Friday, 2024-03-08

opendevreviewJeffrey Zhang proposed openstack/nova master: Do not change nic queue count during live migration after vcpu hot resized  https://review.opendev.org/c/openstack/nova/+/91208205:44
*** mklejn_ is now known as mklejn07:58
opendevreviewmelanie witt proposed openstack/nova master: Support create with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/87093209:11
opendevreviewmelanie witt proposed openstack/nova master: Support (resize|cold migration) with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/87093309:11
opendevreviewmelanie witt proposed openstack/nova master: Support live migration with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/90551209:11
opendevreviewmelanie witt proposed openstack/nova master: Support rebuild with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/87093909:11
opendevreviewmelanie witt proposed openstack/nova master: Support rescue with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/87367509:11
opendevreviewmelanie witt proposed openstack/nova master: Add encryption support to qemu-img rebase  https://review.opendev.org/c/openstack/nova/+/87093609:11
opendevreviewmelanie witt proposed openstack/nova master: Support snapshot with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/87093709:11
opendevreviewmelanie witt proposed openstack/nova master: Add backing_encryption_secret_uuid to BlockDeviceMapping  https://review.opendev.org/c/openstack/nova/+/90796009:11
opendevreviewmelanie witt proposed openstack/nova master: Support encrypted backing files for qcow2  https://review.opendev.org/c/openstack/nova/+/90796109:11
opendevreviewmelanie witt proposed openstack/nova master: Support cross cell resize with ephemeral encryption for qcow2  https://review.opendev.org/c/openstack/nova/+/90959509:11
opendevreviewmelanie witt proposed openstack/nova master: libvirt: Introduce support for raw with LUKS  https://review.opendev.org/c/openstack/nova/+/88431309:11
opendevreviewmelanie witt proposed openstack/nova master: libvirt: Introduce support for rbd with LUKS  https://review.opendev.org/c/openstack/nova/+/88991209:11
opendevreviewmelanie witt proposed openstack/nova master: Report ephemeral disk encryption in the metadata API  https://review.opendev.org/c/openstack/nova/+/90994509:11
opendevreviewmelanie witt proposed openstack/nova master: Deprecate legacy ephemeral storage encryption using dm-crypt  https://review.opendev.org/c/openstack/nova/+/90994709:11
opendevreviewmelanie witt proposed openstack/nova master: Documentation for ephemeral encryption  https://review.opendev.org/c/openstack/nova/+/91003409:11
opendevreviewmelanie witt proposed openstack/nova master: Consolidate vTPM and ephemeral encryption secret creation  https://review.opendev.org/c/openstack/nova/+/91209409:11
opendevreviewmelanie witt proposed openstack/nova master: Documentation for ephemeral encryption  https://review.opendev.org/c/openstack/nova/+/91003409:13
melwittdansmith: ^ rebased, added some of the things we talked about, fixed the problem with rbd (I had missed updating a variable name that got changed). didn't add the decorator for checking key access yet09:16
opendevreviewmelanie witt proposed openstack/nova master: DNM test ephemeral encryption + resize: qcow2, raw, rbd  https://review.opendev.org/c/openstack/nova/+/86241609:20
*** tobias-urdin4 is now known as tobias-urdin10:23
opendevreviewMerged openstack/python-novaclient master: Bump microversion to 2.96  https://review.opendev.org/c/openstack/python-novaclient/+/91157510:33
*** ralonsoh__ is now known as ralonsoh12:25
*** carloss_ is now known as carloss13:15
dansmithmelwitt: fixed which problem, the reason I couldn't boot from the snap?14:30
fungibauzas: do you happen to know if nova had any development highlights to call out for 2024.1? today was supposed to be the deadline for collecting those, but we can usually work additions in if they're in the next week-ish14:31
bauzasfungi: shit, I forgot14:32
bauzasfungi: I'll work on it 14:32
fungino worries, there's a ton of stuff going on (always)14:32
*** mklejn__ is now known as mklejn15:02
dansmithmelwitt: okay must be because using the same code you had before seems to work on qcow (i.e. boot from encrypted snap15:42
elodillesbauzas: if you are still around, fyi: https://review.opendev.org/c/openstack/releases/+/91227516:00
elodillesbauzas: and this, respectively: https://review.opendev.org/c/openstack/releases/+/91094016:01
bauzaselodilles: thanks I was about to ask you to create a new release for the client16:01
bauzaselodilles: +1d16:02
elodillesthx too o/16:04
dansmithmelwitt: so if I create an encrypted instance, snapshot it to an encrypted image, then boot an instance with an unencrypted flavor from that encrypted image, what do you expect to happen?16:10
melwittdansmith: yes, sorry, by "rbd problem" I meant the weird qemu-img convert and the inability to boot from the snapshot. for rbd only17:04
melwittdansmith: in that scenario I would expect the instance you booted to have encrypted disks, _unless_ the flavor is explicitly disabling encryption i.e. hw:ephemeral_encryption=false. if it's explicitly disabled in the flavor, the API should reject the request because of the conflict between flavor and image17:06
dansmithmelwitt: ah, okay lemme try that I guess17:30
dansmithmelwitt: so indeed, by default you get another encrypted stack which is maybe what you expect and maybe not17:30
dansmithhowever, if your goal is to get an unencrypted image, you'd currently have no way out of that situation if there was no negative flavor for you to use17:31
melwittdansmith: the image has image properties requesting encryption so you should expect it17:31
dansmithif we add the snapshot=(rekey,samekey,nokey) option then you could, but you'd have to jump through another snapshot hook to sort of free yourself from the overhead of the encryption17:32
dansmithmelwitt: I expect it for the image, but not the instance disk17:32
dansmithlike, I expected to have an encrypted qcow backing file, but unencrypted (i.e. full speed) disk when I write17:32
melwittdansmith: encryption is requested through image properties and flavors. the image has hw_ephemeral_encryption=true so it is expected to encrypt the disks17:33
dansmithI know why I don't but that was what I was trying to do to see if it worked (before I realized obviously it wouldn't)17:33
dansmithyeah, I understand why it's doing it, I'm just saying with my user hat on it was not what I was expecting17:33
melwittmeaning you didn't expect the encrypted snapshot Nova made to have hw_ephemeral_encryption=true set? or you expected the flavor to override the image property?17:34
dansmithno, the image has to have that set because it's encrypted, I was thinking the default was false in the flavor, but it's not, it's "default is do what the image says" ... which again I understand,17:35
dansmithbut if I'm a user and I'm handed an encrypted image and I want to boot from it but don't want to take the write hit for an encrypted disk, I'm stuck unable to get out of that loop17:36
dansmithwith just user tools17:36
dansmithor without downloading, unkeying and re-uploading the image17:36
melwittno, the default is check the flavor and image and if either one says encryption=true, the disks get encrypted17:36
melwittif one says encryption=true and the other says encryption=false, that is invalid and the api should reject it17:37
dansmithsure, but as a user, the flavor is the tool I'm given to control what the target environment looks like.. it's definitely confusing and grey with some stuff in both places for sure17:38
dansmithI'm just saying, I expected to be able to break out of the loop without having to download and unkey the image myself17:38
melwittI am expecting to add the microversion for the snapshot api stuff btw, I put it in the spec reproposal. so there will be that 17:38
dansmithyep, that will help for sure, but means I have to snapshot to get through17:39
dansmithso, I was just thinking:17:39
dansmithwait, let me pull up the image meta patch17:39
melwittyeah, I guess .. I'm not sure how nova would know what to do if flavor and image can request it and image requests it. how could it know you want unencrypted17:40
dansmithokay, so I wasn't thinking about that true/false flag since it's not actually added by this series, but does that mean if I snapshot to encrypted image,17:41
dansmithleave the secret_uuid in place, but set hw_empheral_encryption=False, then I can boot from that image and get a non-encrypted root disk (backed by the encrypted image) ?17:41
melwittah, yeah. it was much earlier on in the series. I think it was even before I started working on it17:42
dansmithI was thinking you were just keying off the presence of the secret17:42
melwittyeah I was thinking that. but I'm not sure if it will handle it correctly. well, actually I think it will complain because of what we talked about earlier, if hw_ephemeral_encryption_secret_uuid is present then we require hw_ephemeral_encryption_format. and I think I also added that it require hw_ephemeral_encryption too in that case. so I may need to change that to make it take the encrypted image => unencrypted disks17:44
dansmiththis is sort of my complaint about using hw_ for all this oo,17:45
dansmithbecause the secret uuid is not anything to do with hw, or the resulting vm, it's purely an attribute of the image17:46
dansmithas is kinda luks as well17:46
dansmithbut it seems to me that we should use the boolean flag to control whether or not you actually get an encrypted disk on your instance (which I think is why it was added originally) and the others to say "if so, this is how" and they also apply to the image in terms of "here is how you should interpret the data inside here"17:47
melwittyeah. I have thought similar that the secret uuid in the image property can/should be able to stand alone17:47
dansmithtbh, glance should have been extended with a luks disk_format instead of what's going on here, but...17:47
dansmithyeah17:47
dansmithyeah, setting that =false doesn't change anything.. still works, boots, but is encrypted17:52
melwittok, good to know. I can change it to make it do the thing in that case17:52
dansmithokay cool I think that'd be good so I (as a user) has an out17:53
dansmithI can see an operator not wanting to allow you to exfiltrate an image that way, but there are a hundred other ways to do it and I think that if we rely on the image property there that they can use the image property permissions to block changes to it17:53
melwittack17:56
*** blarnath is now known as d34dh0r5318:09
JayFbauzas: if you want to give a bullet point to the ironic driver in cycle highlights, I'm happy to draft a thing for you. Just let me know. If you want to do it, I'd highlight the SDK migration in addition to sharding :)20:20
artomWhoever thought that making the compute_rpcapi.rollback_live_migration_at_destination() a conditional *from the source* deserves... bad things.22:03
artomAlthough apparently it's safe to add conditions, since vpmem and mdevs has been added22:05
opendevreviewArtom Lifshitz proposed openstack/nova master: Add cpuset_reserved helper to instance NUMA topology  https://review.opendev.org/c/openstack/nova/+/91002023:05
opendevreviewArtom Lifshitz proposed openstack/nova master: Reproducer for not powering on isolated emulator threads cores  https://review.opendev.org/c/openstack/nova/+/91002123:06
opendevreviewArtom Lifshitz proposed openstack/nova master: Power on cores for isolated emulator threads  https://review.opendev.org/c/openstack/nova/+/90979523:06
opendevreviewArtom Lifshitz proposed openstack/nova master: Reproducer test for live migration with power management  https://review.opendev.org/c/openstack/nova/+/91002223:06
opendevreviewArtom Lifshitz proposed openstack/nova master: pwr mgmt: handle live migrations correctly  https://review.opendev.org/c/openstack/nova/+/90980623:06
opendevreviewArtom Lifshitz proposed openstack/nova master: pwr mgmt: make API into a per-driver object  https://review.opendev.org/c/openstack/nova/+/91232023:06

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!