Thursday, 2026-01-22

*** mhen_ is now known as mhen02:44
opendevreviewmelanie witt proposed openstack/nova master: Refactor service user authentication  https://review.opendev.org/c/openstack/nova/+/97426704:01
opendevreviewmelanie witt proposed openstack/nova master: Refactor service user authentication  https://review.opendev.org/c/openstack/nova/+/97426705:04
jkulikmelwitt: if you find some time, we'd appreciate a review on https://review.opendev.org/c/openstack/nova/+/699176 ("Faults from cell DB missing in GET /servers/detail")07:53
opendevreviewEsra Ozkan proposed openstack/nova master: Fix Concurrent VM Live Migrate - Volume Backup Error  https://review.opendev.org/c/openstack/nova/+/97375007:56
opendevreviewTaketani Ryo proposed openstack/nova master: mem-enc: stop using _get_mem_encryption_config() for SEV checks  https://review.opendev.org/c/openstack/nova/+/96797009:22
opendevreviewTaketani Ryo proposed openstack/nova master: mem-enc: refactor memory encryption trait logic for extensiblity  https://review.opendev.org/c/openstack/nova/+/96797109:22
opendevreviewTaketani Ryo proposed openstack/nova master: mem-enc: make RP creation independent of specific encryption models  https://review.opendev.org/c/openstack/nova/+/96797209:22
opendevreviewTaketani Ryo proposed openstack/nova master: mem-enc: refactor _guest_configure_mem_encryption() for extensibility  https://review.opendev.org/c/openstack/nova/+/96797309:22
opendevreviewTaketani Ryo proposed openstack/nova master: mem-enc: adjust requirement checks for mem_encryption guests  https://review.opendev.org/c/openstack/nova/+/96797409:22
opendevreviewTaketani Ryo proposed openstack/nova master: mem-enc: introduce a check between mem_encryption and locked_memory  https://review.opendev.org/c/openstack/nova/+/97130009:22
RomanHros[m]Hello guys, I have the following problem.... (full message at <https://matrix.org/oftc/media/v1/media/download/ARKuyhvh_dMCVP_iifQ_N7pqYUCJHPZCCUZ85LfdunjJgzP7Ip4KsQrfsaTxfiLYItD4jSD9QFMw_X2sz8kxdQ1CecLR3rwQAG1hdHJpeC5vcmcvR3dDTXJQcUt1dXhKQ3hGSVJpcUZXb0hL>)09:24
opendevreviewBalazs Gibizer proposed openstack/nova master: Libvirt event handling without eventlet  https://review.opendev.org/c/openstack/nova/+/96594909:45
opendevreviewBalazs Gibizer proposed openstack/nova master: Run nova-compute in native threading mode  https://review.opendev.org/c/openstack/nova/+/96546709:45
opendevreviewBalazs Gibizer proposed openstack/nova master: DNM:Test with oslo.vmware + compute eventlet removal patches  https://review.opendev.org/c/openstack/nova/+/97346809:45
opendevreviewBalazs Gibizer proposed openstack/nova master: Prevent leaking RPC poller thread between tests  https://review.opendev.org/c/openstack/nova/+/97429909:45
opendevreviewmelanie witt proposed openstack/nova master: TPM: support instances with `deployment` secret security  https://review.opendev.org/c/openstack/nova/+/94202111:40
opendevreviewmelanie witt proposed openstack/nova master: Add vtpm_secret_(uuid|value) to LibvirtLiveMigrateData  https://review.opendev.org/c/openstack/nova/+/95262811:40
opendevreviewmelanie witt proposed openstack/nova master: TPM: prepare to bump service version for live migration  https://review.opendev.org/c/openstack/nova/+/96205111:40
opendevreviewmelanie witt proposed openstack/nova master: TPM: support live migration of `host` secret security  https://review.opendev.org/c/openstack/nova/+/94148311:40
opendevreviewmelanie witt proposed openstack/nova master: TPM: support live migration of `deployment` secret security  https://review.opendev.org/c/openstack/nova/+/92577111:40
opendevreviewmelanie witt proposed openstack/nova master: TPM: test live migration between hosts with different security  https://review.opendev.org/c/openstack/nova/+/95262911:40
opendevreviewmelanie witt proposed openstack/nova master: TPM: add late check for supported TPM secret security  https://review.opendev.org/c/openstack/nova/+/95697511:40
opendevreviewmelanie witt proposed openstack/nova master: TPM: opt-in to new TPM secret security via resize  https://review.opendev.org/c/openstack/nova/+/96205211:40
opendevreviewmelanie witt proposed openstack/nova master: DNM vtpm tempest  https://review.opendev.org/c/openstack/nova/+/95747711:40
opendevreviewMasanori Kuroha proposed openstack/nova master: Copy applied provider config  https://review.opendev.org/c/openstack/nova/+/94830412:35
LarsErikPhello! I've asked this before, but I would really love to have nova >= 31.1.0 in UCA. especially to get this fix: https://bugs.launchpad.net/nova/+bug/209849614:26
LarsErikPwho do we talk to in order to get that going?14:27
dansmithsomeone at canonical I imagine, but not here14:29
LarsErikPright.. hmm14:31
haleybLarsErikP: so you're asking about Epoxy? it's going EOL in April so doubtful to get a point release before that imo. we would typically do an SRU for a single change, but i haven't seen that one reported by a customer15:15
LarsErikPI've tried reach out to jamespage over on #ubuntu-server at least. We have just upgraded from Caracal to Epoxy, and encountered this...15:17
haleybLarsErikP: james no longer works at canonical...15:18
LarsErikPoh...15:18
LarsErikPhe was listed here :P https://documentation.ubuntu.com/project/SRU/reference/exception-OpenStack-Updates/15:18
LarsErikPI guess, don't trust stuff you read on the internet15:19
haleybi think only two of the people in that list still work here15:19
LarsErikPwho? (A)15:19
haleybwell, i don't know who icey is to start15:20
LarsErikPjames is the only one of them, that's actually present on #ubuntu-server right now :P15:21
haleybright, and corey is at mozilla15:24
haleyblike i said, for epoxy there won't be much desire15:25
melwittjkulik: thanks for the reminder, I will try to look soon16:36
opendevreviewLajos Katona proposed openstack/nova master: Use SDK for Neutron networks  https://review.opendev.org/c/openstack/nova/+/92802218:33
Zhan[m]while checking the live migration related stuff, I noticed that there are some features/params that are available on libvirt but not yet available in nova (e.g., additional auto converge params, compressions, etc.). I see recently that the parallel connection feature was added in https://review.opendev.org/c/openstack/nova/+/955784, so I'm thinking about just adding all features that are available on libvirt to nova. do we have plans20:07
Zhan[m]regarding this, or if not then maybe I can pick this up? thanks :D20:07
dansmithjust because it's in libvirt doesn't necessarily mean it should be in nova, and also, we won't generally add things that are in versions of libvirt that are not yet in an enterprise distro20:28
dansmithbest thing would be to identify important missing and relevant things and write a small spec explaining how they would be configured and what benefit they bring20:28
Zhan[m]make sense. in terms of the versions, I'm assuming I should check https://docs.openstack.org/nova/latest/reference/libvirt-distro-support-matrix.html?20:45
dansmithsure, but those are old, so best to look in the code to see what current master is currently targeting (which may be currently still set to the previous release)21:11
opendevreviewMerged openstack/nova master: Prevent leaking RPC poller thread between tests  https://review.opendev.org/c/openstack/nova/+/97429921:25
gmaanmelwitt: commented on vtpm 'deployment' security change ( 942021), am i missing something on testing the no-vtpm to/from vtpm resize ? they should be supported right?21:26
melwittgmaan: cool thanks, I will look. basically all resizes are supported _except_ resizes that would need a change in secret ownership. 'deployment' secret owner is the nova service user, 'host' and 'user' secret owner is the normal user21:29
melwittgmaan: there is a patch at the end of the series which enables resize from TPM 'deployment' => TPM 'host' or 'user' and TPM 'host' or 'user' => TPM 'deployment'. it's just initially not supported bc it is a lot of code and I suspect will be the most difficult part to review21:31
gmaanmelwitt: I think that is ok but the test I pointed in review is asserting that the no-vtpm  <-> 'deployement' is unsupported unless i missed to understand the tetst21:35
melwittgmaan: ok I think the confusion is the difference between "instance has no TPM" and "instance has a TPM but secret_security=None bc the user didn't specify one"21:39
melwittgmaan: if the instance has a TPM and the user did not specify a secret security type (i.e. secret_security=None) then they get the default policy of 'user'21:39
melwittso TPM 'user' <=> TPM 'deployment' is not allowed for now. no TPM <=> TPM 'deployment' is allowed21:41
Zhan[m]dansmith: spot checking some features, the newest one I found (zlib/zstd compression) is in the NEXT_MIN_{LIBVIRT/QEMU}_VERSION of 2025.2, and it is also in Ubuntu Noble and Debian Trixie so I think it's cool. will run some tests to see how effective they are though.21:43
dansmithmelwitt: ohh.. confusing21:43
gmaanmelwitt: ohk, i missed to see 'hw:tpm_version' in extra spec of initial server creation. 21:45
melwittyeah. not sure if test names can be improved to something less confusing. at a minimum I could rewrite the docstrings to say more clearly if a test is about TPM <=> TPM vs no TPM <=> TPM21:45
gmaanyeah, that will be helpful, I think renaming test to test_resize_vtpm_server_secret_security_deployment_* can help (*_server* -> _vtpm_server*)21:47
melwittsure, I can do those. thanks for suggesting21:49
gmaanthanks21:49

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!