Thursday, 2021-08-19

opendevreviewMerged openstack/glance master: Suppress policy deprecation and default change warnings  https://review.opendev.org/c/openstack/glance/+/80504902:28
opendevreviewMerged openstack/glance_store master: Xena cycle Release Notes  https://review.opendev.org/c/openstack/glance_store/+/80495205:35
opendevreviewMerged openstack/glance master: Refactor gateway auth layer for image factory  https://review.opendev.org/c/openstack/glance/+/80506506:51
*** redrobot1 is now known as redrobot07:59
abhishekktill now, I have setup 18.04 VM with python 3.6.9 (similar to upstream) and enabled Opportunistic tests for Mysql, Ensured those are not skipped now09:37
abhishekkNow will keep them running for multiple times to see whether I am able to reproduce it locally or not09:37
abhishekkdansmith, croelandt ^^09:37
abhishekkNo failure on 20+ consecutive runs11:30
opendevreviewMerged openstack/glance master: Move setting of enforce_scope to devstack side  https://review.opendev.org/c/openstack/glance/+/77895213:12
dansmithabhishekk: okay, really interesting that the gate run saw just one of those tests run, which seems like it is still a good indicator.. can't believe it.13:24
dansmithI wonder if the first one improved things and the second improves more and that's why the one was way down in terms of fail rate13:25
dansmithwe should keep rechecking the second for a while I think13:25
abhishekkhmm, also, this https://review.opendev.org/c/openstack/glance/+/804898 has successful 8 run without timeout13:25
dansmithwell, you said 80% fail right?13:26
abhishekkbut today it has 100% ratio of passing13:26
dansmithoh I see, a bunch of rechecks13:27
dansmithI wonder if it's load-related, because those would be heavyweight tests13:27
abhishekkcould be13:28
dansmithyour rechecks today were all before much of the world was awake13:28
abhishekkyes13:28
abhishekkI think we should start approving patches13:29
dansmithI wonder if it would be responsible to make it -nv just in gate13:31
abhishekkI am also thinking about that13:32
dansmithvoting in check will make it a pain for us, but once something gets in the gate queue, it won't reset for everyone else13:32
abhishekkI think this is good idea13:32
dansmithI dunno what the feeling is on that, because generally we're trying not to land things that might pass check one day, fail because of a change before gate and then land to just immediately fail check, but this is maybe a little different13:33
dansmithI kinda feel like we should ask one of the qa people before we do that, but if we have some things ready to go, let's approve and see how it is until they're around13:34
abhishekkYes, we witness these timeouts every cycle during last milestone only13:34
dansmithyou approved my image factory patch right? did it land?13:34
abhishekkyes13:34
abhishekkit did13:34
dansmithokay, so it made it through13:34
abhishekkalso then enforce scope patch of gmanns as well13:34
dansmithokay13:35
abhishekkupload and download patches were already approved13:35
dansmithlet's kick them before we change anything and see how it goes13:35
abhishekkack13:35
dansmithmaybe this is *all* load related or something and the last week was bad13:35
abhishekkHopefully13:36
dansmithI think download will need to be rebased on upload or it will conflict out13:38
abhishekkyes13:38
abhishekkdelete from store does not have any dependency13:39
abhishekkor task api repo related change as well13:39
dansmithokay I haven't reviewed that one yet13:39
abhishekkhttps://review.opendev.org/c/openstack/glance/+/802243/913:40
abhishekkthis one13:40
dansmithyeah, looking at that now,13:41
dansmithI meant hadn't reviewed the delete-from-store one13:41
abhishekkyep13:41
dansmithabhishekk: your todo in that one could be done now right? the image_factory(auth=auth) ?13:42
abhishekk:D13:42
abhishekkgood point13:42
abhishekkplease comment13:42
dansmithdone13:43
abhishekkack, will fix after the meeting now13:44
dansmiththe patch above is ready too, I guess I should just +W both and you can fix the image_factory thing in the actual task patch, which is where it gets used anyway13:45
dansmithokay?13:45
abhishekkack13:46
abhishekkGood13:46
abhishekkSo now from our excel sheet only thing pending is cache_manage_policy13:47
abhishekkeverything else is covered13:47
dansmithnice13:48
abhishekkgate job cleared for py36 on upload policy patch13:53
dansmithwell, that's good for us, but bad for understanding what the real deal is :/13:54
dansmithnot much point in rechecking the two revert patches if others aren't failing13:54
abhishekkyes13:54
abhishekksounds really related to load now13:55
abhishekkI have also reverted policy warning patch of gmann in locally and ran it 20+ times without failure13:55
abhishekkEven now upstream is skipping 7 tests but my local environment is skipping only 6 :D13:57
dansmithhmm13:57
abhishekkjokke_, rosmaita, dansmith, smcginnis, croelandt upstream meeting in 3 minutes at #openstack-meeting13:57
dansmithabhishekk: I'm thinking the landing of gmann's warning squelch patch *has* to be related14:25
dansmithand speaks to the load theory14:25
dansmithrelated to why it's down today from yesterday I mean14:25
abhishekkcould be14:25
dansmithnot sure if it was in line ahead of the revert that timed out yesterday or not14:26
abhishekkEarlier also when we were facing timeout issue we reduced some deprecation logs14:26
dansmithwell, given the behavior I think it has to be that there's still some deadlock opportunity, and we're just more likely to hit it under high load conditions or something14:27
dansmithlogging is a classic deadlock thing where you're doing IO in critical regions where you wouldn't otherwise be14:27
abhishekkagree14:29
abhishekkIs it worth trying in local by reducing concurrency or with only one worker ?14:31
gmannfailure rate is very low now right? https://zuul.openstack.org/builds?job_name=openstack-tox-functional-py36&project=openstack%2Fglance14:31
abhishekkgmann, right14:32
abhishekkI saw no timeout in last 12 hours14:33
abhishekkthis means we also need to add that warning related stuff in our current patch which is in gate and all other patches14:35
abhishekkdansmith, ^^14:35
abhishekkupload one is fine14:35
dansmithabhishekk: oh because we're instantiating more enforcers? yeah14:35
dansmithgmann: yeah failure rate is low, we're thinking maybe because of your logging patch, which lowered the incidence of it or something14:36
abhishekkI will look at my other metadef patches there only we have different test classes14:36
gmannyeah, may be14:37
abhishekkI have set WorkFlow to -1 to my other patches14:40
abhishekkdansmith, croelandt I think we should plan review strategy now14:45
dansmithwhat does that mean? sequencing?14:48
abhishekkyes14:50
abhishekklike image API is almost covered so we should give priority to all patches remaining to image API14:51
abhishekkthen metadef and others14:52
opendevreviewMerged openstack/glance master: Check upload_image policy in the API  https://review.opendev.org/c/openstack/glance/+/80446315:06
abhishekk\o/15:07
* abhishekk dinner break15:08
opendevreviewMerged openstack/glance master: Refactor gateway auth layer for task APIs  https://review.opendev.org/c/openstack/glance/+/80224315:09
opendevreviewMerged openstack/glance master: Deprecate task specific policies  https://review.opendev.org/c/openstack/glance/+/80224415:32
opendevreviewAbhishek Kekane proposed openstack/glance master: Check download_image policy in the API  https://review.opendev.org/c/openstack/glance/+/80454715:48
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for staging operation in API  https://review.opendev.org/c/openstack/glance/+/80455815:59
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for delete image for store in API  https://review.opendev.org/c/openstack/glance/+/80458516:09
dansmithabhishekk: on the add_image patch, you're saying that the DB also does its own checking on whether or not the user is admin before letting them create an image as another project?16:12
abhishekkyes16:12
dansmithokay so the functional tests are hitting that in the rbac job but just don't care about the message I guess16:13
dansmithwhy does that message even make sense from the db? "not visible" on a create?16:13
abhishekkbecause same method is called from get and update as  well16:14
dansmithokay, in _image_get() does that mean it's actually created and they just can't see it then?16:14
abhishekkcould be, I didn't checked db record16:15
dansmithI'm confused because _image_get() is called in _image_update() *if* the image_id is passed in, which shouldn't be I would hope for create16:16
abhishekkbut we will get this error message while crating the image that it is not visible but with auth layer I guess it will be giving error you are not permitted to create image16:16
dansmithI don't really see how this could get hit in db.image_create() I guess I will have to try to poke it myself16:17
dansmithbut either way,16:17
dansmithif you could hit it with rbac, that means our rule isn't right..right?16:18
abhishekkit will if RBAC is not enabled16:18
abhishekkyeah16:18
abhishekkenabaled16:18
dansmithrbac _not_ enabled?16:18
abhishekkrbac enabled16:18
dansmithokay then that means we're passing our add_image check but shouldn't16:18
abhishekkyeah, so our add image should contain role:admin or project_id:context.owner ?16:19
dansmithI dunno actually16:21
dansmither, maybe something like that16:21
dansmithlet me repro first16:21
abhishekkack16:22
dansmithsurely we have a functional test that tries to create an image for another owner as admin right? I'm not seeing one.16:30
abhishekk:D16:30
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for delete image for store in API  https://review.opendev.org/c/openstack/glance/+/80458516:30
abhishekkwe don't have functional test which is using another Project (except image-member tests I guess)16:31
dansmitheesh16:32
abhishekkhit first time out of the day 16:34
abhishekkhttps://review.opendev.org/c/openstack/glance/+/804558/16:34
abhishekkstill in the zuul16:35
croelandtlet'sget rid of that job :)16:35
abhishekk:D16:35
opendevreviewAbhishek Kekane proposed openstack/glance master: Check deactivate, reactivate policy in the API  https://review.opendev.org/c/openstack/glance/+/79826616:36
dansmithabhishekk: okay added this to the patch:16:37
dansmith    testtools.matchers._impl.MismatchError: "You are not permitted to create images owned by 'someoneelse'" not in '403 Forbidden\n\nForbidding request, image 38f1227f-7857-4a1d-a322-8618f3bcddbf not visible\n\n   '16:37
dansmithsucceeds in functional, fails as above in -rbac16:37
abhishekkack16:38
opendevreviewPranali Deore proposed openstack/glance master: Move metadef resource type association policy checks in the API  https://review.opendev.org/c/openstack/glance/+/79963716:47
opendevreviewPranali Deore proposed openstack/glance master: Move metadef property policy checks in the API  https://review.opendev.org/c/openstack/glance/+/79963516:47
opendevreviewPranali Deore proposed openstack/glance master: Move metadef tag policy checks in the API  https://review.opendev.org/c/openstack/glance/+/79963616:47
opendevreviewPranali Deore proposed openstack/glance master: Implement project personas for metadef namespaces  https://review.opendev.org/c/openstack/glance/+/79870016:47
abhishekk2nd time out of the day16:50
abhishekklooks like it is related to load only, suddenly we have multiple patches in zuul and timing out started16:53
abhishekkto avoid zuul traffic I will rebase my metadef related patches tomorrow17:08
opendevreviewLance Bragstad proposed openstack/glance master: trivial: Double quote check_string for consistency  https://review.opendev.org/c/openstack/glance/+/80525617:18
opendevreviewLance Bragstad proposed openstack/glance master: trivial: Double quote check_str for consistency  https://review.opendev.org/c/openstack/glance/+/80525617:18
opendevreviewAbhishek Kekane proposed openstack/glance master: Move Tasks policy checks in the API  https://review.opendev.org/c/openstack/glance/+/80224517:21
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for image import operation in API  https://review.opendev.org/c/openstack/glance/+/80459017:21
abhishekkaddress ToDo in task patch17:22
opendevreviewAbhishek Kekane proposed openstack/glance master: Add missing forbidden to not found case for GET namespace API  https://review.opendev.org/c/openstack/glance/+/80435817:25
opendevreviewDan Smith proposed openstack/glance master: Check add_image policy in the API  https://review.opendev.org/c/openstack/glance/+/80480017:35
dansmithabhishekk: your point clearly identified that create-as-another-user wasn't being checked properly in the rbac rule, and even that the way I had arranged things wouldn't allow for that once the rule was corrected17:36
dansmithso I think this ^ is much better now, and I added a test that repro'd it in the -rbac job before I started, and it passes in both now17:36
dansmithin summary, good job reviewing, I guess? :)17:37
abhishekk:D17:37
abhishekkI like the short version :D17:37
abhishekklooks perfect now17:41
dansmithwell, still scrutinize it properly17:41
abhishekkack17:43
opendevreviewBrian Rosmaita proposed openstack/glance master: DNM: Add fips check jobs  https://review.opendev.org/c/openstack/glance/+/79053617:55
abhishekkdansmith, I think corresponding protection test also needed now (glance-tempest-plugin),  not urgent but just for the note18:00
dansmithabhishekk: a test for create-as-other-owner in rbac tempest via the plugin you mean?18:01
abhishekkyes18:01
dansmithyeah, we probably need to be keeping a list of cases we note likely need more coverage in that scenario18:01
dansmithI was thinking of one the other day too18:01
dansmithbut can't remember what it is at the moment18:02
abhishekkstage data with another member?18:02
dansmithno, but probably lots of "with another member" tests now that you mention it18:03
abhishekkI will make a list of those tomorrow18:05
dansmithtimeout on my patch just now18:11
dansmith*eyeroll*18:11
abhishekkhmm, just noticed18:12
abhishekkwe also have 1st timeout on functional-py38 as well18:12
dansmithwhere?18:12
abhishekkhttps://review.opendev.org/c/openstack/glance/+/79870018:13
abhishekk{5} worker crashed after running 3 db tests18:15
abhishekkall three tests from, glance.tests.functional.db.migrations.test_mitaka0218:16
dansmiththat one is just going slow I think18:17
dansmithwhere do you see it crashed?18:17
abhishekkit reported timeout18:18
dansmiththe worker or the job?18:18
abhishekkjob18:19
dansmithoh sure, okay18:19
abhishekkit is out of zuul now18:19
dansmiththe worker seems hung18:19
abhishekkyeah, that's what I wanted to say18:19
dansmiththis is the reason I say that just killing the py36 job isn't a solution, because this is clearly a real problem, it's just manifesting (right now) in the py36 job with that mysql and those conditions18:20
abhishekkright18:20
dansmithabhishekk: did you follow some guide on setting up those tests? I did for nova aaages ago, but don't really remember much about what is required18:22
abhishekkI think I will enable opportunistic tests in py38 environment as well and try to run multiple functional-py38 tests at a time18:22
dansmithand, did you do all three or just one?18:22
abhishekkI did for mysql and sqlite18:22
abhishekki just ran tools/test-setup.sh 18:23
abhishekkafter some corrections18:24
abhishekkin it18:24
dansmithok18:24
abhishekkor you can simply create table in mysql db as stated in test-setup.sh manually as well18:25
abhishekknot table, but openstack-citest db in mysql18:28
dansmithyup18:28
abhishekkit runs postgre tests in gate as well, skips sqlite tests (glance.tests.functional.test_sqlite.TestSqlite.test_big_int_mapping ... SKIPPED: test requires exe: sqlite3)18:35
dansmithyeah, trying to get pg setup now.. it's always a pain18:35
abhishekk++18:36
abhishekkwill do it as well18:36
abhishekkshould I do it on 18.04 if you are doing it on 20.04 ?18:36
dansmithI'm doing it on fedora right now which is :(((18:37
abhishekkahh, then I will do on both18:38
dansmithskipped 10, I don't think it did anythong18:39
abhishekkgenerally it skipps 23 in local18:40
abhishekkif you enable mysql then it will comes down to 7 or 618:41
dansmithokay it did run mysql and sqlite18:42
dansmithunable to connect to pg because OF COURSE18:42
abhishekkright18:43
dansmithokay got all three working... on 20.0418:59
dansmithso I'll run that in a tight loop and see19:00
dansmithif nothing happens, then I'll try generating some load on that machine to slow it down19:00
dansmithrunning mysql+sqlite in a tight loop on the fedora machine in parallel19:00
abhishekkcool, I also got all 3 working on 18.0419:04
* abhishekk signing out for the day19:36
abhishekkI have tried running functional-py36 on 18.04 and functional-py38 on 20.04, 5 times with just one worker - Not able to reproduce19:42
abhishekkwill continue tomorrow19:42
dansmithI think one worker is less likely to hit the kind of load restriction I'm thinking of19:49
dansmithone worker means everything is serialized, which is less likely to race19:49
dansmithbut yeah, I'm running mine in a tight loop.. dozens of runs so far and no hang19:49
dansmithwill let it go the rest of the day and we'll check in tomorrow19:49
abhishekkack19:52
opendevreviewAbhishek Kekane proposed openstack/glance master: Check policies for image import operation in API  https://review.opendev.org/c/openstack/glance/+/80459019:53
abhishekkcan we send download patch through the gate or should wait ?19:55
dansmithI haven't been paying attention to how often we're failing now19:55
dansmithbut if you think there's a good chance it'll land, then yeah19:55
abhishekkI think it will19:57
dansmithaight, sent19:58
abhishekkcool19:59
abhishekkI think add_image policy is upto mark now, will give one manual test in local environment tomorrow to 100% confirm20:00
abhishekkdownload, both jobs cleared in gate20:22
abhishekknow counting on tempest run :D20:22
dansmithnice20:34
lbragstadso - these are the remaining policy refactor patches, yeah?20:35
lbragstadhttps://review.opendev.org/q/topic:%2522policy-refactor%2522+(status:open+OR+status:merged)20:35
lbragstadincluding the image import patch - which isn't included in that list since it's under a different topic?20:36
dansmithI'm going based on the dashboard that abhishekk is cultivating on the spreadsheet20:36
dansmithlink at the top20:36
dansmithhttps://tinyurl.com/glance-xena-320:36
lbragstadoh - nice!20:36
lbragstadi was clearly missing some patches then 20:37
lbragstadlooks like there is more here than what i had20:37
abhishekknow, image import is in above dashboard as well20:37
abhishekkdansmith, I have added some scenarios in policy watch list sheet for tempest plugin20:39
abhishekklbragstad, ^^20:40
dansmithabhishekk: what you should have done was _land_ that plane20:40
dansmithI mean.. you should have gone to bed like you promised :)20:40
abhishekkyeah, going now20:40
abhishekkgood day20:40
* dansmith watched top gun this past weekend, so all my references are from that20:40
dansmitho/ :)20:40
abhishekko/~20:41
abhishekktop gun second part?20:41
dansmithno, original20:41
abhishekkcool20:41
abhishekknice movie20:41
dansmithindeed :)20:41
lbragstad... wait, there's a second part to top gun?20:41
dansmithlbragstad: new one coming out this year or something20:42
abhishekkIts not released yet20:42
dansmithI reserve the right to hate it, but I hope it's good20:42
abhishekk+120:42
lbragstadi bet it's going to be at least 40% beach volleyball scenes 20:43
dansmithwe can only hope... :P20:43
lbragstadand super sweet high fives20:43
dansmithhaha20:43
dansmithI'm tom cruise at 60 and I feel the need, the need for speed...LAX20:43
lbragstadlol20:43
dansmithrelease date is Nov 1920:44
opendevreviewBrian Rosmaita proposed openstack/glance master: DNM: Add fips check jobs  https://review.opendev.org/c/openstack/glance/+/79053621:12
lbragstaddansmith https://review.opendev.org/c/openstack/glance/+/804800/3/glance/policies/base.py#77 is currently done somewhere in the lower layers?21:23
opendevreviewMerged openstack/glance master: Check download_image policy in the API  https://review.opendev.org/c/openstack/glance/+/80454721:23
lbragstadspecifically, the project_id:%(owner)s bit?21:24
dansmithdid you mean L72?21:24
lbragstadyeah - i'm trying to understand why that's getting pulled up to the check string, and i think it's because something else in glance has maintained that behavior but i don't want to make that assumption 21:24
dansmithmultiple things actually!21:24
* lbragstad grabs popcorn21:25
dansmithand once we found and removed the first thing, turns out a second thing was doing it too, just in case! for security!21:25
lbragstaddb api?21:25
dansmithbut yeah, that's a hard-coded-in-python check right now21:25
lbragstadok 21:25
dansmithdb api was the second place21:25
dansmitheither auth or policy layer was the first, I forget which21:25
dansmithlbragstad: are you asking because you think it's a bad idea there, or because you didn't notice it before?21:26
lbragstadi don't think it's a bad idea, i just want to understand why the check string is changing21:26
lbragstadi mean, everything we're doing is trying to sweep all the policy bits into a single place, right?21:27
dansmithyou know, now that you make me look at that.. admin is project admin in the new world, and this says "let the project admin create images for other projects"21:27
dansmithwhich is probably not what we want right?21:27
dansmithI mean, it was already project-admin before I made this change, but I'm thinking that doesn't make sense21:27
lbragstadyeah - that behavior will mean different things depending on if enforce_secure_rbac=True21:27
dansmithwell, right now, if secure_rbac=False this isn't even used21:27
dansmith...right? because: https://review.opendev.org/c/openstack/glance/+/804800/3/glance/policies/image.py21:28
lbragstadoh - you mean "this" as in "project_id:%(owner)s"21:30
lbragstadand we're not using that today because it's not in the check string21:30
dansmithno I mean the whole rule.. with secure_rbac=false, we're using the deprecated_rule= right?21:31
dansmithbecause of the enforce_new_defaults tie?21:32
lbragstadhttps://github.com/openstack/glance/blob/master/glance/cmd/api.py#L111-L11721:32
lbragstadyeah 21:32
lbragstadwell - we will be using it since it will be the new default, but it will be logically or'd with the old deprecated policy 21:33
dansmithI didn't know that it was logically or'd, I thought it was ignored21:35
lbragstadbut - we won't be using it exclusively unless an operator flips those two switches intentionally 21:35
dansmithbut okay21:35
dansmithprobably the same difference I guess21:35
lbragstadanywho - i was trying to track down where in the code glance was doing that hard-coded ownership check21:35
dansmithhttps://github.com/openstack/glance/blob/dd3155516cec2cabf8f74963a44ab642d507384b/glance/api/authorization.py#L201-L20521:37
lbragstadok - awesome21:37
dansmithgoing back to my other point,21:37
dansmiththis basically says "if you're an admin for project pepsi, you can create coke images"21:38
dansmithwhich is not really what we want right?21:38
lbragstadcorrect - but that's orthogonal to the specific rule you're adding your change21:38
dansmithwell, because we're not yet to "system scope" or "system persona" or something right?21:39
lbragstadyes21:39
dansmithtbh I have a hard time keeping straight what each thing really means in terms of coverage21:39
lbragstadthat just comes from the nature of overloading admin for everything https://review.opendev.org/c/openstack/glance/+/804800/3/glance/policies/base.py#7321:39
dansmithpersonas, scope, system scope, etc21:39
lbragstadyeah - i can empathize with that21:39
lbragstadso - your concern is that pepsi admin can create images for coke21:40
dansmithI mean, that's not the correct behavior when admin means "project admin" right?21:40
lbragstadyes - exactly 21:41
dansmithotherwise, why not let anyone create images for other people :)21:41
lbragstadwe will need to update that policy when glance consumes system scoped tokens21:41
lbragstador at least update it to be (role:admin and project_id:%(project_id)s and project_id:%(owner)s)21:41
dansmithum, update what, just the role:admin part to the above?21:43
dansmithso that you can create images for projects you're an admin of? in that case, why is that different from just being a member of that project21:44
dansmith?21:44
lbragstadoh - right, it's not21:44
lbragstadit would need to be role:admin and system_scope:all21:44
lbragstadsorry21:44
lbragstadok - found the second check https://github.com/openstack/glance/blob/dd3155516cec2cabf8f74963a44ab642d507384b/glance/db/sqlalchemy/api.py#L301-L30321:49
dansmithactually no I don't think that comes into play on create,21:51
dansmithor at least it didn't in testing21:51
dansmithit was actually here:"21:51
dansmithhttps://github.com/openstack/glance/blob/dd3155516cec2cabf8f74963a44ab642d507384b/glance/db/sqlalchemy/api.py#L97121:51
dansmithsomehow we'd fail to get the image we were creating, but hadn't created21:51
dansmithI didn't dig too deep, because we shouldn't have gotten to the DB layer anyway, noting that policy should have stopped us first21:52
lbragstadoh - the visibility chekc 21:52
lbragstadgot it21:52
lbragstadok - and that makes it up to https://review.opendev.org/c/openstack/glance/+/804800/3/glance/api/v2/policy.py@21521:54
lbragstadnice21:54
dansmithyeah that's the legacy enforce-this-in-code thing, basically to behave like the auth layer does if we're not running a rule that can check it for us21:57
dansmith(or it's logically OR-d with a no-op :)21:57
lbragstadright - so *everything* is technically in the API layer, regardless if they're using the new policy enforcement or even policy at all21:58
lbragstadwhich is what i got from https://review.opendev.org/c/openstack/glance/+/804800/3/glance/tests/functional/v2/test_images_api_policy.py21:58

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!