openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider master: Correctly set member operating status https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765213 | 00:18 |
---|---|---|
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider master: Correctly set member operating status https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765213 | 00:21 |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider master: Start running the tempest API tests https://review.opendev.org/c/openstack/ovn-octavia-provider/+/752558 | 00:21 |
*** mlavalle has quit IRC | 00:40 | |
openstackgerrit | Merged openstack/neutron master: Remove "ovs-vsctl" support from rootwrap https://review.opendev.org/c/openstack/neutron/+/763218 | 00:40 |
*** spatel has joined #openstack-neutron | 00:52 | |
*** hamalq has quit IRC | 00:54 | |
*** guilhermesp has quit IRC | 00:56 | |
*** jungleboyj has quit IRC | 00:56 | |
*** jungleboyj has joined #openstack-neutron | 00:57 | |
*** gouthamr has quit IRC | 00:57 | |
*** nicolasbock has quit IRC | 00:57 | |
*** mnasiadka has quit IRC | 00:57 | |
*** guilhermesp has joined #openstack-neutron | 00:58 | |
*** mnasiadka has joined #openstack-neutron | 00:58 | |
*** nicolasbock has joined #openstack-neutron | 00:58 | |
*** gouthamr has joined #openstack-neutron | 00:58 | |
*** macz_ has quit IRC | 01:05 | |
*** ociuhandu has joined #openstack-neutron | 01:10 | |
openstackgerrit | zhanghao proposed openstack/neutron master: [OVN] Use the new method to set lrp options https://review.opendev.org/c/openstack/neutron/+/765171 | 01:14 |
*** ociuhandu has quit IRC | 01:15 | |
openstackgerrit | Merged openstack/neutron master: [Docs] Guide about running and debugging fullstack tests https://review.opendev.org/c/openstack/neutron/+/764367 | 01:24 |
openstackgerrit | zhanghao proposed openstack/neutron master: [OVN] Implement router gateway IP QoS https://review.opendev.org/c/openstack/neutron/+/749012 | 01:28 |
*** openstackgerrit has quit IRC | 01:38 | |
*** spatel has quit IRC | 01:54 | |
*** baojg has joined #openstack-neutron | 02:10 | |
*** macz_ has joined #openstack-neutron | 02:10 | |
*** zzzeek has quit IRC | 02:14 | |
*** macz_ has quit IRC | 02:15 | |
*** zzzeek has joined #openstack-neutron | 02:15 | |
*** hemanth_n has joined #openstack-neutron | 02:36 | |
*** hemanth_n has quit IRC | 02:45 | |
*** ociuhandu has joined #openstack-neutron | 02:59 | |
*** ociuhandu has quit IRC | 03:03 | |
*** sapd1 has joined #openstack-neutron | 03:31 | |
*** jmlowe has quit IRC | 03:36 | |
*** baojg has quit IRC | 03:36 | |
*** baojg has joined #openstack-neutron | 03:37 | |
*** sapd1 has quit IRC | 03:38 | |
*** jmlowe has joined #openstack-neutron | 03:39 | |
*** carloss has quit IRC | 03:41 | |
*** baojg has quit IRC | 03:47 | |
*** baojg has joined #openstack-neutron | 03:48 | |
*** hemanth_n has joined #openstack-neutron | 03:49 | |
*** hemanth_n has quit IRC | 03:53 | |
*** ociuhandu has joined #openstack-neutron | 04:47 | |
*** ociuhandu has quit IRC | 04:51 | |
*** lajoskatona has joined #openstack-neutron | 04:57 | |
*** lajoskatona has left #openstack-neutron | 04:58 | |
*** hemanth_n has joined #openstack-neutron | 05:04 | |
*** lajoskatona has joined #openstack-neutron | 05:04 | |
*** hemanth_n has quit IRC | 05:17 | |
*** gcheresh has joined #openstack-neutron | 05:46 | |
*** lbragstad has quit IRC | 06:02 | |
*** lbragstad has joined #openstack-neutron | 06:03 | |
*** ratailor has joined #openstack-neutron | 06:20 | |
*** gcheresh has quit IRC | 06:29 | |
*** spatel has joined #openstack-neutron | 06:33 | |
*** ociuhandu has joined #openstack-neutron | 06:35 | |
*** spatel has quit IRC | 06:37 | |
*** ociuhandu has quit IRC | 06:40 | |
*** xinranwang has joined #openstack-neutron | 06:56 | |
*** ociuhandu has joined #openstack-neutron | 07:02 | |
*** rcernin has quit IRC | 07:04 | |
*** lpetrut has joined #openstack-neutron | 07:06 | |
*** ociuhandu has quit IRC | 07:14 | |
*** rcernin has joined #openstack-neutron | 07:17 | |
*** rcernin has quit IRC | 07:18 | |
*** tmorin has joined #openstack-neutron | 07:28 | |
*** sapd1 has joined #openstack-neutron | 07:35 | |
*** ociuhandu has joined #openstack-neutron | 07:42 | |
*** ccamposr has joined #openstack-neutron | 07:46 | |
*** lpetrut has quit IRC | 07:46 | |
*** ociuhandu has quit IRC | 07:47 | |
*** ccamposr__ has quit IRC | 07:49 | |
*** luksky has joined #openstack-neutron | 07:55 | |
*** ccamposr__ has joined #openstack-neutron | 08:02 | |
*** ociuhandu has joined #openstack-neutron | 08:02 | |
*** ociuhandu has quit IRC | 08:03 | |
*** ccamposr has quit IRC | 08:05 | |
*** ociuhandu has joined #openstack-neutron | 08:12 | |
*** ociuhandu has quit IRC | 08:18 | |
*** imtiazc has quit IRC | 08:18 | |
*** tesseract has joined #openstack-neutron | 08:26 | |
*** bengates has joined #openstack-neutron | 08:29 | |
*** tmorin has quit IRC | 08:29 | |
*** tkajinam has quit IRC | 08:31 | |
*** tkajinam has joined #openstack-neutron | 08:32 | |
*** ociuhandu has joined #openstack-neutron | 08:32 | |
*** ociuhandu has quit IRC | 08:39 | |
*** tmorin has joined #openstack-neutron | 08:47 | |
*** sapd1 has quit IRC | 08:50 | |
*** sapd1 has joined #openstack-neutron | 08:53 | |
*** tesseract has quit IRC | 08:55 | |
*** tesseract has joined #openstack-neutron | 08:55 | |
*** jpena|off is now known as jpena | 08:57 | |
*** lpetrut has joined #openstack-neutron | 09:07 | |
ralonsoh | slaweq, we don't have ovs-vsctl rootwrap support and https://review.opendev.org/c/openstack/neutron/+/755313 is merged | 09:12 |
*** elvira has joined #openstack-neutron | 09:12 | |
ralonsoh | let's see how it's going today and this weekend in the CI... | 09:12 |
*** xinranwang has quit IRC | 09:15 | |
slaweq | ralonsoh: hi, sure | 09:16 |
slaweq | I hope it will be better now | 09:17 |
*** ramishra has quit IRC | 09:19 | |
*** ramishra has joined #openstack-neutron | 09:40 | |
*** ociuhandu has joined #openstack-neutron | 09:41 | |
*** ociuhandu has quit IRC | 09:46 | |
*** gcheresh has joined #openstack-neutron | 09:50 | |
ralonsoh | slaweq, https://review.opendev.org/c/openstack/neutron/+/764980 | 09:56 |
ralonsoh | just a heads-up | 09:56 |
ralonsoh | about how to define the policies | 09:56 |
ralonsoh | according to Lance (and he is the expert on this) | 09:56 |
ralonsoh | we can split "role" and "project" | 09:56 |
slaweq | ralonsoh: | 10:00 |
slaweq | thx for heads up | 10:00 |
ralonsoh | yw | 10:00 |
slaweq | looking | 10:00 |
*** jlibosva has joined #openstack-neutron | 10:02 | |
slaweq | ralonsoh: I'm not sure if I understand it | 10:02 |
slaweq | ralonsoh: Your example from Nova is exactly the same as what I proposed there | 10:02 |
slaweq | or am I missing something? | 10:03 |
*** sapd1 has quit IRC | 10:05 | |
ralonsoh | slaweq, I'm trying to find you patch defining the strings... | 10:05 |
*** spatel has joined #openstack-neutron | 10:05 | |
ralonsoh | slaweq, https://review.opendev.org/c/openstack/neutron/+/764437/3/neutron/conf/policies/base.py | 10:06 |
ralonsoh | do we need this patch with "role" and "project"? | 10:07 |
ralonsoh | sorry, I'm still learning | 10:07 |
ralonsoh | because we have the oslo roles and the "scope" check | 10:07 |
slaweq | ralonsoh: idk | 10:08 |
slaweq | maybe we should ask lbragstad when he will be available | 10:08 |
ralonsoh | perfect, good idea | 10:08 |
ralonsoh | I'll add him to the patch | 10:09 |
*** ociuhandu has joined #openstack-neutron | 10:10 | |
*** spatel has quit IRC | 10:11 | |
*** ociuhandu has quit IRC | 10:19 | |
*** ociuhandu has joined #openstack-neutron | 10:25 | |
*** ociuhandu has quit IRC | 10:29 | |
*** tmorin has quit IRC | 10:32 | |
*** jangutter_ has joined #openstack-neutron | 10:43 | |
*** jangutter has quit IRC | 10:46 | |
lajoskatona | slaweq: Hi, question about new engine facade: is there an etherpad or similar for stadium projects? | 10:52 |
*** gcheresh has quit IRC | 10:53 | |
lajoskatona | slaweq: I just quickly collected a few on hound which I am interested in: https://codesearch.opendev.org/?q=context.session.begin&i=nope&files=&excludeFiles=&repos=openstack/networking-bagpipe,openstack/networking-bgpvpn,openstack/networking-odl,openstack/neutron,openstack/neutron-dynamic-routing,x/networking-l2gw,x/tap-as-a-service | 10:53 |
slaweq | lajoskatona: nope | 11:04 |
slaweq | I didn't made anything like that | 11:04 |
*** yumiriam has joined #openstack-neutron | 11:12 | |
*** carloss has joined #openstack-neutron | 11:21 | |
*** yumiriam has quit IRC | 11:24 | |
*** ociuhandu has joined #openstack-neutron | 11:39 | |
*** ociuhandu has quit IRC | 11:39 | |
lajoskatona | slaweq: thanks | 11:42 |
*** spatel has joined #openstack-neutron | 11:54 | |
*** spatel has quit IRC | 11:58 | |
slaweq | ralonsoh: I'm looking now at https://review.opendev.org/c/openstack/neutron/+/765418/1/neutron/conf/policies/qos.py proposed by lbragstad and it seems that it's done in same way like my patches | 12:00 |
*** ratailor has quit IRC | 12:01 | |
ralonsoh | slaweq, I need to learn how policies are applied. If we have "role" and "scope", how this is checked | 12:03 |
ralonsoh | that's what I don't understand: | 12:03 |
ralonsoh | in the policy we specify a str check, that has a role and scope | 12:03 |
ralonsoh | but also we specify the scope_types (??) | 12:03 |
slaweq | ralonsoh: https://docs.openstack.org/keystone/latest/contributor/services.html#authorization-scopes | 12:05 |
slaweq | IIUC those are like "2 levels" of checkjs | 12:05 |
slaweq | *checks | 12:05 |
slaweq | but maybe I'm wrong with it | 12:05 |
slaweq | btw ralonsoh can You +W https://review.opendev.org/c/openstack/neutron/+/764436 ? | 12:06 |
ralonsoh | slaweq, sure | 12:06 |
slaweq | thx | 12:06 |
*** ociuhandu has joined #openstack-neutron | 12:11 | |
*** ociuhandu has quit IRC | 12:20 | |
*** jpena is now known as jpena|lunch | 12:32 | |
*** zzzeek has quit IRC | 12:36 | |
*** zzzeek has joined #openstack-neutron | 12:37 | |
*** cgoncalves has quit IRC | 12:45 | |
*** cgoncalves has joined #openstack-neutron | 12:46 | |
*** cgoncalves has quit IRC | 12:47 | |
*** ociuhandu has joined #openstack-neutron | 12:51 | |
*** ociuhandu has quit IRC | 12:59 | |
*** spatel has joined #openstack-neutron | 13:00 | |
*** spatel has quit IRC | 13:05 | |
*** macz_ has joined #openstack-neutron | 13:08 | |
*** macz_ has quit IRC | 13:12 | |
*** ociuhandu has joined #openstack-neutron | 13:17 | |
*** ociuhandu has quit IRC | 13:17 | |
*** jpena|lunch is now known as jpena | 13:29 | |
*** ociuhandu has joined #openstack-neutron | 13:36 | |
*** cgoncalves has joined #openstack-neutron | 13:40 | |
*** ociuhandu has quit IRC | 13:43 | |
lbragstad | slaweq ralonsoh o/ | 13:46 |
slaweq | lbragstad: hi | 13:47 |
lbragstad | sounds like you had some questions about the check strings? | 13:48 |
lbragstad | can i do anything to help clarify that? | 13:49 |
ralonsoh | lbragstad, hi thanks | 13:50 |
slaweq | lbragstad: https://review.opendev.org/c/openstack/neutron/+/764980/1/neutron/conf/policies/address_scope.py | 13:50 |
slaweq | there is your comment there which I'm not sure if I understand really | 13:50 |
ralonsoh | in Nova the strings are only roles | 13:50 |
slaweq | and I'm not sure if I understand how those various scopes and roles works really | 13:50 |
ralonsoh | but not roles+scope | 13:50 |
lbragstad | yeah - good question | 13:51 |
ralonsoh | I though that the scope was given by the scope_types | 13:51 |
lbragstad | it really depends on the API | 13:51 |
lbragstad | in the simplest example, lets assume you have a system-level API | 13:51 |
lbragstad | you could protect it with a policy that has check_str='role:admin' and scope_types=['system'] | 13:51 |
slaweq | lbragstad: like e.g. agents in neutron, right? | 13:52 |
lbragstad | sure | 13:52 |
slaweq | k | 13:52 |
lbragstad | that's a good example | 13:52 |
lbragstad | so - in that case, the scope check is handled completely outside of the check string | 13:52 |
lbragstad | so long as `neutron.conf [oslo_policy] enforce_scope = True` oslo.policy is going to check the scope of the context object against the scope_types attribute of the policy rule | 13:53 |
slaweq | lbragstad: so it's like another "level" of checks? | 13:53 |
lbragstad | and advantage of this is that it allows service developers the ability to set what layer an API is designed to work at | 13:53 |
lbragstad | slaweq yeah - pretty much | 13:53 |
slaweq | k | 13:54 |
lbragstad | it just takes a more strict stance in saying "this API is system-level, make sure it's invoked with system-level authorization" | 13:54 |
lbragstad | if we take another example | 13:54 |
lbragstad | routers for example | 13:54 |
lbragstad | which is an API accessible to project users but administrators could arguably go in and view or clean things up if needed | 13:55 |
*** xinranwang has joined #openstack-neutron | 13:55 | |
slaweq | and that's why we have "system" and "project" scopes there, right? | 13:55 |
lbragstad | in that case we might have something like this, check_str='(role:admin and system_scope:all) or (role:member and project_id:s(project_id)s)' | 13:56 |
lbragstad | yeah | 13:56 |
lbragstad | exactly | 13:56 |
lbragstad | so we need to have scope_types=['system', 'project'] so that the enforcer will allow both token types to be used with that policy check | 13:56 |
slaweq | ok | 13:57 |
lbragstad | we can also do something like check_str='role:reader', scope_types=['system', 'project'] | 13:57 |
lbragstad | to protect read-only APIs | 13:57 |
slaweq | so, does it makes sense to have some api with check_str SYSTEM_OR_PROJECT_ADMIN and set just "project" scope? | 13:57 |
slaweq | this last question is just theoretical :) | 13:58 |
ralonsoh | why do we need then those rule strings https://review.opendev.org/c/openstack/neutron/+/764437/3/neutron/conf/policies/base.py? | 13:58 |
ralonsoh | if the check string should be the role only | 13:59 |
*** mlavalle has joined #openstack-neutron | 13:59 | |
ralonsoh | (like in Nova) | 13:59 |
lbragstad | if you have something like check_str='(role:admin and system_scope:all) or (role:member and project_id:%(project_id)s)' but only scope_types=['project'] only project members will be allowed to access that API if enforce_scope = True | 13:59 |
slaweq | ok, I see | 13:59 |
lbragstad | ralonsoh good question | 13:59 |
lbragstad | i think we can simplify the SYSTEM_OR_PROJECT_READER check to only include the role | 14:00 |
ralonsoh | right, now that makes sense to me | 14:00 |
lbragstad | you'll need the scope check built into the check string if the role deviates across scopes | 14:00 |
ralonsoh | ooook good point | 14:01 |
lbragstad | for example, if you want to allow system-admins to cleanup routers, but project-members should be able to cleanup routers for only their project | 14:01 |
lbragstad | because that's what enforces tenancy to make sure people aren't accessing/deleting/creating things outside their project | 14:01 |
lbragstad | the 'role:member and project_id:%(project_id)s' bit is what ensures someone with the member role can't delete a router outside their project | 14:02 |
*** jmlowe has quit IRC | 14:02 | |
ralonsoh | ok, I see that now | 14:02 |
lbragstad | (assuming neutron passing the project_id of the router in the DELETE request | 14:02 |
ralonsoh | sure, of course hehehe | 14:02 |
lbragstad | but - yeah... | 14:03 |
lbragstad | it's kind of a long answer | 14:03 |
slaweq | lbragstad: one more, quick question | 14:03 |
lbragstad | sure | 14:03 |
slaweq | about your comment to https://review.opendev.org/c/openstack/neutron/+/764980/1/neutron/conf/policies/address_scope.py | 14:03 |
slaweq | I already added there scope_types=['project','system'] | 14:03 |
slaweq | should I change it to 'project' only? | 14:04 |
lbragstad | if neutron expects a project_id whenever it creates an address_scope, then i think that's safe | 14:04 |
lbragstad | that'll just mean that you must always use a project-scope token when creating an address_scope | 14:04 |
slaweq | ahh, becase if that would be done by user with system scope then there wouldn't be project_id in the context | 14:05 |
lbragstad | correct - neutron would need to make an assumption about what project to put that resource under | 14:05 |
slaweq | ok, I see now | 14:06 |
slaweq | so I think that maybe I will need to change some of my patches :) | 14:06 |
slaweq | thx lbragstad for explanations | 14:06 |
ralonsoh | thanks a lot! | 14:06 |
lbragstad | in some projects, that's an easy assumption to make because there are alternative ways of passing in the project_id | 14:06 |
lbragstad | for example, some APIs allow users to set the project_id of a resource in the body of the create request | 14:06 |
lbragstad | which could be used as a way for system-admins to create resources on behalf of a project (for better or worse) | 14:07 |
*** tkajinam has quit IRC | 14:07 | |
ralonsoh | yeah, that means a system admin can create this kind of resources? | 14:07 |
ralonsoh | passing the project_id | 14:07 |
lbragstad | right | 14:07 |
ralonsoh | perfect | 14:07 |
lbragstad | but... | 14:07 |
lbragstad | it does mean you need to double check that project_ids from the request body match the project_id from context objects | 14:08 |
lbragstad | (to prevent end users to injecting routers into projects they don't have any authorization on) | 14:08 |
ralonsoh | right | 14:08 |
lbragstad | s/end users/project users/ | 14:08 |
slaweq | ok, so in neutron I think that system admin can always put project id in the POST body | 14:09 |
slaweq | lbragstad: as we checked yesterday - it's checked in neutron-lib | 14:09 |
* lbragstad nods | 14:10 | |
slaweq | so to allow that with the new rbac we should everywhere there have "system" added to the scope_types | 14:10 |
slaweq | and eventually improve check in neutron lib | 14:10 |
lbragstad | yeah - wherever you plan to have system-users create things, even if it's on behalf of a project user | 14:10 |
slaweq | lbragstad: it was like that so far so I think we should keep it | 14:11 |
slaweq | at least in that first step | 14:11 |
lbragstad | sure | 14:11 |
slaweq | otherwise it would be too big change | 14:11 |
slaweq | thx a lot, now I understand those scopes much better :) | 14:11 |
lbragstad | i'm certainly not in a position to tell projects to remove or modify APIs that allow operators to create resources on behalf of users :) | 14:12 |
lbragstad | but - the underlying tools should give service developers all the tools to safely enforce those cases if needed | 14:12 |
lbragstad | s/underlying tools/underlying libraries/ | 14:13 |
lbragstad | i worked through some of the resources yesterday, but feel free to adjust or tweak any of those policies if needed | 14:15 |
slaweq | lbragstad: yes, I saw it, thx a lot | 14:21 |
slaweq | I also sent few patches today | 14:21 |
lbragstad | slaweq cool - i'll work on proposing any missing policies on monday | 14:23 |
*** jmlowe has joined #openstack-neutron | 14:25 | |
*** jmlowe has quit IRC | 14:31 | |
*** ociuhandu has joined #openstack-neutron | 14:33 | |
*** ociuhandu has quit IRC | 14:33 | |
*** ociuhandu has joined #openstack-neutron | 14:38 | |
*** ociuhandu has quit IRC | 14:43 | |
*** jmlowe has joined #openstack-neutron | 14:43 | |
*** bnemec has joined #openstack-neutron | 14:44 | |
*** openstackgerrit has joined #openstack-neutron | 14:49 | |
openstackgerrit | Lajos Katona proposed openstack/neutron-dynamic-routing master: Migrate to new engine facade https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/765543 | 14:49 |
*** jmlowe has quit IRC | 14:50 | |
*** bnemec is now known as beekneemech | 14:50 | |
*** jmlowe has joined #openstack-neutron | 14:52 | |
*** jmlowe has quit IRC | 14:54 | |
*** ociuhandu has joined #openstack-neutron | 14:56 | |
*** tmorin has joined #openstack-neutron | 15:00 | |
*** ociuhandu has quit IRC | 15:03 | |
*** imtiazc has joined #openstack-neutron | 15:03 | |
*** jmlowe has joined #openstack-neutron | 15:17 | |
*** jmlowe has quit IRC | 15:29 | |
johnsom | haleyb: Yeah, you can do that license proxy thing with Octavia today. Put the VIP on the isolated tenant network, the add members to the LB that point to the license server(s), etc. | 15:29 |
haleyb | johnsom: yeah, i didn't see the need to re-invent things, one of our thoughts was just a VM on the isolated network, but Octavia would be better (IMHO) | 15:32 |
*** jmlowe has joined #openstack-neutron | 15:51 | |
slaweq | ralonsoh: if You have few minutes, can You also check https://review.opendev.org/c/openstack/neutron/+/764831 ? | 15:54 |
slaweq | thx in advance | 15:54 |
ralonsoh | slaweq, ah yes this one | 15:55 |
ralonsoh | sure | 15:55 |
slaweq | ralonsoh: I also addressed your comments in https://review.opendev.org/c/openstack/neutron/+/763204 | 15:56 |
slaweq | if You have some time, also this one is now good to go https://review.opendev.org/c/openstack/neutron/+/761613/ :) | 15:57 |
ralonsoh | slaweq, ^^ good one this patch | 16:01 |
ralonsoh | we don't need it there | 16:01 |
*** jmlowe has quit IRC | 16:01 | |
slaweq | ralonsoh: now, as neutron-tempest-plugin-api runs with uwsgi, I don't think we need that one too | 16:01 |
ralonsoh | correct, I agree | 16:02 |
openstackgerrit | Rodolfo Alonso proposed openstack/neutron-tempest-plugin master: Project ID is checked when listing security groups https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/754390 | 16:03 |
*** ociuhandu has joined #openstack-neutron | 16:04 | |
*** macz_ has joined #openstack-neutron | 16:06 | |
*** ociuhandu has quit IRC | 16:09 | |
openstackgerrit | zhanghao proposed openstack/neutron master: [OVN] Implement router gateway IP QoS https://review.opendev.org/c/openstack/neutron/+/749012 | 16:15 |
*** jmlowe has joined #openstack-neutron | 16:17 | |
*** lajoskatona has quit IRC | 16:26 | |
*** ralonsoh has quit IRC | 16:35 | |
*** mlavalle has quit IRC | 16:35 | |
*** ralonsoh has joined #openstack-neutron | 16:35 | |
*** mlavalle has joined #openstack-neutron | 16:36 | |
gmann | amotoki: slaweq this is ready now - https://review.opendev.org/c/openstack/neutron/+/764401 | 16:42 |
*** jlibosva has quit IRC | 16:48 | |
*** bengates has quit IRC | 16:50 | |
*** tesseract has quit IRC | 16:57 | |
*** lpetrut has quit IRC | 17:00 | |
openstackgerrit | Merged openstack/ovn-octavia-provider master: Retry status updates to Octavia https://review.opendev.org/c/openstack/ovn-octavia-provider/+/759139 | 17:01 |
*** xinranwang has quit IRC | 17:05 | |
*** imtiazc has quit IRC | 17:08 | |
*** ociuhandu has joined #openstack-neutron | 17:11 | |
*** ociuhandu has quit IRC | 17:11 | |
openstackgerrit | Merged openstack/ovn-octavia-provider master: Change devstack script to correctly configure driver https://review.opendev.org/c/openstack/ovn-octavia-provider/+/757920 | 17:12 |
openstackgerrit | Merged openstack/ovn-octavia-provider master: Add master and release tempest jobs https://review.opendev.org/c/openstack/ovn-octavia-provider/+/742445 | 17:12 |
*** ociuhandu has joined #openstack-neutron | 17:12 | |
*** imtiazc has joined #openstack-neutron | 17:12 | |
*** imtiazc has quit IRC | 17:16 | |
*** ociuhandu has quit IRC | 17:16 | |
openstackgerrit | Merged openstack/ovn-octavia-provider master: Include python36-devel in bindep https://review.opendev.org/c/openstack/ovn-octavia-provider/+/756065 | 17:17 |
*** ociuhandu has joined #openstack-neutron | 17:20 | |
*** imtiazc has joined #openstack-neutron | 17:23 | |
openstackgerrit | Hang Yang proposed openstack/neutron master: Add standard_attrs to address group https://review.opendev.org/c/openstack/neutron/+/764228 | 17:27 |
openstackgerrit | Hang Yang proposed openstack/neutron master: Get sec group ids after address group update https://review.opendev.org/c/openstack/neutron/+/763828 | 17:29 |
openstackgerrit | Hang Yang proposed openstack/neutron master: <WIP> Support address group in OVS firewall agent https://review.opendev.org/c/openstack/neutron/+/757650 | 17:29 |
*** ociuhandu has quit IRC | 17:30 | |
*** ociuhandu has joined #openstack-neutron | 17:31 | |
*** ociuhandu has quit IRC | 17:31 | |
*** tmorin has quit IRC | 17:33 | |
*** beekneemech has quit IRC | 17:49 | |
*** jmlowe has quit IRC | 17:58 | |
*** jpena is now known as jpena|off | 17:59 | |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/victoria: Retry status updates to Octavia https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765596 | 18:00 |
*** jangutter has joined #openstack-neutron | 18:00 | |
*** jangutter_ has quit IRC | 18:04 | |
*** jmlowe has joined #openstack-neutron | 18:18 | |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Retry status updates to Octavia https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765582 | 18:20 |
*** raildo has quit IRC | 18:21 | |
*** jangutter has quit IRC | 18:22 | |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/victoria: Fix leaked file descriptors by cleaning up objects https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765597 | 18:22 |
*** jangutter has joined #openstack-neutron | 18:22 | |
*** jmlowe has quit IRC | 18:22 | |
*** jmlowe has joined #openstack-neutron | 18:25 | |
*** jangutter has quit IRC | 18:25 | |
*** jangutter has joined #openstack-neutron | 18:26 | |
*** hamalq has joined #openstack-neutron | 18:36 | |
*** ccamposr has joined #openstack-neutron | 18:36 | |
*** ccamposr__ has quit IRC | 18:38 | |
*** jangutter has quit IRC | 18:39 | |
*** jangutter has joined #openstack-neutron | 18:40 | |
*** jangutter has quit IRC | 18:40 | |
*** jangutter has joined #openstack-neutron | 18:41 | |
*** raildo has joined #openstack-neutron | 18:43 | |
*** jangutter has quit IRC | 18:45 | |
*** raildo has quit IRC | 18:45 | |
*** jangutter has joined #openstack-neutron | 18:46 | |
*** raildo has joined #openstack-neutron | 18:48 | |
*** jmlowe has quit IRC | 18:52 | |
*** elvira has quit IRC | 18:53 | |
*** jmlowe has joined #openstack-neutron | 19:06 | |
*** jmlowe has quit IRC | 19:09 | |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Retry status updates to Octavia https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765582 | 19:19 |
*** luksky has quit IRC | 19:46 | |
*** luksky has joined #openstack-neutron | 19:46 | |
openstackgerrit | Merged openstack/neutron master: [GRE] Add possibility to create GRE tunnels over IPv6 https://review.opendev.org/c/openstack/neutron/+/763204 | 19:52 |
*** jangutter_ has joined #openstack-neutron | 20:05 | |
openstackgerrit | Merged openstack/neutron master: Ensure ovsdb_probe_interval set before connect() https://review.opendev.org/c/openstack/neutron/+/764235 | 20:05 |
*** jangutter has quit IRC | 20:09 | |
openstackgerrit | Terry Wilson proposed openstack/neutron stable/victoria: Ensure ovsdb_probe_interval set before connect() https://review.opendev.org/c/openstack/neutron/+/765599 | 20:16 |
openstackgerrit | Terry Wilson proposed openstack/neutron stable/victoria: Ensure ovsdb_probe_interval set before connect() https://review.opendev.org/c/openstack/neutron/+/765599 | 20:21 |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765619 | 20:23 |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765619 | 20:23 |
*** ralonsoh has quit IRC | 20:29 | |
openstackgerrit | Brian Haley proposed openstack/networking-ovn stable/train: Fix leaked file descriptors by cleaning up objects https://review.opendev.org/c/openstack/networking-ovn/+/765620 | 20:35 |
*** jmlowe has joined #openstack-neutron | 20:36 | |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765619 | 20:38 |
openstackgerrit | Brian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects https://review.opendev.org/c/openstack/ovn-octavia-provider/+/765619 | 20:38 |
openstackgerrit | Brian Haley proposed openstack/networking-ovn stable/train: Retry status updates to Octavia https://review.opendev.org/c/openstack/networking-ovn/+/765621 | 20:41 |
*** jamesdenton has quit IRC | 20:51 | |
*** jamesdenton has joined #openstack-neutron | 20:51 | |
*** ociuhandu has joined #openstack-neutron | 20:51 | |
*** gcheresh has joined #openstack-neutron | 20:58 | |
*** ociuhandu has quit IRC | 21:16 | |
*** tmorin has joined #openstack-neutron | 21:24 | |
*** mlavalle has quit IRC | 21:38 | |
*** mlavalle has joined #openstack-neutron | 21:40 | |
*** tmorin has quit IRC | 21:41 | |
*** ociuhandu has joined #openstack-neutron | 21:47 | |
openstackgerrit | Terry Wilson proposed openstack/neutron stable/ussuri: Ensure ovsdb_probe_interval set before connect() https://review.opendev.org/c/openstack/neutron/+/765628 | 21:53 |
*** raildo has quit IRC | 21:59 | |
*** tkajinam has joined #openstack-neutron | 22:00 | |
*** ociuhandu has quit IRC | 22:11 | |
*** ociuhandu has joined #openstack-neutron | 22:11 | |
*** gcheresh has quit IRC | 22:14 | |
*** ociuhandu has quit IRC | 22:16 | |
*** ociuhandu has joined #openstack-neutron | 22:22 | |
openstackgerrit | Merged openstack/neutron stable/rocky: Rehome api tests for propagate_uplink_status https://review.opendev.org/c/openstack/neutron/+/764412 | 22:22 |
*** jamesdenton has quit IRC | 22:40 | |
*** jamesdenton has joined #openstack-neutron | 22:40 | |
*** macz_ has quit IRC | 22:51 | |
*** luksky has quit IRC | 23:20 | |
*** ociuhandu has quit IRC | 23:29 | |
*** ociuhandu has joined #openstack-neutron | 23:30 | |
*** ociuhandu has quit IRC | 23:35 |
Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!