Thursday, 2025-08-07

*** auniyal5 is now known as auniyal01:27
noonedeadpunksean-k-mooney: but it's not yet feature freeze for 2025.2 if I read the schedule right? and this is is quite tiny, easy, so maybe it's the right place? ;)05:51
sean-k-mooneynoonedeadpunk: we are well pass the spec approval freeze so this is something for next cycle09:58
sean-k-mooneynoonedeadpunk: the spec freeze was milestone 209:58
noonedeadpunkah, right, true10:02
noonedeadpunkI was looking for feature freeze10:02
sean-k-mooneythat does not mean it cant merge early in 2026.1 as in late september/october10:03
noonedeadpunkit's kinda sad though, as this is pretty much the only way so far to get live migrations working reliable until gnutls is patched and with memory being encrypted10:03
noonedeadpunkor well... use tunnels...10:03
sean-k-mooneywell its not actully fixing the issue10:03
noonedeadpunkyeah, true10:04
sean-k-mooneyit just make it less likely as each coonenction gets it own rekey timer10:04
sean-k-mooneythe workaroudn for now is to just disable tls3 with aes10:04
sean-k-mooneyvia the crypto polices10:04
noonedeadpunkwhich you can;'t do outside of EL10:04
sean-k-mooneyi.e. disable the specific policy that has the issue10:04
sean-k-mooneyEL?10:05
noonedeadpunk*RHEL10:05
sean-k-mooneyoh well that not a rhel thing as far as im aware10:05
noonedeadpunkas I tried to place a gnutls config on ubuntu and qemu just ignores it10:05
noonedeadpunkso it's not a thing on debian/ubuntu10:05
noonedeadpunkMaybe it does work on centos/rocky - dunno10:05
sean-k-mooneyi suspect it might be but uses a diffent location10:06
noonedeadpunkUbuntu just dropped policy package with comment it never-ever worked on ubuntu 24.04 to start with10:06
sean-k-mooneyhttps://wiki.debian.org/CryptoPolicy10:06
noonedeadpunkhttps://bugs.launchpad.net/ubuntu/+source/crypto-policies/+bug/206912910:06
sean-k-mooneyso apprently it s a fedora thing?10:06
sean-k-mooneyhttps://fedoraproject.org/wiki/Changes/CryptoPolicy10:07
noonedeadpunkwell, I think anyway it does not work on debian/ubuntu10:07
sean-k-mooneyform 2014 that they were loooking to upstream10:07
noonedeadpunk"crypto-policies is not supported on Ubuntu: it requires deep integration with the packages and their configurations. This integration doesn't exist and is unlikely to ever exist outside of redhat-based distributions"10:07
sean-k-mooneyhttps://manpages.ubuntu.com/manpages/jammy/en/man8/update-crypto-policies.8.html10:08
sean-k-mooneywell the pakcage for doing it is in ubuntu10:08
noonedeadpunkSo 2069129 claims it never worked despoite being packaged10:08
noonedeadpunkwhich is the reason it's dropped10:08
sean-k-mooneyya so this is in rhel to make fips work10:08
sean-k-mooneyi know cannonicals fipes supprot is a paied extra10:09
noonedeadpunkanyway, I didn't find the way so far to make ubuntu to use POLY130510:09
sean-k-mooneyack10:09
noonedeadpunkeven though I blacklisted AES in gnutls config and gnutls output was like that: https://paste.openstack.org/show/b2VjO9rv4976Y4prCtt9/10:10
noonedeadpunkseems that qemu was still doing what it wanted10:10
sean-k-mooneyyou using kolla right10:11
noonedeadpunkosa10:11
sean-k-mooneyoh so not in a contianer then10:11
sean-k-mooneyi was going to ask if you updated it in the contianer10:11
noonedeadpunkyeah, it's just on the node10:12
sean-k-mooneyor suggest you try the centos libvirt contianer to see if that woudl work around it10:12
noonedeadpunkwell... I probably could do that....10:12
sean-k-mooneyits possible that htey staic link it or something like that but debian is normlaly all in on dynmaic linking everything10:12
sean-k-mooneyin your case i think tunnled migration or using just tcp if you are allow too is the best approch unless you want to carry that patch downstream until its landed upstream10:14
sean-k-mooneystill to fix iti properly you will need the qemu fix when that is ready10:14
noonedeadpunkwe have local drives as nova drives, which we expect to live migrate as well, which does not work with the trunnel;10:15
opendevreviewStephen Finucane proposed openstack/nova master: api: Add response body schemas for servers APIs (5/6)  https://review.opendev.org/c/openstack/nova/+/95623910:15
opendevreviewStephen Finucane proposed openstack/nova master: api: Add response body schemas for servers APIs (6/6)  https://review.opendev.org/c/openstack/nova/+/95624010:15
opendevreviewStephen Finucane proposed openstack/nova master: api: Add response body schemas for server shares APIs  https://review.opendev.org/c/openstack/nova/+/95626610:15
opendevreviewStephen Finucane proposed openstack/nova master: tests: Invert validation check  https://review.opendev.org/c/openstack/nova/+/95624110:15
noonedeadpunkanyway10:15
opendevreviewDmitriy Rabotyagov proposed openstack/nova-specs master: Add 2026.1 specs folder  https://review.opendev.org/c/openstack/nova-specs/+/95676710:18
opendevreviewDmitriy Rabotyagov proposed openstack/nova-specs master: Propose enabling parallel live migrations for libvirt  https://review.opendev.org/c/openstack/nova-specs/+/95578310:19
opendevreviewMerged openstack/nova master: Revert^2 "Support glance's new location API"  https://review.opendev.org/c/openstack/nova/+/95062310:35
opendevreviewTakashi Kajinami proposed openstack/nova master: Migrate MEM_ENCRYPTION_CONTEXT from root provider  https://review.opendev.org/c/openstack/nova/+/92181410:45
opendevreviewTakashi Kajinami proposed openstack/nova master: Detect AMD SEV-ES support  https://review.opendev.org/c/openstack/nova/+/92568510:45
opendevreviewTakashi Kajinami proposed openstack/nova master: Add hw_mem_encryption_model image property  https://review.opendev.org/c/openstack/nova/+/92770610:45
opendevreviewTakashi Kajinami proposed openstack/nova master: libvirt: Launch instances with SEV-ES memory encryption  https://review.opendev.org/c/openstack/nova/+/92610610:45
tkajinamUggla, I wonder if I can ask for your help to move this series forward ^^^  I've been receiving emails regularly to ask progress about this work (from different parties, which is interesting) and I'm hoping that I can move it forward (getting it merged is the best but I at least need some feedback)10:46
UgglaHi tkajinam, I'll do my best to try to review it and warn cores for reviews, as this is an important feature.10:50
tkajinamUggla, thanks !10:51
sean-k-mooneyoh the sev work10:56
sean-k-mooneyya it woudl be good to compelte that this cycle givein it missed last cycle due to review bandwith10:56
Ugglasean-k-mooney I agree10:57
tkajinamsupport for sev-sep, which is more sophisticated version of sev, is reaching downstream distros, and tdx support was merged to the latest kernel. so I expect more people may be interested in using memory encryption features.11:11
tkajinamand this could be a base work to extend current sev support, to support more cpu features11:11
opendevreviewCallum Dickinson proposed openstack/nova master: Fix image ID in libvirt metadata when unshelving  https://review.opendev.org/c/openstack/nova/+/94297311:28
opendevreviewCallum Dickinson proposed openstack/nova master: Add more flavor metadata to libvirt guest XML  https://review.opendev.org/c/openstack/nova/+/94297411:28
opendevreviewCallum Dickinson proposed openstack/nova master: Add image meta to libvirt XML metadata  https://review.opendev.org/c/openstack/nova/+/94276611:28
opendevreviewCallum Dickinson proposed openstack/nova master: Add more flavor metadata to libvirt guest XML  https://review.opendev.org/c/openstack/nova/+/94297412:14
opendevreviewCallum Dickinson proposed openstack/nova master: Add image meta to libvirt XML metadata  https://review.opendev.org/c/openstack/nova/+/94276612:14
opendevreviewJohannes Beisiegel proposed openstack/nova master: fix: ensure to remove cinder attachments on delete of building instance  https://review.opendev.org/c/openstack/nova/+/95678914:01
opendevreviewJohannes Beisiegel proposed openstack/nova master: fix: ensure to remove cinder attachments on delete of building instance  https://review.opendev.org/c/openstack/nova/+/95678914:02
*** ykarel_ is now known as ykarel15:02
opendevreviewRajesh Tailor proposed openstack/nova master: Add support for using cell-name in cell_v2 commands  https://review.opendev.org/c/openstack/nova/+/95446017:28

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!