Wednesday, 2016-11-09

*** openstackgerrit has quit IRC08:48
*** openstackgerrit has joined #swift308:49
*** Socket_0x03 has joined #swift309:31
*** Socket_0x03 has joined #swift309:31
*** Socket_0x03 has quit IRC09:35
*** CrustY__ has joined #swift310:08
*** CrustY__ is now known as CrustY_10:13
*** CrustY_ is now known as CrustY__10:13
*** CrustY__ is now known as CrustY___10:13
*** CrustY___ is now known as CrustY_10:13
*** CrustY_ is now known as _CrustY10:15
*** _CrustY has quit IRC10:15
*** _CrustY has joined #swift310:15
*** _CrustY has quit IRC10:19
*** _CrustY has joined #swift310:19
*** _CrustY has quit IRC10:20
*** _CrustY has joined #swift310:21
*** i6x86 has joined #swift314:17
*** acoles_ is now known as acoles16:21
*** i6x86 has quit IRC16:48
*** acoles is now known as acoles_18:49
*** i6x86 has joined #swift319:27
*** cschwede has quit IRC20:57
*** i6x86 has quit IRC21:07
*** cschwede has joined #swift321:28
openstackgerritMerged openstack/swift3: Fix error message  https://review.openstack.org/36822221:50
kota_hello23:01
timburkehi kota_!23:02
kota_hi timburke!23:03
kota_timburke: do you know if Simon will be?23:04
timburkenot sure. and not sure about bill_az either23:05
kota_k, let's start here, and will explain if they will be comming23:05
kota_wiki was updated, https://wiki.openstack.org/wiki/Meetings/swift323:06
kota_so on the first item23:07
kota_thanks for attending f2f meeting at barcelona23:08
kota_do you have any thought on that?23:08
timburkenot in particular; seems like we made a good bit of progress in the last cycle -- here's hoping for similar progress in Ocata!23:09
kota_timuburke: yeah and thanks for bringing up for a few of pending patches to me in the swift design session.23:11
kota_timburke: that conversation helps me to keep attention to swift323:12
timburkeyeah! and thanks for having another look at https://review.openstack.org/#/c/384659/23:13
timburke(v3 keystone patch)23:13
kota_yeah, sorry it's intermediate to the complete review to me.23:13
kota_i wanna do that but you know, I has been tied up to the ec thing :/23:14
timburkeauth_version as a separate param isn't a bad idea. with all the deprecation stuff going on in auth_token, i didn't even notice that auth_version *isn't* deprecated23:14
timburkeyeah, i think everyone's a little distracted because of that23:15
kota_kk23:17
kota_timburke: quick confirmation23:17
kota_timburke: always keystone will make the path for s3token validation is ends with '/<version>/s3token'?23:18
kota_timburke: i mean, nothing inserted between version and s3token23:18
timburkei'm not entirely sure. i think that gets defined at https://github.com/openstack/keystone/blob/10.0.0/keystone/contrib/s3/core.py#L43 ?23:20
timburkeno, wait, here: https://github.com/openstack/keystone/blob/10.0.0/keystone/contrib/s3/core.py#L6323:21
timburkeso...hopefully they never change that on us?23:21
kota_it looks true23:21
kota_thanks. so that we can use the concat string with version and s3token23:22
timburkethat's part of why i want to move toward providing a complete path to the endpoint; then operators have the freedom to fix it. it's just the backwards compatibility that's a problem :-/23:22
kota_indeed23:23
timburkemaybe it'd be better if i didn't have the elif block, and only tried to detect that we needed to add '/v2.0/s3tokens'23:24
kota_freedom operators sometimes makes devs hard to work for validations23:24
timburkeand if you want v3, you *have* to specify the whole path23:24
kota_sounds simple!23:25
timburkethe reason i hesitated originally was that the s3tokens endpoint isn't very easily discoverable -- you kinda have to already know it exists23:26
kota_true23:26
kota_ah, sorry23:32
kota_to make you waiting23:32
kota_timburke:^^23:32
kota_so back to barcelona recap, i think it worked well and i think we can expect to progress in Ocata cycle to23:33
timburkeno worries :-) we've got liberasurecode release to worry about :-)23:33
kota_and go to the next topic.23:33
kota_timburke: yeah, need to BOTH of liberasurecode and swift323:34
kota_for us23:34
kota_important, i mean23:34
kota_k,23:34
kota_so from the conversation in barcelona, I'd like to hear which swift version we can bump for your distro.23:35
timburkei think we'd be OK going to any version you like. we'll still have customers on old versions of swift, but i think i'll be comfortable telling them that if they want the latest and greatest swift3, they'll have to upgrade23:36
timburkethere'll be a bit of packaging pain for me, but that's going to happen no matter what version we choose23:36
kota_thanks23:37
kota_considering my company, it's ok for any version too.23:37
kota_and for my opinion, i like to use the newton if nothing problem to IBM23:38
kota_will ask via E-mail.23:38
timburkesounds good23:39
kota_k, next23:40
kota_anything else for today?23:40
timburkei already mentioned my concurrent HEAD patch for SLO -- i'm hoping that we can then actually support 10k parts for multipart uploads (with an appropriate proxy-server.conf)23:41
kota_yeah23:42
timburkebasically, set max_segments to 10000 and the slo concurrency factor to at least 1023:42
kota_it's still in my priority scope with a gerrit star23:42
kota_ah,23:43
timburkepublic cloud might not want to do that, but private could without having clients timing out all the time23:43
kota_sorry confused with SLO etag update in the swift container.23:43
timburkeah, yeah! that's another fun one. trying to reconcile the swift vs S3 etags is proving...hairy23:44
kota_ok23:44
timburkeconcurrent head is https://review.openstack.org/#/c/391682/23:44
kota_thanks23:46
kota_add me to the reviews and make it my star.23:46
timburkeand i think storing etag in sysmeta in https://review.openstack.org/#/c/347538/ *might* be enough that i could move forward on https://review.openstack.org/#/c/302475/ -- the last few paragraphs in the commit message are still aspirational, unfortunately23:47
kota_exactly a tons of sequential HEAD may be problem.23:47
timburke(at least, i think that's still not implemented. maybe i was thinking of some work-in-progress i had to actually match the S3-style etags?)23:48
kota_yeah23:48
kota_so cool23:49
kota_those all looks great. just i need to float up to api/application side from the deep sea of ec lower level c implementation to judge the review.23:50
timburkeanother thing that might be good to land would be https://review.openstack.org/#/c/304367/ -- the i'd start looking at getting it into the gate jobs23:50
kota_on my head cleaning23:50
kota_ceph-s3?23:51
kota_ya, that one23:51
timburkehehe i often feel like i need a good head cleaning23:51
timburkeyeah, the ceph tests. the nice thing is, it can't really break much. the main question is how invasive it is in run_test.sh (so thanks for the feedback!)23:53

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!