy not to derail - just saw one of the post-its on my monitor and I had to ask16:57
johnthetubaguyheh16:57
lbragstadjohnthetubaguy nova enforces policy in code, but how does oslo.policy grab the registered values?16:58
lbragstadjohnthetubaguy does it reach into nova and ask for it like config?16:58
lbragstadcc antwash ravelar ^16:58
dstanekjohnthetubaguy: i also had a question about how horizon handles the policy in code thing. don't they need a copy of the policy to work correctly?16:59
johnthetubaguyah, its just like conifg16:59
johnthetubaguywith entry point16:59
* ravelar listening intently16:59
dstanekor did you already make it discoverable?16:59
johnthetubaguyhttps://docs.openstack.org/developer/oslo.policy/usage.html#sample-file-generation17:00
lbragstadah - so you can access an policy in oslo.policy (to do the evaluation) by doing `from nova import policies; policies.instances...`17:00
johnthetubaguyalaski did all the good work here17:00
johnthetubaguyoh, let me find our wiring17:00
edmondswlbragstad I think you're looking for this? https://github.com/openstack/nova/blob/master/nova/policy.py#L20717:00
lbragstadedmondsw aha!17:01
johnthetubaguyah, yeah17:01
lbragstadedmondsw yes - so that's what makes oslo.policy use the registered policy rules instead of some file17:01
lbragstad(i.e. policy.json or policy.yaml)17:01
johnthetubaguywell, overrides still come from the file17:01
edmondswright17:01
johnthetubaguywe aslo use a new method17:01
lbragstadright - but they are registered together17:01
johnthetubaguyhttps://github.com/openstack/nova/blob/master/nova/context.py#L27417:02
johnthetubaguyat least I thought that was new17:02
johnthetubaguyI think we error out if the rule is no pre-registered17:02
lbragstadgot it - so just like config, policy must be registered before use17:02
lbragstad(which finds the overrides, if any, and populates the rest of the policies with the default defined in code)17:02
johnthetubaguyyeah17:03
lbragstadawesome - that helps17:03
lbragstadwe're over time (sorry!)17:03
lbragstadthanks for coming everyone!17:03
lbragstad#endmeeting17:03
*** openstack changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings"17:03
openstackMeeting ended Wed Feb 15 17:03:56 2017 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:03
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-02-15-16.01.html17:03
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-02-15-16.01.txt17:04
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-02-15-16.01.log.html17:04
*** gagehugo has left #openstack-meeting-cp17:04
*** edmondsw has left #openstack-meeting-cp17:05
*** sdague has quit IRC18:51
*** sdague has joined #openstack-meeting-cp18:55
*** ravelar has quit IRC18:57
*** diablo_rojo_phon has quit IRC19:00
*** rdopiera has left #openstack-meeting-cp19:55
*** ducttape_ has joined #openstack-meeting-cp20:00
*** antwash has left #openstack-meeting-cp20:11
*** kbyrne has quit IRC20:22
*** _ducttape_ has joined #openstack-meeting-cp20:22
*** ducttape_ has quit IRC20:26
*** _ducttape_ has quit IRC21:07
*** ducttape_ has joined #openstack-meeting-cp21:08
*** raildo has quit IRC21:11
*** ducttape_ has quit IRC21:40
*** diablo_rojo has quit IRC21:58
*** diablo_rojo has joined #openstack-meeting-cp21:58
*** gouthamr has quit IRC22:22
*** ducttape_ has joined #openstack-meeting-cp22:29
*** diablo_rojo has quit IRC22:33
*** diablo_rojo_phon has joined #openstack-meeting-cp22:47
*** gouthamr has joined #openstack-meeting-cp22:53
*** lamt has quit IRC23:09
*** lamt has joined #openstack-meeting-cp23:11
*** lamt has quit IRC23:15
*** diablo_rojo has joined #openstack-meeting-cp23:38

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!