Wednesday, 2026-02-18

opendevreviewMax proposed openstack/glance master: feat: return size in get_image_data_iter  https://review.opendev.org/c/openstack/glance/+/97662713:16
*** jbernard_ is now known as jbernard13:19
croelandtI'm thinking of releasing glance_store 5.4.0 at 032d273acc57f9010123f184cb112979f37391a515:41
croelandtIf you want anything else in the release, stop me now :)15:42
croelandtabhishekk: ^15:42
croelandtrosmaita: thanks for reviewing my S3 patch btw!15:42
abhishekkcroelandt: nothing from my end15:43
rosmaitacroelandt: i looked at that dave hill patch , but wasn't quite sure what i thought about it15:43
croelandtrosmaita: it does not seem too critical to me: you need to "under configure" Cinder to hit it15:46
croelandtTakashi has issues with the patch, and I'd like Rajat to take a look at it15:46
croelandtso I guess we'll release it as part of H-M2 maybe?15:46
croelandtwe (I?) have been pushing a ton of patches in the past few days already :D15:47
opendevreviewMax proposed openstack/glance master: feat: return size in get_image_data_iter  https://review.opendev.org/c/openstack/glance/+/97662715:56
croelandthttps://review.opendev.org/c/openstack/releases/+/977245 and here we go!16:58
dansmithcroelandt: do you still need me to review a thing?18:31
dansmithcroelandt: also, how do you feel about the image encryption stuff effectively turning glance back into the pre-defender state? if images are unencrypted we can know that they have been safety checked, but if they're encrypted, we... no longer can.18:32
dansmithif nova blocks booting or using of those images, then at least the damage is "not my problem" for the time being, but it really kinda sucks to backslide on that, IMHO :/18:32
croelandtI don't need any reviews anymore18:35
croelandtdansmith: see, that's what annoys me about the whole feature, we keep uncovering new issues like this18:35
croelandtI would expect that if an admin encrypts their images, they take full responsability for them18:36
dansmithcroelandt: this is the same issue I've been harping on since the beginning (of when I started reviewing) but I agree18:36
croelandtso if they are malware, well, that's the admin's problem18:36
dansmithcroelandt: this is about user images not admin issues18:36
dansmiths/issues/images/18:36
croelandtyeah but I think admins have to trust certain users with uploading images and booting from them?18:37
dansmiththere's no way for them to do that though18:37
dansmithwhere in this proposal does it say that admins can restrict this (effective) hiding of the content from glance only to trusted users?18:37
croelandtyeah users can either uplaod or not upload depending on the policy18:37
croelandtso you either trust all users or none of them18:38
dansmithwhere does an admin disable this functionality though? policy protections on one of the required properties?18:38
croelandtcan't an admin do that through RBAC? 18:40
dansmithdo what?18:40
croelandtsay "users cannot upload images, only admins can"18:41
dansmithusers have to be able to upload images for basic functionality of the cloud to work,18:41
dansmithbut the question here is not "can users upload images" it's "can users upload _encrypted_ images which bypass all the safety checks"18:41
dansmithproperty protections are the only way I can imagine that being doable, and it's insecure by default18:42
croelandtoh yeah if users cannot uplaod images, you lose a ton of functionality :D18:42
croelandtyou end up saying "hey, you got these 3 images, have fun"18:42
croelandtso ok, would you want to improve fine-grained control over who can upload unencrypted images?18:43
dansmithI mean, that's one thing we could do, and restrict it by default so the admin knows what they're losing by enabling it18:43
dansmithI guess the other I'd like is to explore the "can we safety check these images" thing more, but the current proposal is sort "not my problem"-ing that18:44
dansmithwhich sounds like others are okay with but... it sucks18:44
dansmithI assume you saw we just published another image safety CVE yesterday...18:45
croelandtI don't think I've seen this19:02
croelandtA different one from the "3 bugs CVE" we've been discussing?19:03
croelandtSo would you like to check the content of the encrypted images when they're uploaded?19:09
dansmithnova bug19:14
dansmithideally we would inspect them in exactly the same way we do today, of course19:15
dansmithI understand that it's non-trivial, but it'd surely be nice to make that the goal and not just a punt19:15
croelandtoh I missed the nova bug, do you have a link?19:20
dansmithit's the same old thing: https://bugs.launchpad.net/nova/+bug/213750719:21
croelandtoh ok not a new one19:22
dansmithit's new, but the same pattern19:23
dansmiththe reason that wasn't worse than it was is _because_ glance would refuse to upload a snapshot19:23
dansmithsorry, accept a snapshot upload I mean19:24
dansmithyou see in the discussion how we prevented a worse problem because glance refuses to accept the modified image19:24
dansmithif glance protection wasn't enabled (or possible due to encryption) then I could have exfiltrated host data there19:25

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!