Thursday, 2024-01-04

opendevreviewGhanshyam proposed openstack/os-vif master: Update python classifier in setup.cfg  https://review.opendev.org/c/openstack/os-vif/+/90461303:15
opendevreviewRodolfo Alonso proposed openstack/neutron master: WIP == DNM == [OVN] Implement OVN agent metadata extension  https://review.opendev.org/c/openstack/neutron/+/89823808:34
opendevreviewDarin Chakalov proposed openstack/python-neutronclient master: Implement address groups support in python-neutronclient  https://review.opendev.org/c/openstack/python-neutronclient/+/90470309:35
opendevreviewdongdong proposed openstack/neutron-fwaas master: Set the correct firewall group status when the router is updated  https://review.opendev.org/c/openstack/neutron-fwaas/+/90431709:43
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: Add router check, subnet attached gateway IP update or deletion  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/90471010:06
ralonsohfolks, if you have stable core permissions, please check https://review.opendev.org/c/openstack/neutron/+/90449810:20
opendevreviewRodolfo Alonso proposed openstack/neutron master: Forbid the subnet gateway IP if a router interface is attached  https://review.opendev.org/c/openstack/neutron/+/90471310:26
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: Add router check, subnet attached gateway IP update or deletion  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/90471010:26
opendevreviewRodolfo Alonso proposed openstack/neutron master: Forbid the subnet gateway IP deletion if a router interface is attached  https://review.opendev.org/c/openstack/neutron/+/90471310:26
opendevreviewMerged openstack/neutron stable/2023.1: Metadata: handle process exceptions  https://review.opendev.org/c/openstack/neutron/+/89377510:44
opendevreviewRodolfo Alonso proposed openstack/neutron master: Forbid the subnet gateway IP deletion if a router interface is attached  https://review.opendev.org/c/openstack/neutron/+/90471311:31
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2023.2: Handle creation of Port_Binding with chassis set  https://review.opendev.org/c/openstack/neutron/+/90471511:36
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2023.1: Handle creation of Port_Binding with chassis set  https://review.opendev.org/c/openstack/neutron/+/90471611:40
andreykurilinralonsoh: hi! Do you have a couple of minutes to discuss neutronclient state? Context: https://review.opendev.org/c/openstack/python-neutronclient/+/904703 11:48
ralonsohandreykurilin, sure11:56
ralonsohhttps://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/message/KTTBW2DNGELWHKOXMMBAQYTKKQDX2VNF/11:57
andreykurilinralonsoh: yup, I saw this and contribution section of docs also notes the same https://opendev.org/openstack/python-neutronclient/src/branch/master/doc/source/index.rst#contributor-guide12:01
andreykurilinAt the same time https://review.opendev.org/c/openstack/python-neutronclient/+/904703 does not touch neutron CLI, it extends neutron python bindings which is not deprecated yet12:01
ralonsohwhat project is using it?12:02
andreykurilinHorizon for example :)12:02
ralonsohandreykurilin, but is this feature needed by another feature in Horizon?12:05
ralonsohwhere are you planning to use this?12:05
andreykurilinDarin, the author of the change, is working on fixing Horizon to display security groups in case of address group usage. Currently, the ‘target’ of sec group is displayed there as 0.0.0.0/0 for all address groups which is quite misleading12:07
ralonsohandreykurilin, please, talk to Lajos Katona (the author of https://review.opendev.org/c/openstack/horizon/+/891205) in order to know if that could be supported "as-is" with the OSC12:09
ralonsohI'll add him to the neutronclient patch12:09
ralonsohwe are moving all bindings to OSC and moving the project clients to OSC12:10
ralonsohadding new features to neutronclient is going in the opposite direction12:10
andreykurilinoh, this sounds promising12:11
andreykurilinthanks12:11
ralonsohin any case, please raise this question in the next neutron meeting12:11
ralonsohone sec12:11
ralonsohI'll add this topic to the on-deman agenda12:11
ralonsohdone --> https://wiki.openstack.org/wiki/Network/Meetings#On_Demand_Agenda12:13
andreykurilinThank you12:14
andreykurilinralonsoh: can you point me the place where I can find the schedule of meetings?12:15
andreykurilinhttps://meetings.opendev.org/#Neutron_Team_Meeting12:15
ralonsohhttps://meetings.opendev.org/#Neutron_Team_Meeting12:15
ralonsohyes, right12:15
andreykurilinOk, I’ll be there. Thanks for your input!12:16
andreykurilinralonsoh, one more question: Who is the better to bother about neutron policies stuff (inner implementation neutron-server -> neutron-lib)? :)12:18
ralonsohany neutron core, what's the question?12:19
andreykurilinWe have kolla-ansible deployment and use some custom neutron policies. Everything works great except logging. Neutron-server logs include a warning message `Policies <list-of-neutron’s-overriden-policies> reference a rule that is not defined`. Further debugging showed that this message comes from neutron-lib code. As far as I understand, the problem is that neutron and neutron-lib code read the same policies.yaml file (as 12:25
andreykurilina part of neutron-server). neutron-lib finds overridden rules of neutron-server and, as it knows nothing about them, it complains about them.12:25
andreykurilinneutron is of 2023.1 release12:30
andreykurilinhttps://github.com/openstack/oslo.policy/blob/master/oslo_policy/policy.py#L703C12-L705 the origin of the warning12:35
andreykurilinAnd simplified snippet for reproducing the issue https://xsnippet.org/H3jpRsCi12:44
opendevreviewMerged openstack/neutron master: Handle creation of Port_Binding with chassis set  https://review.opendev.org/c/openstack/neutron/+/90379613:21
ralonsohandreykurilin, sorry, I don't understand the problem you have. neutron-lib is just a module used by Neutron (and many other projects)14:25
ralonsohn-lib is not checking anything, the Neutron server is14:25
ralonsohwhat is the problem you have in your env?14:25
ralonsohandreykurilin, ok, maybe the problem, as you pointed out, is the duplication of this variable *ENFORCER14:31
ralonsohplease, can you reproduce that with DEBUG logs and send the output?14:31
ralonsohand the policies yaml14:31
andreykurilinralonsoh: When neutron-server starts, it initializes neutron-lib’s policy enforcer at some stages. As far as I remember (I was debugging this several months ago, so I could be wrong), it is because neutron-server uses context object from n-lib, and n-lib enforcer is used to check whether the requester is admin or not. As the neutron-lib enforcer is initialised as a part of the neutron-server process, it uses the same 14:41
andreykurilinconfig file and the same policy.yaml file. N-lib enforcer finds neutron-server rules inside of policy.yaml (as it is shared), those rules may re-use neutron-server’s default rules, but as neutron-lib knows nothing about neutron-server default rules, it raises a warning log message. Everything works (default and overridden rules), but this warning message is quite misleading14:41
andreykurilinpolicy.yaml https://xsnippet.org/lGseu215 and warning message https://xsnippet.org/Ku6nJ9Pi14:47
ralonsohandreykurilin, ok, I'll open a LP bug right now14:54
mtomaskahello folks. Is it ok to merge this patch. I need it for some downstream work https://review.opendev.org/c/openstack/neutron/+/903572. thank you!15:31
andreykurilinralonsoh: so this sounds like a bug for you, good. Thank you! :)15:41
ralonsohI'm testing it now15:41
ralonsohandreykurilin, what is SystemReader? we have these roles: member, admin, service and adsvc in Neutron15:46
ralonsohbut not SystemReader15:46
ralonsohand reader15:46
ralonsohso 5 roles15:46
andreykurilinralonsoh: This is our custom role. As it is role (not rule), a ‘dynamic’ thing, oslo.policy does not validate it as a part of initialisation, it is used only to comparison with the data from the token as far as I know15:51
ralonsohoslo policy is sending that to the "undefined_checks" variable15:52
ralonsohin oslo_policy.policy.Enforcer.check_rules15:53
ralonsohso that's what is happening15:53
andreykurilinit does it only for n-lib. Neutron-server enforcer passes it15:53
andreykurilin* passes it during my testing :)15:54
andreykurilinhttps://github.com/openstack/oslo.policy/blob/master/oslo_policy/policy.py#L818-L821 _undefined_check validates only RuleCheck. RoleCheck does not inherit RuleCheck https://github.com/openstack/oslo.policy/blob/master/oslo_policy/_checks.py#L254-L282 so it should be skipped as a part of undefined_check15:56
ralonsohandreykurilin, actually it is failing in "rule:admin_only"16:04
ralonsohbecause this rule does not exist when the n-lib enforcer is loaded16:04
andreykurilinralonsoh: I’m not Oslo-policy expert, but I think n-lib enforcer is loading only with 3 rules https://github.com/openstack/neutron-lib/blob/master/neutron_lib/policy/_engine.py#L33-L46 and ‘rule:admin_only’ is never can be visible there until it is added to policy.yaml16:07
ralonsohyes, these are the base rules16:08
ralonsohbut I don't know why are we loading the enforcer at this point16:09
ralonsohthis is coming from https://review.opendev.org/c/openstack/neutron-lib/+/88719116:09
ralonsohtomorrow I'll ping slaweq for that, but I'll continue debugging it today evening16:10
andreykurilinralonsoh: thank you so much. Please ping me if you need any additional info, help for debugging, etc.16:12
opendevreviewSebastian Lohff proposed openstack/neutron master: Prevent ext subnet GW IP being allocated as FIPs  https://review.opendev.org/c/openstack/neutron/+/90478318:11
jamesdenton__Hi folks. Question for OVN folks... I've got 2 Antelope environments exhibiting an issue where (at least) arp and icmp traffic is being filtered/dropped when egressing an ovnmeta namespace. The network is a VLAN provider network, for what it's worth. The ARP cache in the ovnmeta namespace is populated when other hosts in the VLAN send GARPs, but when those age out, any subsequent ARP from the tap interface in the namespace is not seen21:01
jamesdenton__ outside of the namespace (ie. on the physical interface connected to br-ex). Hopefully that makes sense...21:01
opendevreviewMiguel Lavalle proposed openstack/neutron master: Router flavors and service type for OVN  https://review.opendev.org/c/openstack/neutron/+/88398823:52

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!