Wednesday, 2016-11-30

*** zhurong has joined #openstack-meeting-cp01:14
*** tovin07_ has quit IRC01:16
*** tovin07 has joined #openstack-meeting-cp02:16
*** tovin07_ has joined #openstack-meeting-cp02:18
*** topol has quit IRC02:46
*** zhurong_ has joined #openstack-meeting-cp02:53
*** zhurong has quit IRC02:55
*** topol has joined #openstack-meeting-cp03:14
*** beekhof has quit IRC03:47
*** prateek has joined #openstack-meeting-cp04:31
*** prateek has quit IRC04:53
*** prateek has joined #openstack-meeting-cp04:54
*** jgriffith is now known as jgriffith_away04:54
*** gouthamr has joined #openstack-meeting-cp06:06
*** zhurong_ has quit IRC08:04
*** zhurong has joined #openstack-meeting-cp08:04
*** notmyname has quit IRC09:38
*** notmyname has joined #openstack-meeting-cp09:40
*** tovin07_ has quit IRC10:02
*** zhurong has quit IRC10:02
*** brault has joined #openstack-meeting-cp10:17
*** lyarwood_ has joined #openstack-meeting-cp10:18
*** lyarwood has quit IRC10:19
*** anteaya has quit IRC10:19
*** notmyname has quit IRC10:19
*** brault_ has quit IRC10:19
*** olaph has quit IRC10:19
*** homerp has quit IRC10:19
*** bswartz has quit IRC10:19
*** dhellmann has quit IRC10:19
*** dhellmann has joined #openstack-meeting-cp10:23
*** homerp has joined #openstack-meeting-cp10:25
*** vkmc has quit IRC10:25
*** Daviey has quit IRC10:25
*** notmyname has joined #openstack-meeting-cp10:25
*** vkmc has joined #openstack-meeting-cp10:27
*** anteaya has joined #openstack-meeting-cp10:31
*** Daviey has joined #openstack-meeting-cp10:36
*** olaph has joined #openstack-meeting-cp10:36
*** lyarwood_ is now known as lyarwood11:20
*** sdague has joined #openstack-meeting-cp11:27
*** lyarwood is now known as lyarwood_12:08
*** prateek has quit IRC12:28
*** lyarwood_ is now known as lyarwood13:03
*** lyarwood is now known as lyarwood_13:08
*** gouthamr has quit IRC13:17
*** xyang1 has joined #openstack-meeting-cp13:30
*** lamt has joined #openstack-meeting-cp13:41
*** tongli has joined #openstack-meeting-cp14:07
*** bswartz has joined #openstack-meeting-cp14:20
*** JASON___ has joined #openstack-meeting-cp14:54
*** MarkBaker has joined #openstack-meeting-cp14:57
*** prateek has joined #openstack-meeting-cp14:59
*** Rockyg has joined #openstack-meeting-cp14:59
*** gema has joined #openstack-meeting-cp15:00
topol#startmeeting interop_challenge15:00
openstackMeeting started Wed Nov 30 15:00:41 2016 UTC and is due to finish in 60 minutes.  The chair is topol. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
*** openstack changes topic to " (Meeting topic: interop_challenge)"15:00
openstackThe meeting name has been set to 'interop_challenge'15:00
markvoelkero/15:00
gemao/15:00
Rockygo/15:00
topolHi everyone, who is here for the interop challenge meeting today?15:00
topolThe agenda for today can be found at:15:00
topol#link https://etherpad.openstack.org/p/interop-challenge-meeting-2016-11-3015:00
topolWe can use this same etherpad to take notes15:01
*** skazi_ has joined #openstack-meeting-cp15:01
MarkBakero/15:01
skazi_o/15:01
JASON___Hi, jason from huawei15:01
tonglio/15:01
dmelladoo/ hi guys15:01
topol#topic review action items from previous meeting15:02
topol#link http://eavesdrop.openstack.org/meetings/interop_challenge/2016/interop_challenge.2016-11-16-15.00.html15:02
*** openstack changes topic to "review action items from previous meeting (Meeting topic: interop_challenge)"15:02
topolall, please use #link https://etherpad.openstack.org/p/interop-challenge-postmortem for lessons learned doc15:02
topol    all, please add all you can to it15:02
topol    all, sections include tooling, networking, provisioning, metadata, etc.15:02
*** rarcea_ has joined #openstack-meeting-cp15:02
topolI went an looked at the document  I don't believe many of the sections we were thinking about have been added15:03
topolso if you have content to contribute for this doc please do15:03
topolso let's keep this action running15:04
tonglishould that be part of the new repository and get reviewed , then merge?15:04
tongliI mean even the document.15:04
topol#action all, please use #link https://etherpad.openstack.org/p/interop-challenge-postmortem for lessons learned doc and add content15:04
topoltongli yes, we will add it to the repo when repo is ready15:05
topol#action tongli to migrate doc to repo when ready15:05
luzCo/15:05
dmelladohiya luzC ;)15:05
topoltongli when you have successfully moved it mark it at the top as been moved15:06
topolwe'll freeze it then15:06
*** garloff has joined #openstack-meeting-cp15:06
topolnext item:15:06
tongli@topol, got it.15:06
topoltopol to add an elevator pitch to #link15:06
topolthis was done15:06
topolnext item15:07
topolall add to etherpad suggestions for work items. After one week. topol will create a doode poll and send out to defcore list15:07
tonglithe repository is there.15:08
topolSo I check and did not seen anything added besides cloud foundry and NFV. Did I miss any if these? Did I look in the wrong place.  I held off on the doodle poll15:08
tongliwe just need to have an agreement on the structure, then we can start doing it.15:08
*** MarkBaker has quit IRC15:08
topoltongli, excellent. But lets cover that at the end of the agenda15:08
topolBut back to the suggested work items.   Did I miss any?15:09
markvoelkerLooks like we said we were going to add them to https://etherpad.openstack.org/p/interop-challenge-meeting-2016-11-1615:09
markvoelkerAnd you got those15:09
topolmarkvoelker. yeah thats what I thought but I needed a sanity check :-)15:10
topolif we only have 2 do we need a doodle poll?15:10
markvoelkerOne thing I see in the minutes from last time that doesn't look like it's in the list yet:15:10
tonglithere are three15:10
*** prateek has quit IRC15:10
markvoelker"it would be good to review the user survey for what people are interested in, and what they're running on top of OS today"15:10
tongliNFV, Kubernetes, CF15:10
markvoelkerNot sure we've actually done that?15:10
luzCtopol quick question... are we still joining app catalog?15:10
topolluzC good question15:11
Rockyg++ markvoelker15:11
topolmarkvoelker I think you are correct that that stepwas not done15:11
topolAnyone have time to do that?15:12
markvoelkerI can probably do that...shouldn't take more than 30 minutes or so15:12
topolmarkvoelker ok great.  So how bout you do that and see if anything should be added to our list of 3 items and then we send out the doodle poll?15:13
markvoelkerSure15:13
topolgreat.  Thanks!15:13
topol#action markvoelker to review user survey to look for more possible work items to add to doodle poll15:14
topolluzC on your question let's hold that until we talk about our new repo15:14
luzCtopol ok, I was asking because I noticed app-catalog only has heat, tosca and murano templates, and glance images, not ansible/terraform15:14
luzCtopol thats ok, let's talk about it after repo is in place15:15
topolOk let's jump to a todays agenda item15:15
dmelladoyeah15:15
topolluzC +++15:15
topol#topic New Meeting time and IRC channel15:16
*** openstack changes topic to "New Meeting time and IRC channel (Meeting topic: interop_challenge)"15:16
topolSo i was informed that where we hold this meeting #openstack-meeting-cp cannot be a long term home for us :-(15:16
dmellado:\15:16
topolSo we have to move to one of the other channels.  I did not see a channel avail at this timelsot.  And frankly determing what channels are availabel at what timelsots is not my strong skill15:17
gematopol: create one15:17
gema#openstack-forall15:17
gemax)15:17
topolgema can we???15:18
gemaof course15:18
gemaand we can put the bot on it15:18
gemaand be done with it15:18
topolMy irc skills are weak15:18
gemachoose a name and join the channel15:18
gemathat just creates it15:18
gemathen we have to put a couple of patches in infra to make the bot enter15:18
gemaand we can hold the meetings there15:18
topolI would love our own channel  at this timeslot.  I vageuly recall some issues with doing that like losing the meeting bot???15:18
gemathen let's choose a name15:18
gemaand we can join the channel and get the bot in for next week15:19
topolgema I really like that plan15:19
dmellado+115:19
tongli@gema, if that is the case, can we keep the same time but a new channel?15:19
dmellado#openstack-interop15:19
dmellado?15:19
topolCan you create the channel and configure the bot thingy :-)15:19
gematongli: sure, it'd be our channel15:19
gematongli: I can carve some time for that, no problem15:20
dmelladogema: a gerritbot would also be awesome xD15:20
gematongli: but tell me the name15:20
gemadmellado: do you know how to do that?15:20
gemaxD15:20
gemadmellado: we'll figure it out15:20
tongli@gema, sounds like a plan and an action item for @gema.15:20
topol#openstack-interop sounds like  a great name to me15:20
dmelladoheh, well, I did at some point15:20
dmelladoao I can lend a hand15:20
dmelladoxD15:20
gematopol: isn't that the new defcore channel?15:20
dmelladoso15:20
gemathat's taken15:20
Rockygopenstack-interop is already there.  defcore is transitioning to it15:20
luzCgema I think so15:20
dmelladooh, true!15:20
gematopol: or the other thing we could do is ask defcore if they let us hold the meetings on their channel15:20
topolcan we reuse or should we be slightly different15:21
gemaand use that one15:21
gematopol: up to us, reusing sounds good, we can ask later today if using that channel is ok15:21
topolk, so lets have a backup name just in case15:21
gemamarkvoelker: what do you think?15:21
tongliif openstack-interop is already there, should we just take the time slot? seems a bit easier?15:21
topoltongli I agree if we can get that aproved15:21
gematopol: it is up to the entire group, not just up to me15:21
tongliour repo is named interop-workloads.15:21
gemaso we need to ask15:21
tongliwe can use that as the channel?15:22
gematongli: we could15:22
tonglitoo long maybe15:22
tonglior just openstack-workload15:22
tongliopenstack-workloads15:22
dmellado+1 on openstack-workloads15:22
markvoelkerI think it's probably fine to use the #openstack-interop channel from a DefCore perspective, but note that infra has frowned on holding meetings in non-meeting channels in the past15:22
luzC+1 openstack-workloads15:22
topolgema I was thinking we reuse openstack-interop and if not openstack-interop-workloads15:22
topolI kinda liked the interop in the name15:23
gematopol: ok15:23
Rockygmeeting is right after this one if you wantto get a quick answer15:23
gematopol: so I will ask the interop folks in the meeting later today if they are ok with it15:23
gemaand then I will also check with infra15:23
gemato make sure we are legal15:23
topolgema, that would be great15:23
gematopol: we are already using the mailing from defcore15:23
tongli@topol, I do like that in the name as well. so channel openstack-interop as the first option, if no good, we go with openstack-workloads15:23
tongli?15:23
topoldo we go with openstack-workloads or openstack-interop-workloads15:24
topolas the backup15:24
gematopol: do we have a grace period, i.e. whilst we figure it out, can we stay here?15:24
topolgema, YES we have a grace period15:25
gematopol: ok15:25
topolOur landlord is a benevolent one. We wont be evicted immediately :-)15:25
gema:)15:25
topoldoes anyone hate the backup name ofopenstack-interop-workloads?15:26
topolif everyone hates that for being too long openstack-workloads is fine15:26
topolgema If no opinions from anyone you get to choose since you are doing the hard work of setting it up15:27
tongli@topol, I have no problems with the name, but it is very long.15:27
gematopol: the hardest part is talking to people, the rest is easy15:27
Rockyginfra folks areawful nice15:28
*** MarkBaker has joined #openstack-meeting-cp15:28
tongli@gema, @topol, go with openstack-workloads, that is what our repo name is.15:28
gematongli: ok15:28
topoltongli makes sense15:28
topoland tongli now gets the work item... JUS KIDDING15:29
gemaso the plan is asking openstack-interop if we can use the channel and check with infra if it is ok to hold meetings in a non-meeting channel15:29
gemaif any of those two is a no, go for our own channel15:29
topolgema +++15:29
luzC+115:30
topol#action gema ask openstack-interop if we can use the channel and check with infra if it is ok to hold meetings in a non-meeting channel, otherwise go for own channel openstack-workloads15:30
persiaOne advantage to having meetings in meeting channels is that there is a large passive audience, which can be beneficial when one encounters cross-project activities.  -meeting is especially popular, making it one of the preferred venues.15:30
gemapersia: the problem is timeslots15:30
persiayes :(15:30
Rockygalso, ttx recently reviewed open slots on meeting channels.  He could give us the open options15:30
gemaRockyg: wanna try to get us this slot on one of the meeting channels?15:30
gemamaybe that should be option 115:31
persiahttp://git.openstack.org/cgit/openstack-infra/irc-meetings/tree/meetings also has all the meetings, if you want to do your own review15:31
topolgema, I belive hogepoge and I did that. I dont think option 1 was possible15:31
Rockygthis slot and 1400utc seems *really* popular15:31
topolRockyg +++15:31
gemaok15:31
persia#openstack-meeting appears empty currently15:31
topolpersia check the tree just in case. some meetings are every other week15:32
topolthat's what makes it messy15:32
tongliI would like to have meeting in openstack-meeting channel if that is also possible.15:32
gemaagreed15:32
topolwho is good at determining options?15:33
RockygNo one's on it.... lemme check calendar15:33
topolrisk is we move to a time that is horrible for folks at some location in the world15:33
tongli@persia,@gema, if a channel is crowded, we can easily get kicked out if we run a bit long.15:33
topolneed to be careful if we move to a new timeslot15:33
gematongli: of course, if we go for a meeting channel we have to be on time15:33
Rockygyup. openstack-meeting is available now.  It would go an hour later a daylight savings time15:34
tongli@topol, @gema, yeah, that is probably a good thing so that we do not run over.15:34
topolRockyg is it avail every week at this time?15:34
Rockyglemme double check that15:34
topolI think someone just has to submit a patch to grab the timeslot15:34
*** gouthamr has joined #openstack-meeting-cp15:35
persiatopol: Yes.15:35
Rockygnope.  neutron dvr has it on the other week.15:35
topolRockyg :-(15:35
RockygBut, lemme ask ttx....15:36
gemaok, so Rockyg checks the meeting channels see if there is a slot15:36
RockygI've got a ping out to him15:36
gemaif not, we continue down the options15:36
gemaRockyg: let me know the outcome15:36
topol#action Rockyg to ask ttx if we can grab #openstack-meeting at this timeslot15:37
RockygI'll put the channels available in todays etherpad15:37
gemaRockyg: thanks!15:37
tonglilooks like we are not changing meeting time, right?15:37
tongliall the options are to keep the current time?15:37
gemayep15:37
topolmy pref is to not change the meeting time.  Its really hard to get all you folks a timeslot that works cuz we all have day jobs :-)15:37
gemaagreed15:38
topol#agree whatever option we choose we keep the same timeslot15:38
tongliok. Wednesday 1500 UCT,15:38
topolOk, let's see what else is on the agenda15:38
tongliwhen day light saving time changes, we change that as well.15:38
topol#topic new repo15:38
*** openstack changes topic to "new repo (Meeting topic: interop_challenge)"15:38
topoltongli did this merge?15:38
topoldo we have a new repo?15:39
tongli@topol, I think so.15:40
tonglithe patch was merged.15:40
garloffwhere?15:40
tonglithanks to Chris.15:40
persiaRockyg: Hrm?  I thought neutron-dvr was in #openstack-meeting-alt15:40
dmelladodid we get to the new repo structure?15:40
tonglihttps://github.com/openstack/interop-workloads15:41
Rockygpersia,  you're right.  massively distributed clouds has it15:41
garlofftongli: thx15:41
tongli@dmellado, we have not discussed that item yet15:41
tongliI put up a structure in last meeting etherpad.15:41
tongliwe need to confirm that is what we want.15:41
topolYay #link https://github.com/openstack/interop-workloads is our new repo15:41
topolyes, #topic repo structure15:41
Rockygand just an fyi, you can link the meetings file to google calendar and it will display properly.15:42
topolsuggested strawman is found at #link https://etherpad.openstack.org/p/interop-challenge-meeting-2016-11-1615:42
topolso a suggestion was15:43
topolCan't we just create the repo using cookiecutter, just as in http://docs.openstack.org/infra/manual/creators.html#preparing-a-new-git-repository-using-cookiecutter15:43
topoland adapt as needed?15:43
tongliuse the generic tool name at the top, then api tool, second, then OS15:44
tongliis it too deep?15:44
topoltongli use cloudfoundry as an example15:44
tonglior the platform (debian, redhat,) should be part of the scripts, with a lot of checks? I personally do not really like that.15:44
topolwhat would it look like15:44
topolIdeally at the top level are workloads,  cloudfoundry,k8s, etc15:45
Rockygyeah, we *don't* want platform.  That's what we are removing from the equation ;-)15:45
topolRockyg +++15:45
topoland you go into cloudfoundry and a readme says how to run the workload15:46
topolsame for K8s15:46
tonglishould be like this /ansible/shade/cloudfoundry?15:46
topolsame for NVF app1 NVF app215:46
dmelladoone thing that we should totally do straightforward this time15:46
tongliif we do OS API, then /ansible/osapi/cloudfoundry?15:46
dmelladois the creation of tox and requirements15:46
dmelladoI wouldn't like what happened last time with the package version mumble around to be repeated15:47
Rockyg++ dmellado15:47
topolI was thinking cloudfoundry/ansible  and cloudfoundry/otherautomationtool15:47
tongli@dmellado, that will be nice, not necessarily required but we can add which does not affect the structure, right?15:47
dmelladothat's why I do suggest to adapt directly from the standard openstack project15:47
topolis that horrible?15:47
dmelladotongli: well, it will be, kinda15:48
RockygI agree with dmellado15:48
tongli@topol, I am thinking if a company runs these work load, most likely they will prefer a tool.15:48
topoldmellado can you give an example15:48
tonglifor example, I will prefer ansible, then I can grab ansible at the top level not care too much about other top directories.15:48
dmelladotopol: sure, so if you use cookicutter, it'll create a predefined structure15:48
Rockyg, but perhaps we could use cookie cutter with a revised template? change some names but keep the structure?15:48
dmelladothat we can adapt it later15:49
tongliif do what you suggested, then I will have to dig a bit deeper, just my experience.15:49
dmelladoRockyg: yeah, that was my idea15:49
topolwhat about tongli's idea of having the automation tool at the top level?15:49
Rockygtongli,  just one or two levels at most.15:49
tongli@dmellado, why adding tox will change the structure, I do not get that.15:50
RockygAnd that's a variable name15:50
dmelladotongli: not that it will change the structure15:50
dmelladousing cookicutter to generate the main template structure15:50
dmelladowill make easier to use tox15:50
topoldmellado do you know how to use cookiecutter?15:51
dmelladotongli: http://paste.openstack.org/show/590977/15:51
dmelladofor example15:51
dmelladothis will be the default cookicutter template15:51
dmelladojust using a demo name15:51
tongli@dmellado, ok, so you are ok with /<toolname>/<os_client_library_name>/<workloadname>15:51
tonglithat is a clear pattern,15:51
tongliif that helps.15:51
dmelladoI'd be fine with that, but inside the default openstack project template ;)15:51
Rockyg++15:52
tongli<toolname> will be whatever tool we feel good about.15:52
tongli<os_client_library_name> , I can think of is shade, and OS Restful API.15:52
topoldmellado so the tricky part is what is the structure in interop_workloads correct?15:52
dmelladotopol: yeah, on that I'm fine with tongli's approach15:53
Rockygmaybe oaktree in future or heat or murano15:53
topoldmellado your proposal to have the standard strcuture to make tox easy makes sense to me15:53
tongli@Rockyg, certainly if we have people wanting to creat heat and murano. then there will be new top level directories.15:53
topoltongli you mean top levels under interop_workloads ?15:54
tongli@topol, if heat, or murano, it will be like this /heat/cloudfoundry /heat/nfv.15:55
tongliI assume heat will always use OS apis.15:55
*** edtubill has joined #openstack-meeting-cp15:55
tongli@topol, yes to your question.15:56
topoldmellado would /heat be a top level or under the directory interop_worlkoads?15:56
dmelladotopol: I'd be fine with that15:56
topoltongli ok good15:56
tongli@topol, @dmellado, should be top level under interop_workloads.15:56
dmelladobaically we can have whatever internal structure we want, as long as we keep that under interop_workloads15:57
Rockygtopol, everything will be under interop_workloads15:57
dmelladoyeah15:57
RockygThat's the root.15:57
tongliso we should have these under interop_workloads /ansible, /terraform, /heat, /murano15:57
Rockyg the repo name.15:57
dmelladoexactly as Rockyg says ;)15:57
topolso we are looking at heat, murano, ansible  etc under the root (interop_workloads)15:57
*** ruan_09 has joined #openstack-meeting-cp15:57
Rockygyup15:57
topolI like that15:57
tongliand /doc to hold all the documents in rst format15:57
*** samueldmq has joined #openstack-meeting-cp15:58
topolany concernswith that structure ?15:58
dmelladotongli: cookiecutter already provides you with a root doc15:58
Rockygyup.  and doc would use the dic tox rules15:58
dmelladoas well as releasenotes with reno15:58
* topol always good to stay in the groove when using tools like tox15:58
tongli@dmellado, ok, not familiar with cooklecutter thing, we can work together on that if it helps.15:58
dmelladotongli: totally15:59
Rockygcookiecutter does all the base installs if we follow the structure15:59
dmelladotongli: in any case it's quite straightforward15:59
topol#action dmellado,tongli use cookie cutter to create agreed to structure15:59
dmelladothink of it as a openstack project template system15:59
dmelladohttp://docs.openstack.org/infra/manual/creators.html#preparing-a-new-git-repository-using-cookiecutter15:59
tongli@Rockyg, it just a tool to create an initial project?15:59
dmelladotongli: it is15:59
topol#agree have these under interop_workloads /ansible, /terraform, /heat, /murano16:00
Rockygyup.  and populate the top level16:00
tongli@dmellado, ok, I will take a look.16:00
topolI think we are out of time. But made great progress here16:00
dmelladotongli: in any case totally up for preparing that together16:00
tonglia patch to setup the structure will be submitted soon.16:00
Rockygdmellado, posted the doc link for it earlier16:00
*** spilla has joined #openstack-meeting-cp16:00
topoldmellado,tongli  thanks for the helpful suggestions here16:01
* markvoelker notes that we're out of time and the defcore meeting is starting over on #openstack-meeting-316:01
tongli@Rockyg, I will dig. thanks.16:01
topol#endmeeting16:01
*** openstack changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings"16:01
openstackMeeting ended Wed Nov 30 16:01:12 2016 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:01
openstackMinutes:        http://eavesdrop.openstack.org/meetings/interop_challenge/2016/interop_challenge.2016-11-30-15.00.html16:01
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/interop_challenge/2016/interop_challenge.2016-11-30-15.00.txt16:01
openstackLog:            http://eavesdrop.openstack.org/meetings/interop_challenge/2016/interop_challenge.2016-11-30-15.00.log.html16:01
lbragstad#startmeeting policy16:01
openstackMeeting started Wed Nov 30 16:01:20 2016 UTC and is due to finish in 60 minutes.  The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot.16:01
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.16:01
*** openstack changes topic to " (Meeting topic: policy)"16:01
openstackThe meeting name has been set to 'policy'16:01
lbragstadraildo, ktychkova, dolphm, dstanek, rderose, htruta, atrmr, gagehugo, lamt, thinrichs, edmondsw, ruan_0916:01
topolTHANks everyoen16:01
dolphm\o/16:01
rderoseo/16:01
dstaneko/16:01
lamto/16:01
ruan_09o/16:01
*** skazi_ has quit IRC16:01
*** thinrichs has joined #openstack-meeting-cp16:02
*** gouthamr has quit IRC16:02
ktychkovao/16:03
*** edmondsw has joined #openstack-meeting-cp16:03
*** gagehugo has joined #openstack-meeting-cp16:03
gagehugoo/16:03
samueldmqhi all16:03
lbragstadhello, good morning, good afternoon16:04
*** gema has left #openstack-meeting-cp16:04
lbragstad#topic action items from last week16:04
*** openstack changes topic to "action items from last week (Meeting topic: policy)"16:04
*** JASON___ has quit IRC16:04
lbragstad#link https://etherpad.openstack.org/p/keystone-policy-meeting16:04
lbragstadagenda in case anyone doesn't have the link ^16:04
lbragstadfor those who missed it - we spent last week discussing ayoung's proposal and going through ktychkova's Apache Fortress example16:05
*** piet_ has joined #openstack-meeting-cp16:05
lbragstad#link https://review.openstack.org/#/c/391624/ to ayoung's RBAC spec16:05
*** jaugustine has joined #openstack-meeting-cp16:06
lbragstadI, personally, have a bunch of questions left on that spec, but ayoung isn't here so we can circle back if he shows up16:06
lbragstaddid anyone have a chance to look at #link https://review.openstack.org/#/c/237521/ ?16:07
ruan_09yes, I've studied it16:07
lbragstad^ which was ktychkova's PoC on apache fortress16:07
lbragstadi think the big hurdle we uncovered with that last week was the AF doesn't really allow scope - right?16:07
lbragstadall role assignments are global16:07
dstaneki thought it was interesting, but should be more configurable16:08
ruan_09we should distingush 2 things: the approach to externalize PDP and AF's capacity to modelize policies16:08
dstaneki started reviewing but never finished16:08
ktychkovayes, it's right16:08
ktychkovaBut I think, it is AF problem anf AF's users :)16:08
lbragstad(and I think one of the workarounds was to duplicate role assignments)16:08
edmondswI didn't get a chance to dive into it, but just going off the commit message it doesn't seem to address checks that have more than 2 levels16:08
ruan_09whether scoped or not scopted, it's up to each PDP16:09
samueldmqedmondsw: what's 2+ level checks ?16:09
edmondswlooking for an example...16:09
*** jgriffith_away is now known as jgriffith16:09
edmondswe.g. from neutron: create_network:provider:network_type16:10
samueldmqedmondsw: ok so those are checks on resources that come from database16:10
samueldmqafaik AF only takes care of RBAC16:10
edmondswwell, from code... may or may not be db code16:11
edmondswthis is RBAC16:11
samueldmqno this is not16:11
edmondsw?16:11
samueldmqRBAC is purely authz based on roles16:11
edmondswand this isn't why?16:11
samueldmqthis is something more than RBAC, because this is not a role16:11
edmondswit is a role check16:11
ruan_09we've sightly modified the 237521, and it works for another external PDP16:11
samueldmqedmondsw: ok. neutron: create_network:provider:network_type is a role check16:12
lbragstadruan_09 which one?16:12
samueldmqI thought it was not. anyways this is not the point here, sorry (don't want to discuss naming)16:12
edmondswsamueldmq, let's say you want to allow someone to create some kinds of networks but not others, based on their role... you define multiple policy checks, so you can check different roles depending on what the request is asking to create16:13
ruan_09the one we used in OPNFV: https://wiki.opnfv.org/display/moon/Moon16:13
*** ravelar has joined #openstack-meeting-cp16:14
ruan_09I sugget to make the 237521 as a generic hook to external PDP16:15
thinrichsCan we finish the example?  create_network:provider:network_type is a role check on the user asking to create a network?  Or it's a role check on the network they're trying to create?16:15
edmondswthinrichs a check of the user's role to make sure they are allowed to create the type of network they're trying to create16:16
lbragstadhttps://github.com/openstack/neutron/blob/master/etc/policy.json#L50-L5616:17
edmondswso I think only the service (in this case neutron) can do that, because only it is parsing the request and will know which of these kinds of checks it needs to test and which it does not16:17
ktychkovaI'm not ready to show how (if) AF can work in such example. I'm sure I can answer next week. I need to run some tests16:18
lbragstadedmondsw means it's up to the service to check ownership16:19
lbragstadmeaning*16:19
edmondswlbragstad, yeah, I don't know much about AF but I can't see how something else would easily do that16:19
edmondswlbragstad, though I'm not sure ownership is the right word16:20
lbragstadedmondsw right - not AF specific, but just the way policy currently is in openstack16:20
*** reed_ has joined #openstack-meeting-cp16:20
lbragstadsamueldmq does that answer your question?16:21
samueldmqlbragstad: edmondsw yes if the only check behind it is a role check that's pure rbac16:21
edmondswsamueldmq of course policy.json today would let you check other things besides the roles, but usually it's just checking role, as the default does in that example16:22
ruan_09if you want to know more about RBAC and its future, I suggest you to read http://www.profsandhu.com/miscppt/kth_abac_141029.pdf16:23
ruan_09the father of RBAC's recent presentation16:23
samueldmqedmondsw: yes, you're right ++16:23
ruan_09rbac can't solve all the problem16:24
dstanekruan_09: thx for the link16:25
dstanekmore background is always helpful to folks for these types of asks16:26
lbragstaddstanek ruan_09 ++16:26
lbragstadso we had another action item to document what we expect from policy at this level16:27
ruan_09maybe we can firstly enable external PDP, than take a look at implementations to decide which one to use?16:28
lbragstaddo we expect it to be flexible enough for applications running on openstack?16:28
lbragstaddo we expect it to only work across services?16:28
thinrichsI would think apps are out of scope and we should focus on ops.16:28
lbragstadthinrichs i think i would agree with that16:29
thinrichsWhat do you mean "work across services"?  Do you mean decisions can be based on data/conditions from multiple services?16:29
lbragstadthinrichs kind of like what it does today where you have policy that protects operations across openstack services16:30
thinrichsOr do you mean you want access control to apply to *sequences* of API calls that span services?16:30
thinrichslbragstad: got it.  Do we want a logically centralized way of expressing policy that applies to all services?16:31
lbragstadthinrichs centralized in what sense?16:31
lbragstadas in owned by a single service?16:31
ruan_09defined policy in one place and enforced by all services?16:32
thinrichsNot sure what ownership means here.  I'd say users want a single place to go see/write policy...16:32
thinrichsand that implementationally we'd want each service to enforce that policy independently.16:32
dstanekdoes any of this account for having policy created by someone other than cloud admins? domain admins for example?16:33
*** ayoung has joined #openstack-meeting-cp16:33
ayoungSorry I'm late.16:33
thinrichsdstanek: I'd think the multiple-author issue is one of how do we express policy--how do we make it easy for multiple people to collaboratively define policy?16:33
lbragstadthinrichs does having it in a single place imply being easy to manage?16:34
thinrichsI've definitely heard from folks saying that having N places to edit/maintain policy makes it hard to manage.  Not saying 1 place necessarily makes it easy, but certainly easier.16:34
lbragstadthinrichs or is the easy of management mean more than it being centralized or not?16:34
ayoungSo, we have 3 levels of policy mechanisms that we have discussed.16:34
ayoungAside from the existing "edit it everywhere"16:35
thinrichsDefinitely want more than just centralization to make it easy to manage.16:35
lbragstadthinrichs i would agree with that16:35
ayoung1. Is external, like the Fortress case, where we make the policy decisions on a remote system16:35
ayoung2. is the dynamic policy pproach we pursued until last year16:35
ayoung3. is leavethe existing policy alone and add an additional layer oin top16:35
thinrichsWhat's the difference between (1) and (2)?16:36
*** reed_ has quit IRC16:36
ayoung3 Only works if we are OK with the existing checks, but want to perform more filtering, which is the only thing I think will actually make it through16:36
ayoungthinrichs: in 2 the policy decision is still made inside the service;16:36
ayoungwe just fetch the remote policy rules from a central repo...Keystone policy16:37
ayoungit had some real shortcomings16:37
thinrichsI'd want to separate out PAP (administering/authoring policy) from PEP (enforcing).16:37
ayoungthe first was that the nodes did not know their own identity to fetch the proper policy file16:37
thinrichs1. is then PAP and PEP are the same (external)16:37
lbragstaddoes anyone here talk to their operators, or know what kind of changes are made to policy in the real world? When folks change it, are they changing the whole thing or just making small tweaks? (edmondsw)16:37
thinrichs2. is then PAP is external and PEP is local16:37
ayoungto, in that approach, the PAP was Keystone, the PEP/PDP was oslo-policy call inside the service16:37
ayoungthinrichs: yep16:38
ruan_09thinrichs: no, PAP/PDP is external, PEP is inside each service16:38
ayoungSo, we do have a way we can continue on there.16:38
lbragstadcurrently the PAP is whatever configuration management system you use for your deployment16:38
thinrichs3. Not sure what this one is...probably PEP is local and PAP is external16:38
ayoungThe issue was that we were trying to name the policy files by Endpoint.  There was a proces problem there:16:39
edmondswlbragstad, I think the feedback at the summits has been that folks are increasingly changing more in policyin Tokyo was the folks were and Austin (I missed Barca) was that16:39
edmondswignore the end of that...16:39
thinrichslbragstad: that's interesting--using CAPS as your PAP16:39
edmondswas for me, I'm overriding lots of policy.json defaults16:39
edmondswmaybe 90%16:39
lbragstadO.O16:40
ayoungendpoints are essentially only named by their URLs in theservice catalog.  The install tools balked at the idea that you would: register the endpoint, get an endpoint ID from Keystone, add that to the config mgmt, update the config and then use that ID to fetch policy16:40
ayoungbut...it turns out we really don't need to do that.16:40
ayoungwe just need a name to fetch policy by.  Does not need to be anything other than human readable, and pre-calculatable16:40
ayoungand that is the approach I am using in the RBAC-Middleware approach16:40
lbragstadthinrichs well - partially, because you typically have a CMS to lay down config, and policy.json is currently considered configuration... but the other part would be the keystone role API.16:40
ayoungwe could do the same for Dynamic policy16:41
ayounglbragstad: and that was a huge driving factor;  people were more comfortable with policy in CMS than in a dynamic store like Keystone.16:41
ayoungWhich is another reason I pursued the RBAC in Middleware approach instead16:41
ayoungRBAC is "on top" of existing policy16:42
ayoungas none of the existing policy files check roles on most calls16:42
edmondswayoung ?16:42
lbragstadthey check *a* role16:43
ayoungthe shortcoming, of course, is that it does only RBAC, not the full ABAC, but then again, oslo-policy can only do ABAC if the services provide the attributes16:43
lbragstadright16:43
ayoungand we don't know what attributes they are going to provide...it is all over the place, as jamielennox found16:43
lbragstadwhich i don't necessarily consider a bad thing16:43
ayounglbragstad: not even A role...just that the token has a project16:43
edmondswdefault policy.json can't check roles, plural, today because there is only one default role :)16:43
ayoungit implies a role, but a wierd token with 0 roles but a project ID would pass the policy check.16:44
edmondswayoung, a large number of the default checks look for the admin role16:45
lbragstadedmondsw from your perspective, what would assist you in making less policy overrides?16:45
ayoungSo...those are some of the driving reasons I posted this https://review.openstack.org/#/c/391624/16:45
ayoungedmondsw: yep, and we still need to complete the 968696 work around that16:45
edmondswlbragstad, fixing each service individually... this is a nova problem, a neutron problem, a glance problem, etc... not a keystone problem16:45
ayoungan admin api is an admin API.16:46
ayoung  Opening it up will still required a policy.json change16:46
edmondswmaking each service (nova, etc.) consistent with the others would be a big help16:46
lbragstadedmondsw would you say nova's approach to putting policy in code (oslo) moves in the right direction?16:46
edmondswI think what nova did, and cinder is now doing, to move policy defaults into code instead of policy.json is a good step as well... makes the files much more readable16:46
lbragstadedmondsw or is the moot to you?16:46
edmondswand the yaml support16:47
ayoungThe other thing that is lacking is the ability to map from the policy rules to the APIs16:47
edmondswayound the admin_api rule you're referring to checks for the admin role...16:47
ayoungwith the RBAC in MIddlewaree, we enforce policy on the URL pattern, instead of some cutpoint inside the code16:47
ayoungand I have an analogy.16:47
ayoungRBAC is like file permisions, oslo-policy is like SE Linux16:48
lbragstadayoung have you seen dstanek's example on your review?16:48
lbragstadregarding the URL pattern?16:48
edmondswayoung, you can enforce a certain level of RBAC on the URL pattern, but there are RBAC cases that won't have the information you need in the URL16:48
edmondswwe were discussing one before you joined16:48
ayoungedmondsw: yep...anything on the payload or even query parameters are not covered yet16:49
ayoungand anything on the object fetched from the database is out, too16:49
edmondswe.g. you ask to create a network, and neutron checks not only that you can create a network (one policy check) but also that you can specify what you did in the request body (potentially multiple additional policy checks)16:49
edmondswgood, we're on the same page :)16:50
ayoungedmondsw: so nothing prevents that from happening now, but my understanding is that the code that performs things like that are very much hard coded, and should be left to the neutron team to affect.16:50
edmondswagreed16:50
ayoungif there are cases where they need aspecific role to perform something, that is going to be new effort as well16:51
ayoungThere is nothing keeping the Neutron team from using the RBAC mechanism later on if they want to, just that I am not driving the implementation off those use cases16:51
dstanekayoung: i'd love to get all of the usecase documented so that we can apply the solutions to them and see how they compare16:52
lbragstaddstanek ++16:52
thinrichs+116:52
ayoungIt is a free form pattern.  They could bastarize it to do anything they wanted, so long as they can map a patter to a role16:52
ayoungneutron policy is not something that the end deployer should be breaking....16:52
edmondswbreaking?16:52
ayoungediting the policy.json file and changing in such a way it triggers a 500 error16:53
lbragstad8 minute warning16:53
edmondswif you add roles, then you have no choice but to edit policy16:53
ayoungedmondsw: hence my spec and approach using RBAC in middleware16:54
dstanekayoung: i still think there are cases where the role must exist in the policy file16:54
ayoungthat is what https://review.openstack.org/#/c/391624/  is proposing16:54
edmondswayoung sorry, I haven't read the latest version yet... I had I think 50+ comments on the version I did read, but I think you were going to rewrite after that16:54
ayoungdstanek: heh...probably, but we can defer that until we can do roles in general16:54
edmondswdstanek definitely16:55
ayoungI would suggest we resurrect dynamic policy once we get that one in16:55
ayoungthe idea of fetching policy by 'tag' as opposed to service name to do endpoint specific policy will work16:55
edmondswwe're not suggesting that the ability for neutron, etc. to make checks against the role would be removed, are we? Because that is a non-starter16:55
dstanekayoung: my problem with what we have been talking about so far is that i don't see the vision. so i don't know if the steps get us there16:55
ayoungthe default is that nova would fetch the "compute" policy16:55
ayoungdstanek: I would say that the vision is 3 things:16:56
ayoung1.  perform the RBAC check based on the URL, not a rnadom string, so that people can fugyure out what they need to delegate16:56
lbragstadedmondsw the spec pulls the role check into keystonemiddleware16:56
edmondsws/the/an/16:56
ayoung2.  make it possible for people to create more fine grained roles for a set of a tasks so they can delegate a subset of them16:57
ayoung3. make it possible for people to change the RBAC for operations without breaking the parts of policy that require engineering knowledge of the remote systems16:57
edmondswyou can pull A role check into keystonemiddleware, but you can't prevent the service from doing additional checks also based on role16:58
lbragstadedmondsw that's kinda what dstanek left as a comment16:58
ayoungI did my best to make it as clear as possible in that spec.16:58
lbragstadalright - two minutes left, but it sounds like we still have a lot to discuss on the sepc16:59
lbragstadI'd like to have folks bring some more ideas to the meeting next week16:59
ayoungcan we agree to all read and comment on the spec for next week?  And maybe have a vote on it to pursue or not?16:59
lbragstadso if you have any - please add them as agenda items16:59
thinrichsayoung: I'm still missing the big picture.  Are you aiming for a single PAP for all services?  Are you envisioning the possibility of an external PDP? Are you committed to local PEPs?16:59
lbragstadayoung i have been16:59
ayoungthinrichs: single PAP.  local PEPs17:00
ayoungthinrichs: Only RBAC17:00
edmondswI think #3 touches on another pain point I have changing policy... that lots of times one check leads to another down the line in unexpected ways... e.g. creating a new server/vm is going to end up causing checks in neutron, cinder, glance, etc.17:00
lbragstadruan_09 your proposal for external PDP would be good for that17:00
ruan_09 ok,17:00
lbragstadalright - let's continue in #openstack-keystone if needed17:00
lbragstad#endmeeting17:00
*** openstack changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings"17:00
openstackMeeting ended Wed Nov 30 17:00:48 2016 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)17:00
openstackMinutes:        http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-11-30-16.01.html17:00
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-11-30-16.01.txt17:00
openstackLog:            http://eavesdrop.openstack.org/meetings/policy/2016/policy.2016-11-30-16.01.log.html17:00
*** edmondsw has left #openstack-meeting-cp17:01
*** thinrichs has quit IRC17:02
*** gagehugo has left #openstack-meeting-cp17:04
*** spilla has left #openstack-meeting-cp17:06
*** ayoung has quit IRC17:16
*** topol has quit IRC17:17
*** MarkBaker has quit IRC17:18
*** MarkBaker has joined #openstack-meeting-cp17:19
*** jgriffith is now known as jgriffith_away17:19
*** tongli has quit IRC17:30
*** ruan_09 has quit IRC17:45
*** MarkBaker has quit IRC17:52
*** MarkBaker has joined #openstack-meeting-cp17:53
*** jgriffith_away is now known as jgriffith18:00
*** MarkBaker has quit IRC18:06
*** topol has joined #openstack-meeting-cp18:23
*** edtubill has quit IRC18:26
*** lyarwood_ is now known as lyarwood18:30
*** kbyrne has quit IRC18:35
*** kbyrne has joined #openstack-meeting-cp18:38
*** MarkBaker has joined #openstack-meeting-cp19:02
*** diablo_rojo_phon has joined #openstack-meeting-cp19:12
*** MarkBaker has quit IRC20:07
*** gouthamr has joined #openstack-meeting-cp20:09
*** edtubill has joined #openstack-meeting-cp20:18
*** lyarwood is now known as lyarwood_20:19
*** lyarwood_ is now known as lyarwood20:19
*** MarkBaker has joined #openstack-meeting-cp21:14
*** diablo_rojo_phon has quit IRC21:28
*** gouthamr has quit IRC21:49
*** edtubill has quit IRC22:40
*** rarcea_ has quit IRC23:06
*** ravelar has quit IRC23:14
*** topol has quit IRC23:20
*** ravelar has joined #openstack-meeting-cp23:26
*** beekhof has joined #openstack-meeting-cp23:29
*** ravelar has quit IRC23:33
*** sdague has quit IRC23:38
*** lamt has quit IRC23:44
*** xyang1 has quit IRC23:50

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!