Wednesday, 2017-04-19

*** chsc has joined #swift316:39
*** chsc has quit IRC16:39
*** chsc has joined #swift316:39
*** openstackgerrit has joined #swift321:01
openstackgerritTim Burke proposed openstack/swift3 master: Enable H203 to prevent assertIs(None, ...) regressions  https://review.openstack.org/45578921:01
kota_hello23:07
kota_sorry for late a littl23:07
kota_e23:07
kota_timburke: ping23:09
timburkehi kota_!23:09
timburkethanks for the ping :-)23:09
kota_:-)23:09
kota_let's get started23:09
kota_sorry, I didn't edit the wiki page and not so much for today23:10
kota_but I'd like to hear any progress and want to catch up something to review23:10
kota_I think I had some revies for the recent 2 weeks and almost of them landed... IIRC23:11
kota_lemme check my dash board...23:11
timburkesure! i recently packaged a swiftstack release that pulled in some in-review patches; in my validation of that, i noticed a few of my own bugs in https://review.openstack.org/#/c/368264/ and https://review.openstack.org/#/c/448764/23:12
kota_oh, ok.23:13
kota_both look nice to have (regarding to commit message) and look not so big23:14
kota_will review soon as possible23:14
timburkeand both had lurking bugs, so a more-thorough review will be nice :-)23:14
timburkethanks!23:14
kota_timburke: if you think some patches with high priority (e.g. your package including them) please feel free to add me to the reviewers list23:15
timburkei also had an idea about how we could reduce our keystone requests by adding a STS-like endpoint (http://docs.aws.amazon.com/STS/latest/APIReference/API_GetSessionToken.html) which would do the normal authorization against keystone, then issue a token and secret that we could stuff in memcache to do subsequent authorizations23:15
kota_i usually check my dashboard to find un-reviewed patch and adding me to the reviewer list will be helpful to notice.23:16
timburkei, er, ah... that's a lot of them :-) including somewhat embarrassingly (since it has no tests) https://review.openstack.org/#/c/411026/23:17
kota_sometimes i miss the notification for the new patch23:17
timburkesure, i'll go ahead and add you23:17
kota_sorry the intruption, so get back to...23:17
kota_STS-like endpoint?23:17
kota_sounds like boto3 supports?23:18
timburke...i think? i remember having it come up in a call with a prospective customer, that they were using that so applications could be issued temporary credentials from a central authority that knew longer-lived secrets23:20
kota_timburke: i think that is useful because it helps the code not to require the secrets inside.23:21
kota_just call for getting the secret credential and if the code has correct permission, it should work23:22
kota_i think STS is sort of that, not sure. need to learn m@ore23:22
kota_oh, no. my daughter touches my laptop!!!23:23
timburkehehe :-)23:23
timburkeso i did something similar for our own auth system that integrates with ldap -- we can issue auth tokens and such by doing ldap queries that include the password, but we don't want to keep it in memory so subsequent requests won't still know it. so i let ldap users sign *using their currently-issued auth token*!23:24
kota_hmm23:26
timburkeother than that, i've seen some renewed interest in https://bugs.launchpad.net/swift3/+bug/1636663 and https://bugs.launchpad.net/swift3/+bug/1522578 from customers...23:28
openstackLaunchpad bug 1636663 in Swift3 "A complete multipart upload request verification failed due to object-server unable to update container DB" [Undecided,New]23:28
openstackLaunchpad bug 1522578 in Swift3 "Etag generation in swift3 does not match AWS S3" [Undecided,Confirmed]23:28
timburkei think that covers most of what i've been up to lately with swift3 :-)23:28
kota_I think the latter one is known issue I tracked23:29
kota_and the first one looks interesting23:29
kota_ah, ic. request timeouts causes the error23:30
timburkeyeah, the container servers get overloaded, i think, so some of the parts don't appear in the container listing yet23:31
timburkei think we can stop doing the listing now, though! we used to need it to get the content-length, but with recent-enough slo you can omit it23:31
timburkeand we'll still have the etag from the client to pass through to verify the integrity of the slo23:32
kota_gotcha, at least ocata release we have in the requirements, no length and etag needed to make a slo manifest.23:33
timburkei think we might just need to do one extra HEAD that we expect to 404 (for the object with the next upload ID)23:33
kota_and even container not updated, the slo middleware will check the existence to the *object*-servers directly23:33
timburkeyup :-)23:34
kota_sounds reasonable23:34
timburkeall done except for the typing :D23:35
kota_ok. thanks23:35
kota_ah, one thing. recently I've started to think to cut a release23:36
timburkegood idea! if only for the security fix23:36
kota_we have a bunch of changes since the last release.23:36
kota_i think they we discussed today are not so rushed23:38
kota_but I'll try to get them into the release23:38
*** chsc has quit IRC23:38
kota_and prepare the change log in parallel23:39
timburkesounds good23:39
kota_that will happen in the next weel or by the end of Apr23:39
timburkei'll keep an eye out for the patch23:39
kota_thx23:39
kota_that's all for today23:39
timburkethanks kota_!23:40
kota_thanks timburke!23:40

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!