Friday, 2020-12-04

openstackgerritBrian Haley proposed openstack/ovn-octavia-provider master: Correctly set member operating status  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76521300:18
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider master: Correctly set member operating status  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76521300:21
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider master: Start running the tempest API tests  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/75255800:21
*** mlavalle has quit IRC00:40
openstackgerritMerged openstack/neutron master: Remove "ovs-vsctl" support from rootwrap  https://review.opendev.org/c/openstack/neutron/+/76321800:40
*** spatel has joined #openstack-neutron00:52
*** hamalq has quit IRC00:54
*** guilhermesp has quit IRC00:56
*** jungleboyj has quit IRC00:56
*** jungleboyj has joined #openstack-neutron00:57
*** gouthamr has quit IRC00:57
*** nicolasbock has quit IRC00:57
*** mnasiadka has quit IRC00:57
*** guilhermesp has joined #openstack-neutron00:58
*** mnasiadka has joined #openstack-neutron00:58
*** nicolasbock has joined #openstack-neutron00:58
*** gouthamr has joined #openstack-neutron00:58
*** macz_ has quit IRC01:05
*** ociuhandu has joined #openstack-neutron01:10
openstackgerritzhanghao proposed openstack/neutron master: [OVN] Use the new method to set lrp options  https://review.opendev.org/c/openstack/neutron/+/76517101:14
*** ociuhandu has quit IRC01:15
openstackgerritMerged openstack/neutron master: [Docs] Guide about running and debugging fullstack tests  https://review.opendev.org/c/openstack/neutron/+/76436701:24
openstackgerritzhanghao proposed openstack/neutron master: [OVN] Implement router gateway IP QoS  https://review.opendev.org/c/openstack/neutron/+/74901201:28
*** openstackgerrit has quit IRC01:38
*** spatel has quit IRC01:54
*** baojg has joined #openstack-neutron02:10
*** macz_ has joined #openstack-neutron02:10
*** zzzeek has quit IRC02:14
*** macz_ has quit IRC02:15
*** zzzeek has joined #openstack-neutron02:15
*** hemanth_n has joined #openstack-neutron02:36
*** hemanth_n has quit IRC02:45
*** ociuhandu has joined #openstack-neutron02:59
*** ociuhandu has quit IRC03:03
*** sapd1 has joined #openstack-neutron03:31
*** jmlowe has quit IRC03:36
*** baojg has quit IRC03:36
*** baojg has joined #openstack-neutron03:37
*** sapd1 has quit IRC03:38
*** jmlowe has joined #openstack-neutron03:39
*** carloss has quit IRC03:41
*** baojg has quit IRC03:47
*** baojg has joined #openstack-neutron03:48
*** hemanth_n has joined #openstack-neutron03:49
*** hemanth_n has quit IRC03:53
*** ociuhandu has joined #openstack-neutron04:47
*** ociuhandu has quit IRC04:51
*** lajoskatona has joined #openstack-neutron04:57
*** lajoskatona has left #openstack-neutron04:58
*** hemanth_n has joined #openstack-neutron05:04
*** lajoskatona has joined #openstack-neutron05:04
*** hemanth_n has quit IRC05:17
*** gcheresh has joined #openstack-neutron05:46
*** lbragstad has quit IRC06:02
*** lbragstad has joined #openstack-neutron06:03
*** ratailor has joined #openstack-neutron06:20
*** gcheresh has quit IRC06:29
*** spatel has joined #openstack-neutron06:33
*** ociuhandu has joined #openstack-neutron06:35
*** spatel has quit IRC06:37
*** ociuhandu has quit IRC06:40
*** xinranwang has joined #openstack-neutron06:56
*** ociuhandu has joined #openstack-neutron07:02
*** rcernin has quit IRC07:04
*** lpetrut has joined #openstack-neutron07:06
*** ociuhandu has quit IRC07:14
*** rcernin has joined #openstack-neutron07:17
*** rcernin has quit IRC07:18
*** tmorin has joined #openstack-neutron07:28
*** sapd1 has joined #openstack-neutron07:35
*** ociuhandu has joined #openstack-neutron07:42
*** ccamposr has joined #openstack-neutron07:46
*** lpetrut has quit IRC07:46
*** ociuhandu has quit IRC07:47
*** ccamposr__ has quit IRC07:49
*** luksky has joined #openstack-neutron07:55
*** ccamposr__ has joined #openstack-neutron08:02
*** ociuhandu has joined #openstack-neutron08:02
*** ociuhandu has quit IRC08:03
*** ccamposr has quit IRC08:05
*** ociuhandu has joined #openstack-neutron08:12
*** ociuhandu has quit IRC08:18
*** imtiazc has quit IRC08:18
*** tesseract has joined #openstack-neutron08:26
*** bengates has joined #openstack-neutron08:29
*** tmorin has quit IRC08:29
*** tkajinam has quit IRC08:31
*** tkajinam has joined #openstack-neutron08:32
*** ociuhandu has joined #openstack-neutron08:32
*** ociuhandu has quit IRC08:39
*** tmorin has joined #openstack-neutron08:47
*** sapd1 has quit IRC08:50
*** sapd1 has joined #openstack-neutron08:53
*** tesseract has quit IRC08:55
*** tesseract has joined #openstack-neutron08:55
*** jpena|off is now known as jpena08:57
*** lpetrut has joined #openstack-neutron09:07
ralonsohslaweq, we don't have ovs-vsctl rootwrap support and https://review.opendev.org/c/openstack/neutron/+/755313 is merged09:12
*** elvira has joined #openstack-neutron09:12
ralonsohlet's see how it's going today and this weekend in the CI...09:12
*** xinranwang has quit IRC09:15
slaweqralonsoh: hi, sure09:16
slaweqI hope it will be better now09:17
*** ramishra has quit IRC09:19
*** ramishra has joined #openstack-neutron09:40
*** ociuhandu has joined #openstack-neutron09:41
*** ociuhandu has quit IRC09:46
*** gcheresh has joined #openstack-neutron09:50
ralonsohslaweq, https://review.opendev.org/c/openstack/neutron/+/76498009:56
ralonsohjust a heads-up09:56
ralonsohabout how to define the policies09:56
ralonsohaccording to Lance (and he is the expert on this)09:56
ralonsohwe can split "role" and "project"09:56
slaweqralonsoh:10:00
slaweqthx for heads up10:00
ralonsohyw10:00
slaweqlooking10:00
*** jlibosva has joined #openstack-neutron10:02
slaweqralonsoh: I'm not sure if I understand it10:02
slaweqralonsoh: Your example from Nova is exactly the same as what I proposed there10:02
slaweqor am I missing something?10:03
*** sapd1 has quit IRC10:05
ralonsohslaweq, I'm trying to find you patch defining the strings...10:05
*** spatel has joined #openstack-neutron10:05
ralonsohslaweq, https://review.opendev.org/c/openstack/neutron/+/764437/3/neutron/conf/policies/base.py10:06
ralonsohdo we need this patch with "role" and "project"?10:07
ralonsohsorry, I'm still learning10:07
ralonsohbecause we have the oslo roles and the "scope" check10:07
slaweqralonsoh: idk10:08
slaweqmaybe we should ask lbragstad when he will be available10:08
ralonsohperfect, good idea10:08
ralonsohI'll add him to the patch10:09
*** ociuhandu has joined #openstack-neutron10:10
*** spatel has quit IRC10:11
*** ociuhandu has quit IRC10:19
*** ociuhandu has joined #openstack-neutron10:25
*** ociuhandu has quit IRC10:29
*** tmorin has quit IRC10:32
*** jangutter_ has joined #openstack-neutron10:43
*** jangutter has quit IRC10:46
lajoskatonaslaweq: Hi, question about new engine facade: is there an etherpad or similar for stadium projects?10:52
*** gcheresh has quit IRC10:53
lajoskatonaslaweq: I just quickly collected a few on hound which I am interested in: https://codesearch.opendev.org/?q=context.session.begin&i=nope&files=&excludeFiles=&repos=openstack/networking-bagpipe,openstack/networking-bgpvpn,openstack/networking-odl,openstack/neutron,openstack/neutron-dynamic-routing,x/networking-l2gw,x/tap-as-a-service10:53
slaweqlajoskatona: nope11:04
slaweqI didn't made anything like that11:04
*** yumiriam has joined #openstack-neutron11:12
*** carloss has joined #openstack-neutron11:21
*** yumiriam has quit IRC11:24
*** ociuhandu has joined #openstack-neutron11:39
*** ociuhandu has quit IRC11:39
lajoskatonaslaweq: thanks11:42
*** spatel has joined #openstack-neutron11:54
*** spatel has quit IRC11:58
slaweqralonsoh: I'm looking now at https://review.opendev.org/c/openstack/neutron/+/765418/1/neutron/conf/policies/qos.py proposed by lbragstad and it seems that it's done in same way like my patches12:00
*** ratailor has quit IRC12:01
ralonsohslaweq, I need to learn how policies are applied. If we have "role" and "scope", how this is checked12:03
ralonsohthat's what I don't understand:12:03
ralonsohin the policy we specify a str check, that has a role and scope12:03
ralonsohbut also we specify the scope_types (??)12:03
slaweqralonsoh: https://docs.openstack.org/keystone/latest/contributor/services.html#authorization-scopes12:05
slaweqIIUC those are like "2 levels" of checkjs12:05
slaweq*checks12:05
slaweqbut maybe I'm wrong with it12:05
slaweqbtw ralonsoh can You +W https://review.opendev.org/c/openstack/neutron/+/764436 ?12:06
ralonsohslaweq, sure12:06
slaweqthx12:06
*** ociuhandu has joined #openstack-neutron12:11
*** ociuhandu has quit IRC12:20
*** jpena is now known as jpena|lunch12:32
*** zzzeek has quit IRC12:36
*** zzzeek has joined #openstack-neutron12:37
*** cgoncalves has quit IRC12:45
*** cgoncalves has joined #openstack-neutron12:46
*** cgoncalves has quit IRC12:47
*** ociuhandu has joined #openstack-neutron12:51
*** ociuhandu has quit IRC12:59
*** spatel has joined #openstack-neutron13:00
*** spatel has quit IRC13:05
*** macz_ has joined #openstack-neutron13:08
*** macz_ has quit IRC13:12
*** ociuhandu has joined #openstack-neutron13:17
*** ociuhandu has quit IRC13:17
*** jpena|lunch is now known as jpena13:29
*** ociuhandu has joined #openstack-neutron13:36
*** cgoncalves has joined #openstack-neutron13:40
*** ociuhandu has quit IRC13:43
lbragstadslaweq ralonsoh o/13:46
slaweqlbragstad: hi13:47
lbragstadsounds like you had some questions about the check strings?13:48
lbragstadcan i do anything to help clarify that?13:49
ralonsohlbragstad, hi thanks13:50
slaweqlbragstad: https://review.opendev.org/c/openstack/neutron/+/764980/1/neutron/conf/policies/address_scope.py13:50
slaweqthere is your comment there which I'm not sure if I understand really13:50
ralonsohin Nova the strings are only roles13:50
slaweqand I'm not sure if I understand how those various scopes and roles works really13:50
ralonsohbut not roles+scope13:50
lbragstadyeah - good question13:51
ralonsohI though that the scope was given by the scope_types13:51
lbragstadit really depends on the API13:51
lbragstadin the simplest example, lets assume you have a system-level API13:51
lbragstadyou could protect it with a policy that has check_str='role:admin' and scope_types=['system']13:51
slaweqlbragstad: like e.g. agents in neutron, right?13:52
lbragstadsure13:52
slaweqk13:52
lbragstadthat's a good example13:52
lbragstadso - in that case, the scope check is handled completely outside of the check string13:52
lbragstadso long as `neutron.conf [oslo_policy] enforce_scope = True` oslo.policy is going to check the scope of the context object against the scope_types attribute of the policy rule13:53
slaweqlbragstad: so it's like another "level" of checks?13:53
lbragstadand advantage of this is that it allows service developers the ability to set what layer an API is designed to work at13:53
lbragstadslaweq yeah - pretty much13:53
slaweqk13:54
lbragstadit just takes a more strict stance in saying "this API is system-level, make sure it's invoked with system-level authorization"13:54
lbragstadif we take another example13:54
lbragstadrouters for example13:54
lbragstadwhich is an API accessible to project users but administrators could arguably go in and view or clean things up if needed13:55
*** xinranwang has joined #openstack-neutron13:55
slaweqand that's why we have "system" and "project" scopes there, right?13:55
lbragstadin that case we might have something like this, check_str='(role:admin and system_scope:all) or (role:member and project_id:s(project_id)s)'13:56
lbragstadyeah13:56
lbragstadexactly13:56
lbragstadso we need to have scope_types=['system', 'project'] so that the enforcer will allow both token types to be used with that policy check13:56
slaweqok13:57
lbragstadwe can also do something like check_str='role:reader', scope_types=['system', 'project']13:57
lbragstadto protect read-only APIs13:57
slaweqso, does it makes sense to have some api with check_str SYSTEM_OR_PROJECT_ADMIN and set just "project" scope?13:57
slaweqthis last question is just theoretical :)13:58
ralonsohwhy do we need then those rule strings https://review.opendev.org/c/openstack/neutron/+/764437/3/neutron/conf/policies/base.py?13:58
ralonsohif the check string should be the role only13:59
*** mlavalle has joined #openstack-neutron13:59
ralonsoh(like in Nova)13:59
lbragstadif you have something like check_str='(role:admin and system_scope:all) or (role:member and project_id:%(project_id)s)' but only scope_types=['project'] only project members will be allowed to access that API if enforce_scope = True13:59
slaweqok, I see13:59
lbragstadralonsoh good question13:59
lbragstadi think we can simplify the SYSTEM_OR_PROJECT_READER check to only include the role14:00
ralonsohright, now that makes sense to me14:00
lbragstadyou'll need the scope check built into the check string if the role deviates across scopes14:00
ralonsohooook good point14:01
lbragstadfor example, if you want to allow system-admins to cleanup routers, but project-members should be able to cleanup routers for only their project14:01
lbragstadbecause that's what enforces tenancy to make sure people aren't accessing/deleting/creating things outside their project14:01
lbragstadthe 'role:member and project_id:%(project_id)s' bit is what ensures someone with the member role can't delete a router outside their project14:02
*** jmlowe has quit IRC14:02
ralonsohok, I see that now14:02
lbragstad(assuming neutron passing the project_id of the router in the DELETE request14:02
ralonsohsure, of course hehehe14:02
lbragstadbut - yeah...14:03
lbragstadit's kind of a long answer14:03
slaweqlbragstad: one more, quick question14:03
lbragstadsure14:03
slaweqabout your comment to https://review.opendev.org/c/openstack/neutron/+/764980/1/neutron/conf/policies/address_scope.py14:03
slaweqI already added there scope_types=['project','system']14:03
slaweqshould I change it to 'project' only?14:04
lbragstadif neutron expects a project_id whenever it creates an address_scope, then i think that's safe14:04
lbragstadthat'll just mean that you must always use a project-scope token when creating an address_scope14:04
slaweqahh, becase if that would be done by user with system scope then there wouldn't be project_id in the context14:05
lbragstadcorrect - neutron would need to make an assumption about what project to put that resource under14:05
slaweqok, I see now14:06
slaweqso I think that maybe I will need to change some of my patches :)14:06
slaweqthx lbragstad for explanations14:06
ralonsohthanks a lot!14:06
lbragstadin some projects, that's an easy assumption to make because there are alternative ways of passing in the project_id14:06
lbragstadfor example, some APIs allow users to set the project_id of a resource in the body of the create request14:06
lbragstadwhich could be used as a way for system-admins to create resources on behalf of a project (for better or worse)14:07
*** tkajinam has quit IRC14:07
ralonsohyeah, that means a system admin can create this kind of resources?14:07
ralonsohpassing the project_id14:07
lbragstadright14:07
ralonsohperfect14:07
lbragstadbut...14:07
lbragstadit does mean you need to double check that project_ids from the request body match the project_id from context objects14:08
lbragstad(to prevent end users to injecting routers into projects they don't have any authorization on)14:08
ralonsohright14:08
lbragstads/end users/project users/14:08
slaweqok, so in neutron I think that system admin can always put project id in the POST body14:09
slaweqlbragstad: as we checked yesterday - it's checked in neutron-lib14:09
* lbragstad nods 14:10
slaweqso to allow that with the new rbac we should everywhere there have "system" added to the scope_types14:10
slaweqand eventually improve check in neutron lib14:10
lbragstadyeah - wherever you plan to have system-users create things, even if it's on behalf of a project user14:10
slaweqlbragstad: it was like that so far so I think we should keep it14:11
slaweqat least in that first step14:11
lbragstadsure14:11
slaweqotherwise it would be too big change14:11
slaweqthx a lot, now I understand those scopes much better :)14:11
lbragstadi'm certainly not in a position to tell projects to remove or modify APIs that allow operators to create resources on behalf of users :)14:12
lbragstadbut - the underlying tools should give service developers all the tools to safely enforce those cases if needed14:12
lbragstads/underlying tools/underlying libraries/14:13
lbragstadi worked through some of the resources yesterday, but feel free to adjust or tweak any of those policies if needed14:15
slaweqlbragstad: yes, I saw it, thx a lot14:21
slaweqI also sent few patches today14:21
lbragstadslaweq cool - i'll work on proposing any missing policies on monday14:23
*** jmlowe has joined #openstack-neutron14:25
*** jmlowe has quit IRC14:31
*** ociuhandu has joined #openstack-neutron14:33
*** ociuhandu has quit IRC14:33
*** ociuhandu has joined #openstack-neutron14:38
*** ociuhandu has quit IRC14:43
*** jmlowe has joined #openstack-neutron14:43
*** bnemec has joined #openstack-neutron14:44
*** openstackgerrit has joined #openstack-neutron14:49
openstackgerritLajos Katona proposed openstack/neutron-dynamic-routing master: Migrate to new engine facade  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/76554314:49
*** jmlowe has quit IRC14:50
*** bnemec is now known as beekneemech14:50
*** jmlowe has joined #openstack-neutron14:52
*** jmlowe has quit IRC14:54
*** ociuhandu has joined #openstack-neutron14:56
*** tmorin has joined #openstack-neutron15:00
*** ociuhandu has quit IRC15:03
*** imtiazc has joined #openstack-neutron15:03
*** jmlowe has joined #openstack-neutron15:17
*** jmlowe has quit IRC15:29
johnsomhaleyb: Yeah, you can do that license proxy thing with Octavia today. Put the VIP on the isolated tenant network, the add members to the LB that point to the license server(s), etc.15:29
haleybjohnsom: yeah, i didn't see the need to re-invent things, one of our thoughts was just a VM on the isolated network, but Octavia would be better (IMHO)15:32
*** jmlowe has joined #openstack-neutron15:51
slaweqralonsoh: if You have few minutes, can You also check https://review.opendev.org/c/openstack/neutron/+/764831 ?15:54
slaweqthx in advance15:54
ralonsohslaweq, ah yes this one15:55
ralonsohsure15:55
slaweqralonsoh: I also addressed your comments in https://review.opendev.org/c/openstack/neutron/+/76320415:56
slaweqif You have some time, also this one is now good to go https://review.opendev.org/c/openstack/neutron/+/761613/ :)15:57
ralonsohslaweq, ^^ good one this patch16:01
ralonsohwe don't need it there16:01
*** jmlowe has quit IRC16:01
slaweqralonsoh: now, as neutron-tempest-plugin-api runs with uwsgi, I don't think we need that one too16:01
ralonsohcorrect, I agree16:02
openstackgerritRodolfo Alonso proposed openstack/neutron-tempest-plugin master: Project ID is checked when listing security groups  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/75439016:03
*** ociuhandu has joined #openstack-neutron16:04
*** macz_ has joined #openstack-neutron16:06
*** ociuhandu has quit IRC16:09
openstackgerritzhanghao proposed openstack/neutron master: [OVN] Implement router gateway IP QoS  https://review.opendev.org/c/openstack/neutron/+/74901216:15
*** jmlowe has joined #openstack-neutron16:17
*** lajoskatona has quit IRC16:26
*** ralonsoh has quit IRC16:35
*** mlavalle has quit IRC16:35
*** ralonsoh has joined #openstack-neutron16:35
*** mlavalle has joined #openstack-neutron16:36
gmannamotoki: slaweq this is ready now - https://review.opendev.org/c/openstack/neutron/+/76440116:42
*** jlibosva has quit IRC16:48
*** bengates has quit IRC16:50
*** tesseract has quit IRC16:57
*** lpetrut has quit IRC17:00
openstackgerritMerged openstack/ovn-octavia-provider master: Retry status updates to Octavia  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/75913917:01
*** xinranwang has quit IRC17:05
*** imtiazc has quit IRC17:08
*** ociuhandu has joined #openstack-neutron17:11
*** ociuhandu has quit IRC17:11
openstackgerritMerged openstack/ovn-octavia-provider master: Change devstack script to correctly configure driver  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/75792017:12
openstackgerritMerged openstack/ovn-octavia-provider master: Add master and release tempest jobs  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/74244517:12
*** ociuhandu has joined #openstack-neutron17:12
*** imtiazc has joined #openstack-neutron17:12
*** imtiazc has quit IRC17:16
*** ociuhandu has quit IRC17:16
openstackgerritMerged openstack/ovn-octavia-provider master: Include python36-devel in bindep  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/75606517:17
*** ociuhandu has joined #openstack-neutron17:20
*** imtiazc has joined #openstack-neutron17:23
openstackgerritHang Yang proposed openstack/neutron master: Add standard_attrs to address group  https://review.opendev.org/c/openstack/neutron/+/76422817:27
openstackgerritHang Yang proposed openstack/neutron master: Get sec group ids after address group update  https://review.opendev.org/c/openstack/neutron/+/76382817:29
openstackgerritHang Yang proposed openstack/neutron master: <WIP> Support address group in OVS firewall agent  https://review.opendev.org/c/openstack/neutron/+/75765017:29
*** ociuhandu has quit IRC17:30
*** ociuhandu has joined #openstack-neutron17:31
*** ociuhandu has quit IRC17:31
*** tmorin has quit IRC17:33
*** beekneemech has quit IRC17:49
*** jmlowe has quit IRC17:58
*** jpena is now known as jpena|off17:59
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/victoria: Retry status updates to Octavia  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76559618:00
*** jangutter has joined #openstack-neutron18:00
*** jangutter_ has quit IRC18:04
*** jmlowe has joined #openstack-neutron18:18
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Retry status updates to Octavia  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76558218:20
*** raildo has quit IRC18:21
*** jangutter has quit IRC18:22
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/victoria: Fix leaked file descriptors by cleaning up objects  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76559718:22
*** jangutter has joined #openstack-neutron18:22
*** jmlowe has quit IRC18:22
*** jmlowe has joined #openstack-neutron18:25
*** jangutter has quit IRC18:25
*** jangutter has joined #openstack-neutron18:26
*** hamalq has joined #openstack-neutron18:36
*** ccamposr has joined #openstack-neutron18:36
*** ccamposr__ has quit IRC18:38
*** jangutter has quit IRC18:39
*** jangutter has joined #openstack-neutron18:40
*** jangutter has quit IRC18:40
*** jangutter has joined #openstack-neutron18:41
*** raildo has joined #openstack-neutron18:43
*** jangutter has quit IRC18:45
*** raildo has quit IRC18:45
*** jangutter has joined #openstack-neutron18:46
*** raildo has joined #openstack-neutron18:48
*** jmlowe has quit IRC18:52
*** elvira has quit IRC18:53
*** jmlowe has joined #openstack-neutron19:06
*** jmlowe has quit IRC19:09
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Retry status updates to Octavia  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76558219:19
*** luksky has quit IRC19:46
*** luksky has joined #openstack-neutron19:46
openstackgerritMerged openstack/neutron master: [GRE] Add possibility to create GRE tunnels over IPv6  https://review.opendev.org/c/openstack/neutron/+/76320419:52
*** jangutter_ has joined #openstack-neutron20:05
openstackgerritMerged openstack/neutron master: Ensure ovsdb_probe_interval set before connect()  https://review.opendev.org/c/openstack/neutron/+/76423520:05
*** jangutter has quit IRC20:09
openstackgerritTerry Wilson proposed openstack/neutron stable/victoria: Ensure ovsdb_probe_interval set before connect()  https://review.opendev.org/c/openstack/neutron/+/76559920:16
openstackgerritTerry Wilson proposed openstack/neutron stable/victoria: Ensure ovsdb_probe_interval set before connect()  https://review.opendev.org/c/openstack/neutron/+/76559920:21
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76561920:23
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76561920:23
*** ralonsoh has quit IRC20:29
openstackgerritBrian Haley proposed openstack/networking-ovn stable/train: Fix leaked file descriptors by cleaning up objects  https://review.opendev.org/c/openstack/networking-ovn/+/76562020:35
*** jmlowe has joined #openstack-neutron20:36
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76561920:38
openstackgerritBrian Haley proposed openstack/ovn-octavia-provider stable/ussuri: Fix leaked file descriptors by cleaning up objects  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/76561920:38
openstackgerritBrian Haley proposed openstack/networking-ovn stable/train: Retry status updates to Octavia  https://review.opendev.org/c/openstack/networking-ovn/+/76562120:41
*** jamesdenton has quit IRC20:51
*** jamesdenton has joined #openstack-neutron20:51
*** ociuhandu has joined #openstack-neutron20:51
*** gcheresh has joined #openstack-neutron20:58
*** ociuhandu has quit IRC21:16
*** tmorin has joined #openstack-neutron21:24
*** mlavalle has quit IRC21:38
*** mlavalle has joined #openstack-neutron21:40
*** tmorin has quit IRC21:41
*** ociuhandu has joined #openstack-neutron21:47
openstackgerritTerry Wilson proposed openstack/neutron stable/ussuri: Ensure ovsdb_probe_interval set before connect()  https://review.opendev.org/c/openstack/neutron/+/76562821:53
*** raildo has quit IRC21:59
*** tkajinam has joined #openstack-neutron22:00
*** ociuhandu has quit IRC22:11
*** ociuhandu has joined #openstack-neutron22:11
*** gcheresh has quit IRC22:14
*** ociuhandu has quit IRC22:16
*** ociuhandu has joined #openstack-neutron22:22
openstackgerritMerged openstack/neutron stable/rocky: Rehome api tests for propagate_uplink_status  https://review.opendev.org/c/openstack/neutron/+/76441222:22
*** jamesdenton has quit IRC22:40
*** jamesdenton has joined #openstack-neutron22:40
*** macz_ has quit IRC22:51
*** luksky has quit IRC23:20
*** ociuhandu has quit IRC23:29
*** ociuhandu has joined #openstack-neutron23:30
*** ociuhandu has quit IRC23:35

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!