Wednesday, 2022-11-30

opendevreviewMerged openstack/nova stable/xena: Fix the wrong exception used to retry detach API calls  https://review.opendev.org/c/openstack/nova/+/82904900:08
opendevreviewGhanshyam proposed openstack/placement master: Policy defaults improvement spec  https://review.opendev.org/c/openstack/placement/+/86438504:05
gmanngibi: sean-k-mooney: ^^ added the BP link in the placement policy spec04:06
gmannbauzas: all done for placement project in LP, updated Driver and Maintainer to 'Nova Drivers' group https://launchpad.net/placement04:07
opendevreviewGhanshyam proposed openstack/placement master: Policy defaults improvement spec  https://review.opendev.org/c/openstack/placement/+/86438504:08
opendevreviewTakashi Kajinami proposed openstack/os-vif master: Fix how deprecated_reason of ovsdb_interface is logged  https://review.opendev.org/c/openstack/os-vif/+/86610205:13
*** akekane is now known as abhishekk05:53
gibigmann: thanks, I'm +208:24
bauzasgmann: cool, thanks for the LP janitoring08:35
opendevreviewSahid Orentino Ferdjaoui proposed openstack/nova-specs master: fixing: allowing target state for evacuate  https://review.opendev.org/c/openstack/nova-specs/+/86610808:53
*** labedz__ is now known as labedz09:12
opendevreviewFabian Wiesel proposed openstack/nova master: Add more password generation options  https://review.opendev.org/c/openstack/nova/+/86566909:37
opendevreviewKirill proposed openstack/nova-specs master: new spec: support of vnc console for ironic  https://review.opendev.org/c/openstack/nova-specs/+/86377310:33
opendevreviewMerged openstack/nova stable/victoria: Adds a repoducer for post live migration fail  https://review.opendev.org/c/openstack/nova/+/86390211:00
sean-k-mooneygmann: fyi im adding you to https://review.opendev.org/c/openstack/nova-specs/+/863773 to check my reasoning for why this would be ok to implemtne without an api microversion11:55
opendevreviewMerged openstack/placement master: Policy defaults improvement spec  https://review.opendev.org/c/openstack/placement/+/86438512:18
*** dasm|off is now known as dasm12:43
opendevreviewTakashi Kajinami proposed openstack/os-vif master: Fix how deprecated_reason of ovsdb_interface is logged  https://review.opendev.org/c/openstack/os-vif/+/86610213:01
opendevreviewSylvain Bauza proposed openstack/nova stable/zed: Reproducer for bug 1951656  https://review.opendev.org/c/openstack/nova/+/86615113:04
opendevreviewSylvain Bauza proposed openstack/nova stable/zed: Handle mdev devices in libvirt 7.7+  https://review.opendev.org/c/openstack/nova/+/86615213:04
opendevreviewSylvain Bauza proposed openstack/nova stable/yoga: Reproducer for bug 1951656  https://review.opendev.org/c/openstack/nova/+/86615313:06
opendevreviewSylvain Bauza proposed openstack/nova stable/yoga: Handle mdev devices in libvirt 7.7+  https://review.opendev.org/c/openstack/nova/+/86615413:06
opendevreviewSylvain Bauza proposed openstack/nova stable/xena: Reproducer for bug 1951656  https://review.opendev.org/c/openstack/nova/+/86615513:07
opendevreviewSylvain Bauza proposed openstack/nova stable/xena: Handle mdev devices in libvirt 7.7+  https://review.opendev.org/c/openstack/nova/+/86615613:07
opendevreviewSylvain Bauza proposed openstack/nova stable/wallaby: Reproducer for bug 1951656  https://review.opendev.org/c/openstack/nova/+/86615713:08
opendevreviewSylvain Bauza proposed openstack/nova stable/wallaby: Handle mdev devices in libvirt 7.7+  https://review.opendev.org/c/openstack/nova/+/86615813:08
*** akekane is now known as abhishekk13:48
gmannsean-k-mooney: sure, I will check15:36
*** labedz is now known as labedz_16:49
gmanndansmith: when you will start your leave?16:54
dansmithgmann: next weds is my first day gone16:54
gmannI wanted to discuss about service role in nova. we can discuss now if you are ok?16:54
gmannok16:54
dansmithsure16:54
gmanndansmith: I was testing service role in tempest and it seems the APIs we are targeting for service role (swap volume, sever external) need to get the server and service role cannot do that, https://review.opendev.org/c/openstack/tempest/+/86459516:56
gmannthey need admin permission also to get the servers (as it is of other project)16:56
dansmithgmann: meaning you can't run the whole test with just the service role right?16:56
gmanndansmith: yes, it fail on 404 for server not found16:57
gmanneither we need to allow get server to service user or keep these internal APIs as admin access 16:57
dansmithright so you'll have to do everything *except* swap_volume with a user token, and only swap_volume with the service token right?16:57
gmannyeah16:58
dansmithisn't that what we expect cinder to do? *only* call swap_volume with the service user16:59
gmannbut that need to be further tested if volume get in same situation as service role cannot get volume in cinder16:59
dansmithoh, you mean nova tries to get volume during swap_volume/16:59
gmannnot nova.  may be server external event is good example16:59
sean-k-mooneygmann: for the tempest user could have both both admin and service17:00
bauzasdansmith: when you mean a "leave", you mean a PTO or something else ?17:00
sean-k-mooneyand you coudl drop admin later17:00
dansmithsean-k-mooney: I think that's a bad idea17:00
sean-k-mooneydansmith: becasue we wont know which permission is working17:00
dansmithbauzas: PTO yeah, for the rest of the year, starting +1w from now17:00
gmannsean-k-mooney: we will not be able to drop it right?17:00
dansmithsean-k-mooney: and because we never want an operator to do that17:00
bauzasdansmith: ack, gtk17:00
sean-k-mooneygmann: we should be able to17:01
gmannservice only role does not work so our main goal to make internal APIs for service only is not fulfil 17:01
dansmithyeah, it's not the tempest user gmann is concerned about here right?17:01
gmannyes17:01
dansmithit's some composite operation where the service calling another ends up needing both?17:01
dansmithgmann: finish your example with external_event17:01
sean-k-mooneyyou said " they need admin permission also to get the servers " do you mean cinder17:02
gmannneutron call external event API with service user and then nova will return 40417:02
gmann404 for get server17:02
dansmithgmann: do you mean because nova internally does a get_server?17:02
gmanndansmith: sean-k-mooney either we need to access Db for server with hard coded admin inside the API17:03
gmanndansmith: yes, get server of the requested project if not admin17:03
dansmithare we still checking that at the db layer?17:03
sean-k-mooneydansmith: ya i think we are17:03
gmannI think it match the project_id from context unless it is admin17:03
dansmithokay, so external_event should get the server from the db with admin context, but do the usual policy check of "can you see this" on the result?17:04
sean-k-mooneythe external events api si doign the server get17:04
sean-k-mooneyto get the host17:04
sean-k-mooneyso it know where to send the event17:04
dansmithwell, also just to make sure it's for a legit server right?17:04
gmanndansmith: if we do with admin then no 'get server policy' come into pic17:04
sean-k-mooneyyes also to ensure it exsits17:05
sean-k-mooneyso we coudl make that db check supprot the service user too17:05
gmannif we are ok to use admin context inside those then it should work17:05
dansmithwe need to make sure we don't leak the existence of servers via the external_event API because someone can call it and get a 403 vs 404, which I presume is why we look up the server with user creds now17:05
sean-k-mooneyeventully we proably want to remvoe the db check but as a minimal interim step i think that would be ok17:05
gmanndansmith: yeah that is issue of 403 vs 404 then17:06
gmannand yes leak of server existence 17:06
dansmithyeah, just need to be careful about that17:06
sean-k-mooneywell the api is admin only now17:06
gmannnow is ok, if we make it service only17:06
dansmithyeah, if they get stopped before the server get because they lack service role, then that's fine17:06
gmannI can pass server uuid to know if that exist or not17:06
sean-k-mooneyit would only be an issue if you had the service role17:07
sean-k-mooneywhich no human shoudl ever have17:07
dansmithyeah17:07
gmanndansmith: yes, that policy check will be there for service role before they try getting sevrer17:07
dansmithfor this case.. that might not be the case for all of ours, if we have any that are legit for humans and machines17:07
dansmithgmann: cool17:07
gmannsean-k-mooney: yes, only with service role17:07
sean-k-mooneydansmith: woudl you object ot adding the service role to the place where we check for admin in the db17:08
dansmithsean-k-mooney: I think that's a bad idea17:08
sean-k-mooneyeven if its just an interim step to reventually removing that in the db layer17:08
sean-k-mooneyok so you would prefer we internally escalate to admin context17:08
dansmithsean-k-mooney: not only because it would affect lots of other non-service role things, but also because it expands that check which we probably want to minimize17:08
sean-k-mooneyya that fiar17:09
dansmithI'd prefer we explicitly "elevate" to admin for service role things at the point of access17:09
gmannyeah17:09
gmannok, let me go with approach 1. policy check for service role at start 2. fetch the things (server etc) with admin context 17:09
dansmith++17:09
sean-k-mooneyyep that works for me17:09
sean-k-mooneythe same shoudl apply to swap volume17:10
sean-k-mooneyits the same check that is failign right17:10
gmannok, thanks dansmith sean-k-mooney 17:10
sean-k-mooneythe get_server17:10
gmanndansmith: sean-k-mooney btw if you have time, placement policy updates are ready to review too https://review.opendev.org/c/openstack/placement/+/86561817:10
gmanngibi: ^^17:10
gmannsean-k-mooney: yes17:10
sean-k-mooneygmann: realistically it will be next week before i have time to take a look but i set RP+1 and ill try to come back to itthen17:14
gmannsean-k-mooney: sure, thanks17:15
opendevreviewmelanie witt proposed openstack/nova stable/yoga: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86619217:19
opendevreviewmelanie witt proposed openstack/nova stable/xena: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86619317:20
opendevreviewmelanie witt proposed openstack/nova stable/wallaby: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86619417:21
opendevreviewmelanie witt proposed openstack/nova stable/victoria: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86619517:29
opendevreviewmelanie witt proposed openstack/nova stable/ussuri: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86619617:31
opendevreviewmelanie witt proposed openstack/nova stable/train: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86620118:05
opendevreviewMerged openstack/nova-specs master: fixing: allowing target state for evacuate  https://review.opendev.org/c/openstack/nova-specs/+/86610818:07
opendevreviewMerged openstack/nova stable/yoga: refactor: remove duplicated logic  https://review.opendev.org/c/openstack/nova/+/85502219:05
*** Guest305 is now known as atmark21:07
opendevreviewGhanshyam proposed openstack/nova master: Enable new defaults and scope checks by default  https://review.opendev.org/c/openstack/nova/+/86621821:07
atmarkneed help modifying https://github.com/openstack/nova/blob/master/nova/virt/libvirt/driver.py#L4150-L4172 . I'd like to add to check VM property if it contains say a string 'NoRestart' in addition to ignored_states21:48
opendevreviewGhanshyam proposed openstack/nova master: Enable new defaults and scope checks by default  https://review.opendev.org/c/openstack/nova/+/86621821:54
*** dasm is now known as dasm|off22:23
opendevreviewmelanie witt proposed openstack/nova stable/train: Adapt websocketproxy tests for SimpleHTTPServer fix  https://review.opendev.org/c/openstack/nova/+/86620122:33

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!