Wednesday, 2017-05-17

*** markvoelker has quit IRC00:01
*** markvoelker has joined #openstack-meeting-cp00:02
*** markvoelker has quit IRC00:04
*** markvoelker has joined #openstack-meeting-cp00:04
*** diablo_rojo has joined #openstack-meeting-cp01:01
*** harlowja has quit IRC01:08
*** diablo_rojo has quit IRC02:59
*** gouthamr has quit IRC03:57
*** harlowja has joined #openstack-meeting-cp04:33
*** harlowja has quit IRC05:54
*** mgagne has quit IRC06:53
*** mgagne has joined #openstack-meeting-cp06:56
*** mgagne is now known as Guest2410306:56
*** MarkBaker has quit IRC08:12
*** MarkBaker has joined #openstack-meeting-cp08:17
*** johnthetubaguy has left #openstack-meeting-cp10:06
*** MarkBaker has quit IRC10:14
*** Daviey_ is now known as Daviey10:15
*** MarkBaker has joined #openstack-meeting-cp10:24
*** sdague has joined #openstack-meeting-cp10:29
*** MarkBaker has quit IRC11:01
*** MarkBaker has joined #openstack-meeting-cp11:14
*** jhesketh has joined #openstack-meeting-cp12:06
*** gouthamr has joined #openstack-meeting-cp12:39
*** edmondsw has joined #openstack-meeting-cp12:41
*** lamt has joined #openstack-meeting-cp12:58
*** diablo_rojo has joined #openstack-meeting-cp13:43
*** lamt has quit IRC13:47
*** lamt has joined #openstack-meeting-cp13:53
*** johnthetubaguy has joined #openstack-meeting-cp13:54
*** Guest24103 is now known as mgagne14:32
*** mgagne has quit IRC14:32
*** mgagne has joined #openstack-meeting-cp14:32
*** spilla has joined #openstack-meeting-cp14:49
*** ayoung has joined #openstack-meeting-cp15:03
*** felipemonteiro has joined #openstack-meeting-cp15:24
*** raies has joined #openstack-meeting-cp15:50
*** qwebirc11625 has joined #openstack-meeting-cp15:51
*** qwebirc11625 has quit IRC15:52
*** blancos has joined #openstack-meeting-cp15:57
*** gouthamr_ has joined #openstack-meeting-cp15:58
*** gouthamr has quit IRC15:59
lbragstad#startmeeting policy16:00
openstackMeeting started Wed May 17 16:00:02 2017 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:00
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:00
*** openstack changes topic to " (Meeting topic: policy)"16:00
openstackThe meeting name has been set to 'policy'16:00
lbragstadping lbragstad, raildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ruan, ayoung, morgan, raj_singh, johnthetubaguy, knikolla, nhelgeson16:00
johnthetubaguyo/16:00
samueldmqhi16:00
edmondswo/16:00
lbragstad#link https://etherpad.openstack.org/p/keystone-policy-meeting16:00
lbragstadagenda ^16:00
lbragstado/16:00
lbragstadlet see how many folks we have - we might be able to squeeze by with a google hangout16:00
knikollao/16:00
felipemonteiroo/16:01
lamto/16:01
blancoso/16:01
*** gagehugo has joined #openstack-meeting-cp16:02
gagehugoo/16:02
lbragstadwow - we're getting a pretty good turn out16:02
spillao/16:02
aseliuso/16:03
ayoungHeh16:04
knikolla11, i believe that takes us over the hangout limit.16:04
lbragstadyep - i think so16:04
raieso/16:04
lbragstadok - let's go ahead and get started16:04
ayoungIts OK, that was a special occasion. We should try to make IRC work16:04
lbragstad#topic goals16:04
*** openstack changes topic to "goals (Meeting topic: policy)"16:04
*** DavidPurcell has joined #openstack-meeting-cp16:04
ayounghttps://etherpad.openstack.org/p/keystone-policy-meeting16:05
lbragstadimo - part of the reason why we seem to stall out on various policy dicussions is because there are *so* many things to fix16:05
lbragstadto help with that16:05
lbragstadI took a stab at defining the goals we want to strive for16:05
ayoung++16:05
ayoung1. Admin-ness16:06
ayoung2. mapping easy of understanding and main16:06
lbragstadi wanted to be able to provide a document that folks can use as a reference when reviewing or even discussing policy16:06
ayoung3. default set of roles16:06
samueldmqlbragstad: that sounds great16:06
lbragstad#link https://review.openstack.org/#/c/460344/16:06
lbragstadI'd love to get some feedback on that ^16:06
lbragstadnot only from keystone folks, but from other projects as well16:07
lbragstaddo we have representation here from other projects?16:07
ayounglbragstad, so,  some prioritization16:07
johnthetubaguyI guess I am a nova-ish voice here16:07
*** DavidPurcell_ has joined #openstack-meeting-cp16:07
ayoungI don't think we can do the "standard set of roles" until we have an interim state of "Be able to add a new role to an already running system"16:07
lbragstadjohnthetubaguy: glad you could make it :)16:07
felipemonteirolbragstad: i work on qa, murano, reading it16:08
lbragstadfelipemonteiro: awesome16:08
ayoungI think the "standard set of roles" is the right top level goal16:08
ayoungSo, one thing we should probably make explicit, somehow, is that "some" role needs to be enforced for every policy check unless explicitly opted out16:09
ayoungthere is probably a better way to say that16:09
*** nhelgeson has joined #openstack-meeting-cp16:09
*** nhelgeson_ has joined #openstack-meeting-cp16:09
ayoungbut what I want to address is the cases where the current policy checks scope, but no role.  We need a good default16:09
*** DavidPurcell has quit IRC16:09
johnthetubaguySo we don't reallt talk about user/operator aims in that policy goals document, its still quite implementation based16:09
*** nhelgeson_ has quit IRC16:09
johnthetubaguyI wonder if stepping back a tiny bit would help here16:10
ayoungjohnthetubaguy, did you make it to my talk?  I did address some of it there.16:10
edmondswjohnthetubaguy I don't know that I agree with that... I thought it was quite operator based16:10
johnthetubaguyayoung: didn't make any talks, had forum sessions in nevery slot, I do plan on watching yours ASAP16:11
ayoungjohnthetubaguy, feel free to hit me up for the accellerated version16:11
ayoungtwo slides I want to call out16:11
johnthetubaguyedmondsw: maybe its just the way I am reading it16:11
ayounghttps://docs.google.com/presentation/d/1L31_x977Yrz9im3MapBxVUpcQSv7IGTJnCf7s6kbtFc/edit#slide=id.g1d8796a54f_1_7516:11
ayoungcan everyone see that?16:11
lbragstad#link https://www.youtube.com/watch?v=EYYzl0rFCVU&t=147s16:11
gagehugoneed permission16:11
aseliusyup need permission16:11
ayoungI have a public version somewhere...let me see if I can find it..16:12
edmondswayoung I requested access16:12
knikollatry now16:12
knikollai updated the permissions16:12
lamtworks for me now16:12
ayounghow about https://docs.google.com/presentation/d/1L31_x977Yrz9im3MapBxVUpcQSv7IGTJnCf7s6kbtFc/pub?start=false&loop=false&delayms=3000#slide=id.p16:13
johnthetubaguyslides 17 and 18 right?16:13
gagehugoayoung: that link works16:13
edmondswthey both work now16:13
ayoungOK, that is preso mode.  The two things I want to call out16:13
ayoungWithout16:14
ayoungAn Explicit16:14
ayoungScope Check16:14
ayoungEvery Project16:14
ayoungHas Access16:14
ayoungto Every Project’s Resources16:14
ayoungGAh16:14
ayoungHeh16:14
ayoungWithout An Explicit Scope Check Every Project Has Access to Every Project’s Resources16:14
ayoungWithout An Explicit Role Check for an API  Every Role Has Access16:14
ayoungevery token scoped to that project has access16:14
gagehugothe whole master keyring issue16:15
* johnthetubaguy nods16:15
ayounggagehugo, yeah...if you don't look too close at my analogy16:15
ayoungso,  close those two things should be at the top.16:15
johnthetubaguyfrom the operator point of view, which are the critical use cases?16:16
johnthetubaguylike I get those are problems that break lots of flows16:16
ayoungjohnthetubaguy, #1 thing I've gotten a request is for a read-only role16:16
johnthetubaguyjust wondering which flows we should think about the most16:16
johnthetubaguyayoung: yeah, I guess number 2 is the whole per project admin?16:16
ayoungyep16:16
*** jaugustine has joined #openstack-meeting-cp16:16
lbragstadso this all ties back to admin-ness16:17
johnthetubaguycool, so those seem like the two things I was expecting to see in the goals doc16:17
ayoungso a default role for all  APIs for a service would go a long way to covering those.16:17
ayounglbragstad, yeah, sortof16:17
edmondswjohnthetubaguy ayoung my #1 operator request is fixing the admin scoping16:17
ayoungedmondsw, good to know.  And its is also a pre-req to the other two16:18
edmondswthen #2 making it easier to customize policy16:18
edmondswand then having better pre-defined roles would come after that somewhere16:18
edmondswas the ordering is in the spec lbragstad has up on policy goals16:19
johnthetubaguy"customize policy" isn't really specific enough for me, but its good context for sure16:19
morgan./16:19
morganlurking, just recovering from vacation ;)16:19
lbragstadoh man, we have a morgan16:19
ayoung\O16:19
edmondsw"customize policy" = "define my own roles and what they can do"16:19
ayoungcool.16:19
samueldmqmorgan: welcome back!16:20
ayoungOK.  So...I think I am OK with this Doc as is, providing we make it a living document, and are not afraid to update it as we get better clarity.16:20
ayoungSome of the things we are talking about is mechanism, but the doc does a good job, I think, of abstracting the use cases to general goals16:20
johnthetubaguyedmondsw: I was really meaning, today what many operators want is the read-only role, which causes them to cusomtize stuff16:20
lbragstadi'm good with that - so long as it stays concise and direct16:20
ayoungOK.  So, I'm a put my +2 on it16:21
ayoungAny future changes can be posted as their own reviews.  What is important for the upcoming release is work items16:22
ayoungand, the priority of those is directed at goal #116:22
ayoungAgreed?16:22
knikolla++ on the whole living document thing. it would be very beneficial as we move forward.16:22
knikollahaving a clear documented path of goals16:22
edmondswjohnthetubaguy readonly is one needed role, for sure. But the ability to customize and create whatever role you want is really what I'm after16:22
lbragstadok - so i have a question16:23
johnthetubaguyedmondsw: totally, I think they are both separate aims, I added a comment in the spec16:23
ayoungFire away lbragstad16:23
lbragstadwe know fixing admin-ness is a priority, but can that be decoupled from determining which role is required to do an operation?16:23
edmondswjohnthetubaguy right... #2 vs #3 in the spec16:23
ayounglbragstad, yes16:23
edmondsw#2 gives you the ability to create whatever you want16:23
lbragstadjohnthetubaguy: ++16:23
ayounglbragstad, that is, in essence, a scope check, and should be done first16:23
edmondsw#3 gives you some pre-defined roles so that you don't have to use #2 if you're happy with what we predefine16:24
ayoungfor the moment, admin is checked in the oslo-policy mechanism or the nova/keystone equivalents16:24
ayoungand the checks are all done as Or checks16:24
ayoungeither the user has Admin or the scope must match16:24
ayoungto ensure adminess, we need an and check like this16:25
johnthetubaguyedmondsm: ah, I think I miss understood your point, I get what you mean now (I think)16:25
ayoungeither ((role == admin and is_admin_project ) or (token.project_)id == resource.project_id))16:25
ayoungnote that the == condition ensures that role == admin on the project still works16:26
lbragstadso that's where this starts to get tricky because we'll have to work with each of the projects to ensure the resource they are checking against makes sense within the scope of a project16:26
lbragstad(i.e. instances make sense within project, endpoints do not)16:27
ayounglbragstad, right.  THat has been Sisyphean16:27
edmondswayoung more like "(role == <whatever roles you want to allow>) and (is_admin_project or (token.project_id == resource.project_id)))16:27
edmondswseparate role check from scope check16:27
ayoungedmondsw, Yes, that is the end state.  I was answering lbragstad 's question about whether we could serialize the work, though16:28
ayoungthe role check work can come afterwards16:28
edmondswI don't think I agree16:28
ayoungbut I think you are referring to the "admin" part of that, and, yes, we should be smarter about that16:28
*** gouthamr_ has quit IRC16:28
johnthetubaguyif we had context.is_global_admin implemented, would that help the project do what they need to do?16:28
ayoungedmondsw, think about it as a patch ordering16:28
ayoungjohnthetubaguy, you mean context.is_admin_project>16:29
edmondswI get that you're talking about patch ordering... I don't understand why you think you should split that into separate patches16:29
ayoungand yes, that is required16:29
johnthetubaguynope16:29
edmondswI'm not sure you can split it, much less that you should16:29
edmondswor why you would want to16:29
ayoungedmondsw, because I think role modificiation is a trickier thing to implement, and, even if we go with a policy.json based implementation, we will have trouble getting it into a single, understandable patch16:30
edmondswayoung what "role modification" do you think I'm proposing?16:31
edmondswI don't think I am proposing anything I'd call that16:31
ayoungedmondsw, taking an API that only allows 'admin' and making it accest 'admin or reader' for example16:31
lbragstadthis is my super rough idea of what projects would have to do - http://paste.openstack.org/show/609824/16:31
edmondswi'm not proposing we add any new roles in this first patch stage16:32
ayounglbragstad, not quite16:32
lbragstadwhich would force them to make sense of operations in a global, domain, and project scope16:32
ayounglbragstad, lets leave domain out for now, as that is keystone only16:32
ayoungits more like:16:32
ayoungif operation is global_scoped:16:32
ayoung    if token.is_admin_project == True:16:32
lbragstad(i.e. does it make sense to do instance things in a global sense - no it's a project thing)16:32
ayoungOh...wait16:32
ayoungI misread what you wrote....16:32
ayoungyeah, what you have is right16:32
*** harlowja has joined #openstack-meeting-cp16:32
lbragstad\o/16:33
* lbragstad highfives the dog16:33
ayoungwith the exception that is_admin_project might be needed for domain scope operations, too16:33
edmondswlbragstad I would only change the domain check to allow both domain_scoped token or is_admin_project True16:33
lbragstadayoung: sure - that could be applied at the project level too16:33
ayoungso. lets leave that out for now, as that is Keystone only, and we can fix that16:33
johnthetubaguythere are user scoped things too for Nova, but that follows the same pattern16:34
ayoungedmondsw, so, why do you think the role stuff needs to be handled along with is_admin_project?16:34
edmondswayoung I think you are just misunderstanding me16:34
ayoungjohnthetubaguy, what resources are user scoped?16:34
ayoungedmondsw, likely!16:35
johnthetubaguyayoung: keypairs16:35
ayoungjohnthetubaguy, got it16:35
ayoungjohnthetubaguy, those are "also" project scoped, right?16:35
edmondswayoung I'm not suggesting we add any roles... just that we not tie is_admin_project checks to the admin role... there's no reason or need to do that16:35
ayoung*also*16:35
edmondswit doesn't help with anything16:35
ayoungedmondsw, roger16:35
edmondswand it's not the end goal we want16:35
ayoungrodger dodger.  Agree16:35
edmondsw++16:35
ayoungOK...so on the agenda, I sketched out the pieces that need to be done.16:36
ayounglines 15 -3016:36
ayounghack on it, please16:36
edmondswso if you have an admin-only policy check, then it would be "((role == admin) and (is_admin_project or (token.project_id == resource.project_id)))"16:37
ayoungedmondsw, right16:37
ayoungedmondsw, and a reader only check would be16:37
edmondswbut an operation that is allowed for any role would be that minus the role == admin part16:37
ayoung "((role == reader) and (is_admin_project or (token.project_id == resource.project_id)))"16:37
edmondswright16:37
ayoungyes16:37
edmondswI'd like to get rid of the "any role will do" stuff, but THAT comes later16:37
ayoungand so, with implied roles, we could then make that, implicitly16:37
ayoung "((role == reader or role == admin) and (is_admin_project or (token.project_id == resource.project_id)))"16:37
ayoungwithout implied roles, that would be added to the policy file16:38
ayoungotherwise, an admin would not be able to to it without also explicitly having the reader role16:38
lbragstadupdated - http://paste.openstack.org/show/609825/16:38
ayounglbragstad, ++16:39
johnthetubaguyso is_admin_project seems really odd, that was the feedback in one of the previous discussions, is this something we want to train our operators to do?16:39
*** raies has quit IRC16:39
ayoungOK...so johnthetubaguy can you take on the nova part, or do we need to find someone to do that?16:39
lbragstadjohnthetubaguy: i did write up https://review.openstack.org/#/c/464763/16:39
johnthetubaguyI don't have a job right now, so its tricky to know either way16:39
ayoungjohnthetubaguy, it was based on a lot of discussion...16:39
lbragstadwhich is an alternative16:40
ayoungjohnthetubaguy, ah, joy16:40
johnthetubaguylbragstad: I should read through that16:40
ayoungjohnthetubaguy, is_admin_project was based on the way openstack was origianlly designed to do this, at least according to termie16:40
edmondswlbragstad johnthetubaguy if/when I can find time to help, my priority will most likely be helping in nova16:41
lbragstadmy proposal is that we eventually move away from that model16:41
ayoungit also allowed us a way to get global roles without radically modifying the Keystone server16:41
johnthetubaguynow I want us to make progress as fast as possible, but we do need to take care of training operators to do a thing, then changing that a release or two later16:41
edmondswI will try to help in keystone as well though16:41
lbragstadi have an idea that might allow us to move away from that model without making the projects consuming the information change more than once16:41
edmondswthat sounds nice16:42
johnthetubaguyits the operators that worry me the most here16:42
lbragstadjohnthetubaguy: ++16:42
johnthetubaguybut the minimal project chagnes would be awesome too16:42
lbragstaddo folks want to hear my plan?16:42
johnthetubaguyI would prefer something that checks for the concept "global admin" that could be implemented however16:42
johnthetubaguylbragstad: I do :)16:43
edmondswcan we not switch from is_admin_project to global-scoped role assignments via a db migration?16:43
edmondswI would think that's just a keystone db migration16:43
johnthetubaguyedmondsw: I am thinking API calls, and general concepts in all our users heads16:43
ayoungedmondsw, yes, we can do that16:43
ayoungits the changes to oslo-context that require changes in the remote projects16:44
lbragstad1.) implement the is_admin_project stuff but make it so that the token represents something like token.global_scope=True16:44
lbragstad2.) make oslo.context changes to honor token.global_scope16:44
lbragstad3.) project consume that and apply it to their operations16:44
ayounglbragstad, so...what iffffff16:44
edmondswjohnthetubaguy yeah, they would need to understand that "oh, I can take advantage of global-scoped role assignments now as I add new users/groups instead of being tied to what I had defined as is_admin_project"16:44
ayoungwe had a library or something to do the check16:44
lbragstad4.) implement global roles in keystone16:44
ayoungwhat if we did the scope check in oslo-context itself?16:44
lbragstad5.) migrate is_admin_project to global role assignment16:45
ayoungand oslo-context could then handle is_admin_project OR global_roles?16:45
johnthetubaguycan't this just be context.is_global_scope?16:45
lbragstadayoung: right - that's the magic bit that makes it so other services don't care about is_admin_project16:45
lbragstador global roles16:46
johnthetubaguycool, I think thats going to be much easier to describe to folks16:46
edmondswexactly16:46
lbragstadall the other services should care about is token.global_scope == True16:46
johnthetubaguyso whats the check for admin now?16:46
lbragstadthen they can evaluate according to their "global" operations at the service level16:46
johnthetubaguysorry I was thinking back to the ealier paste with the if statements16:47
johnthetubaguyhow do they change in this model?16:47
edmondswjohnthetubaguy they look at token.is_global instead of token.is_admin_project... just a rewording16:47
lbragstadyeah16:47
edmondswas that will be in code, not in policy, it's not a concern for users/operators16:48
lbragstadbut the important bit is that it's not exposing implementation details in the interface16:48
johnthetubaguyso if we want a global read_only role?16:48
edmondswtake the read-only role, and assign it with global scope instead of a project scope16:48
knikollarole==reader and token.global_scope16:48
knikollais_global*16:48
johnthetubaguyso what I mean is, we are really checking for role=admin and token.is_global_scope16:48
lbragstadthen bob should be able to get a global token with the reader role16:49
edmondswjohnthetubaguy if you want to restrict something to something that is a global admin, yes16:50
johnthetubaguyso the current admin folks access the APIs, they would fail this new test I assume?16:51
johnthetubaguywhat are we doing for the transition?16:51
ayoungthe big thing, though, is that Nova is not even properly loading up the context, is it?16:51
johnthetubaguyayoung: the context object is fine, we don't always pass the target16:52
ayoungjohnthetubaguy, we need that16:52
johnthetubaguyunless we pull out all scope checks from the policy file right?16:52
johnthetubaguyI am finding it hard separating all these concerns and making it work across upgrade16:53
johnthetubaguywithout feeling like we are about to break everything16:53
edmondswjohnthetubaguy upgrade is tricky... I think the only way we can solve that and maintain backward compat is to have some transitional policy checks that do scope checking16:53
ayoungjohnthetubaguy, I'm guessing that the scope checks are in the database now, but I can't see how that would work for global admin operations.  But also, Nova must enforce some scope checks, somehow.16:53
johnthetubaguyI had a plan to do all this in Nova, but its a long old process, and the team happy to do it are no more, but struggling to see the lighterweight approach here16:53
johnthetubaguyayoung: it all depends on which exact API we are talking about16:54
ayoungOK,  first question, is it even possible to do this in oslo-context, assuming we load the target16:54
johnthetubaguywhat is "this"?16:54
ayoungjohnthetubaguy, scope check IAW the rules above16:55
ayoungso, ignoring the role:16:55
ayoung (is_admin_project or (token.project_id == resource.project_id)))16:55
edmondswe.g. servers:list:other_projects = "role:admin and is_admin_project==True" and have the code use that as an override for the normal scope checks it would do... and deprecated this for eventual removal16:55
ayoungand, when policy runs, have it do "context.scope_check"16:55
johnthetubaguythe bit I thought was going in context was the extra is_global_scope = True/False property16:55
ayoungwhat if...16:56
ayoungwe did that anyway, and have the scope check ignore the target if it is not set?16:56
ayoungthen this resolves to a series of smaller bugs in Nova/cinder etc to get the scope checks right?16:56
johnthetubaguyI did create this thing: https://review.openstack.org/#/c/435485/2/nova/context.py16:56
ayoungjohnthetubaguy, yeah, that.  but it would be nice if it were in oslo-context, so we could do the same thing in cinder16:57
knikolla++ on oslo16:57
johnthetubaguyayoung: yeah, makes sense, its just that would need to be called from each bit of the API separately, the way I initial proposed this16:58
lbragstadtwo minute warning16:59
gagehugohmm16:59
johnthetubaguyis the best way forward to do a POC in keystone for this change, that includes dealing with upgrade, etc?16:59
johnthetubaguythis is my nova POC: https://review.openstack.org/#/c/435485 but it would take lots of work to add that everywhere17:00
ayoungjohnthetubaguy, not a bad starting point17:00
lbragstadwe're out of time17:00
lbragstaddo folks want to spill into #openstack-dev or #openstack-keystone?17:01
ayounglbragstad, yes please17:01
edmondswjohnthetubaguy the problem with a keystone-only PoC is that the admin-is-special-across-projects thing is very different in keystone than in nova/elsewhere17:01
ayoungis anthing scheduled in here for the next hour?17:01
johnthetubaguyedmondsw: ah, that could be a problem17:01
ayoungedmondsw, yes, but...17:01
*** gouthamr has joined #openstack-meeting-cp17:02
ayoungI think we have keystone policy enforce on oslo-context now.  If we don't we should make that happen anyway, and we can do the heavy liftin in oslo17:02
johnthetubaguythere is a bit missing for me, between oslo-context and the current policy check calls17:02
edmondswayoung I definitely agree with leaning on oslo here as much as possible. I'm inclined to implement the logic the way it needs to be without that first, though, and then figure out how to clean it up with moving things into oslo17:03
johnthetubaguy++ for a move to olso after we have it working17:03
ayoung++17:03
ayoungso, gagehugo you up for that?17:03
johnthetubaguythe bit I am missing on the Nova side is how we avoid touching every API call (like proposed in https://review.openstack.org/#/c/435485), maybe we can't avoid that, and thats fair enough.17:04
gagehugoayoung sure17:05
lbragstadwe're going to have to end the meeting17:05
* johnthetubaguy has to go and cook his dinner17:05
lbragstadi don't want to roll over17:05
edmondswjohnthetubaguy unfortunately I think we will need to touch every API call... I don't see a way around that17:05
johnthetubaguyedmondsw: OK, maybe this can be the POC then: https://review.openstack.org/#/c/43548517:06
*** raies has joined #openstack-meeting-cp17:06
edmondswI'd like the PoC to take several different hard cases and show that we can solve them... not be a general change like that17:07
edmondswi.e. actually prove something :)17:08
*** DavidPurcell_ has quit IRC17:08
*** stvnoyes1 has left #openstack-meeting-cp17:11
*** MarkBaker has quit IRC17:14
edmondswlbragstad need to end the meeting17:15
lbragstadwe are going to have to end the meeting17:15
lbragstad#endmeeting17:15
*** openstack changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings"17:15
openstackMeeting ended Wed May 17 17:15:46 2017 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:15
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-05-17-16.00.html17:15
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-05-17-16.00.txt17:15
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2017/policy.2017-05-17-16.00.log.html17:15
*** gagehugo has left #openstack-meeting-cp17:17
*** felipemonteiro has quit IRC17:18
*** harlowja has quit IRC17:26
*** felipemonteiro has joined #openstack-meeting-cp17:39
*** felipemonteiro has quit IRC17:49
*** felipemonteiro has joined #openstack-meeting-cp17:52
*** felipemonteiro has quit IRC17:56
*** ayoung has quit IRC18:41
*** raies has quit IRC18:45
*** felipemonteiro has joined #openstack-meeting-cp18:49
*** MarkBaker has joined #openstack-meeting-cp18:57
*** MarkBaker has quit IRC18:57
*** stvnoyes has joined #openstack-meeting-cp19:14
*** blancos has quit IRC19:29
*** harlowja has joined #openstack-meeting-cp19:39
*** harlowja has quit IRC19:53
*** harlowja has joined #openstack-meeting-cp19:57
*** harlowja has quit IRC20:00
*** lamt has quit IRC20:33
*** lamt has joined #openstack-meeting-cp20:35
*** gouthamr has quit IRC20:44
*** gouthamr has joined #openstack-meeting-cp21:15
*** sdague has quit IRC21:22
*** spilla has quit IRC21:26
*** edmondsw has quit IRC21:27
*** edmondsw has joined #openstack-meeting-cp21:28
*** edmondsw_ has joined #openstack-meeting-cp21:31
*** jaugustine has quit IRC21:32
*** edmondsw has quit IRC21:32
*** edmondsw_ has quit IRC21:36
*** harlowja has joined #openstack-meeting-cp22:02
*** harlowja has quit IRC22:18
*** benj_ has joined #openstack-meeting-cp22:24
*** lamt has quit IRC22:57
*** lbragstad has quit IRC23:10
*** gouthamr has quit IRC23:12
*** gouthamr has joined #openstack-meeting-cp23:20
*** pewp has quit IRC23:38
*** pewp has joined #openstack-meeting-cp23:38
*** felipemonteiro has quit IRC23:49

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!