Monday, 2015-03-16

*** tmcpeak has joined #openstack-security00:14
*** subscope has quit IRC00:18
*** tkelsey has joined #openstack-security00:42
*** tkelsey has quit IRC00:47
openstackgerritNathaniel Dillon proposed openstack/security-doc: Moving introduction sections 'up' from section_* files to ch_* files  https://review.openstack.org/16452601:18
*** salv-orlando has quit IRC01:22
*** bknudson has quit IRC01:53
*** tmcpeak has quit IRC02:15
*** salv-orlando has joined #openstack-security02:22
*** salv-orlando has quit IRC02:25
*** salv-orlando has joined #openstack-security02:29
*** salv-orlando has quit IRC02:38
*** fffg has quit IRC02:49
*** browne has joined #openstack-security02:56
*** salv-orlando has joined #openstack-security03:12
*** salv-orlando has quit IRC03:16
*** salv-orlando has joined #openstack-security03:26
*** salv-orlando has quit IRC03:29
*** salv-orlando has joined #openstack-security03:32
*** salv-orlando has quit IRC03:32
*** salv-orlando has joined #openstack-security03:36
*** salv-orlando has quit IRC03:38
*** salv-orlando has joined #openstack-security03:41
*** dwyde has joined #openstack-security03:42
*** dwyde has quit IRC03:42
*** salv-orlando has quit IRC03:45
*** bpokorny has joined #openstack-security03:47
*** salv-orlando has joined #openstack-security03:50
*** bpokorny has quit IRC03:51
*** salv-orlando has quit IRC03:57
*** salv-orlando has joined #openstack-security04:19
*** salv-orlando has quit IRC04:24
*** salv-orlando has joined #openstack-security04:27
*** salv-orlando has quit IRC04:28
*** tkelsey has joined #openstack-security04:43
*** tkelsey has quit IRC04:47
openstackgerritPriti Desai proposed openstack/security-doc: Enhancement - Additional ways to configure SSL  https://review.openstack.org/15755005:52
*** salv-orlando has joined #openstack-security06:17
*** salv-orlando has quit IRC06:23
openstackgerritPriti Desai proposed openstack/security-doc: Adding Security Checklist  https://review.openstack.org/15716406:31
*** salv-orlando has joined #openstack-security06:34
*** salv-orlando has quit IRC06:50
*** salv-orlando has joined #openstack-security06:57
*** pcaruana has quit IRC07:14
*** browne has quit IRC07:22
*** salv-orlando has quit IRC07:37
*** tkelsey has joined #openstack-security08:26
*** salv-orlando has joined #openstack-security08:38
*** salv-orl_ has joined #openstack-security08:50
*** salv-orlando has quit IRC08:51
*** salv-orl_ has quit IRC08:57
*** salv-orlando has joined #openstack-security09:02
*** salv-orlando has quit IRC09:05
*** salv-orlando has joined #openstack-security09:22
*** Guest27421 has quit IRC09:25
*** salv-orlando has quit IRC09:25
*** smu__ has joined #openstack-security09:27
*** salv-orlando has joined #openstack-security09:34
*** salv-orlando has quit IRC09:37
*** salv-orlando has joined #openstack-security09:38
*** salv-orlando has quit IRC09:43
*** salv-orlando has joined #openstack-security09:44
*** salv-orlando has quit IRC09:56
*** salv-orl_ has joined #openstack-security09:58
*** salv-orl_ has quit IRC10:08
*** salv-orlando has joined #openstack-security10:13
*** salv-orlando has quit IRC10:17
*** salv-orlando has joined #openstack-security10:22
*** salv-orlando has quit IRC10:29
*** salv-orlando has joined #openstack-security10:33
*** salv-orlando has quit IRC10:36
*** salv-orlando has joined #openstack-security10:51
*** salv-orlando has quit IRC10:56
*** tmcpeak has joined #openstack-security11:39
*** salv-orlando has joined #openstack-security12:07
*** salv-orlando has quit IRC12:14
*** salv-orlando has joined #openstack-security12:21
*** salv-orlando has quit IRC12:22
*** salv-orlando has joined #openstack-security12:22
*** rkgudboy has joined #openstack-security12:28
*** dave-mccowan has quit IRC12:36
*** rohit has joined #openstack-security12:41
*** rkgudboy has quit IRC12:43
*** rkgudboy has joined #openstack-security12:45
*** rohitkashyap has joined #openstack-security12:46
*** rohit has quit IRC12:48
*** openstackgerrit has quit IRC12:50
*** openstackgerrit has joined #openstack-security12:50
*** rkgudboy has quit IRC12:50
*** rohitkashyap has quit IRC12:58
openstackgerritMerged stackforge/anchor: Removes CA Certificte and CRL signing from the default config  https://review.openstack.org/16436613:07
*** dave-mccowan has joined #openstack-security13:10
openstackgerritDoug Chivers proposed stackforge/anchor: Added validation for CA configuration  https://review.openstack.org/16468913:19
*** bknudson has joined #openstack-security13:30
*** smu__ has quit IRC13:33
*** singlethink has joined #openstack-security13:35
*** smu__ has joined #openstack-security13:36
*** smu__ has quit IRC13:42
*** smu__ has joined #openstack-security14:05
*** ljfisher has joined #openstack-security14:19
*** smu__ has quit IRC14:37
tmcpeakljfisher, tkelsey, chair6, nkinder and any others- can you carve out some time today to thoroughly test Bandit and make sure it's stable?14:45
tkelseytmcpeak: ok14:45
tmcpeaksweet, thank you14:45
tmcpeakI'll be working on it too14:45
tmcpeakmore the merrier, we're doing version pin so make sure we get something good up :)14:45
*** smu__ has joined #openstack-security14:46
ljfishertmcpeak, I’ll see but I’m the moveing container leaves in the morning and have other work. Once I am settled in Seattle I’ll be able to help out more.14:47
*** bpb has joined #openstack-security14:49
tmcpeakljfisher: ok cool, no worries14:51
*** sicarie has joined #openstack-security14:53
*** browne has joined #openstack-security14:56
*** dwyde has joined #openstack-security14:58
tmcpeakbrowne, dwyde: guys have a few cycles to carve out today for Bandit stability testing?14:59
dwydetmcpeak: i should have some time in the afternoon15:01
dwydei filed https://bugs.launchpad.net/bandit/+bug/1432012 on Friday15:01
openstackLaunchpad bug 1432012 in Bandit "JSON report ignores #nosec and severity" [Undecided,New]15:01
tmcpeakooooh15:01
tmcpeakdwyde: good one15:01
brownetmcpeak: sure i have some time.  what kind of testing were you thinking?  trying it with other openstack projects?15:02
tmcpeakOpenStack and anything else Python you can get your hands on, edge cases, etc.  Basically anything that can make Bandit work sketchy/ in an unexpected way15:03
browneok sure15:03
tmcpeakbrowne, dwyde: awesome! thanks15:03
tmcpeakdwyde: this is a good bug15:05
*** voodookid has joined #openstack-security15:06
*** smu__ has quit IRC15:06
dwydecool15:08
tmcpeakdwyde: I think this should be fixed today… thoughts?15:10
*** smu__ has joined #openstack-security15:11
ljfisherI would vote for a filter on the results before they get passed to the reports15:13
tmcpeakljfisher: yeah same15:13
tmcpeakI'm going to work on patch for this15:14
tmcpeakI don't want to pin version with this bug15:14
dwydetmcpeak: i think it should be fixed before release15:15
*** bpokorny has joined #openstack-security15:16
tmcpeakcool, I just assigned to myself15:17
tmcpeakI'll work on it now15:17
tmcpeakljfisher, dwyde: approach I'm planning to take is basically in our process function, if the statement contains a skip tag, I'm going to log it but not visit it… sound good?15:22
ljfisherso this would completely ignore those statements vs still analyze them but ignore them when outputting results?15:24
tmcpeakljfisher: yeah15:24
tmcpeakif we're not going to do anything with them, there's no sense in analyzing them15:24
ljfisherSo I could see value in still analyzing them, but not passing those to the reporting functions. Then we could easily add a flag in the future that shows all the nosec marks so we could audit or double check them.15:25
ljfisherBut I don’t know if we mark them as nose in the TestResults15:26
ljfishernose=nosec15:26
tmcpeakhmm ok15:26
tmcpeakso just add like 'nosec' to the context15:26
ljfisherIf not, then what you are suggesting is easiest right no15:26
ljfishernow15:26
ljfisherand would be fine15:26
ljfisherI was hoping the TestResults passed ot the report functions had nosec in the context somehow15:27
ljfisherso it would be easy to write a fuction to filter teh test results and remove those15:27
ljfisherif that is not there I would go with the easiest solution and we can add this idea as a blueprint15:27
tmcpeakyeah, nosec not in context, it actually does a regex match during the text reporting phase to look for #nosec on the issue line15:29
ljfisherok, so that can be done in the future15:29
tmcpeakcool, I'll make the simple fix and add a blueprint15:29
ljfisherbecause it would be good to say “show me all the nosec statements that still have problems”15:29
tmcpeakljfisher: yeah, somebody in the Keystone meeting asked for a requirement for a comment to go with nosec, which I think is a good idea to implement as some point too15:30
tmcpeakthose two improvements can go together later15:30
ljfisheryup15:30
tmcpeakljfisher: what's a good way to get a hold of Paul assuming I don't have the Nebula bat-signal?15:37
ljfisherpaul.mcmillan@nebula.com since I don’t know his irc name15:41
tmcpeakcool15:47
*** singlethink has quit IRC15:54
*** dave-mccowan has quit IRC15:56
*** ljfisher has quit IRC15:56
*** ljfisher has joined #openstack-security16:00
*** openstackgerrit has quit IRC16:11
*** openstackgerrit has joined #openstack-security16:11
openstackgerritbruce-benjamin proposed openstack/security-doc: Added input about volume encryption feature  https://review.openstack.org/16101216:17
*** browne has quit IRC16:18
*** singlethink has joined #openstack-security16:18
openstackgerritDoug Chivers proposed stackforge/anchor: Added validation for CA configuration  https://review.openstack.org/16468916:19
*** ljfisher has quit IRC16:26
*** ljfisher has joined #openstack-security16:30
*** salv-orlando has quit IRC16:31
*** openstackgerrit has quit IRC16:54
*** openstackgerrit has joined #openstack-security16:54
*** browne has joined #openstack-security16:54
*** singlethink has quit IRC16:56
*** singlethink has joined #openstack-security16:59
*** pdesai has joined #openstack-security17:00
pdesaiHi Guys, book sync up time?17:02
elmikoyep17:02
sicarieI think so17:02
elmikodon't see bdpayne though17:02
pdesaiHey elmiko, thanks for the pointer on the fonts, i could get it working on my system17:02
elmikopdesai: awesome! glad to hear17:03
*** singlethink has quit IRC17:04
sicarieWell, should we start without him?17:06
elmikoi guess so, we can just leave any open questions until he arrives or we see him again17:07
pdesaiyeah sounds good, we can upldate him later17:07
*** salv-orlando has joined #openstack-security17:07
sicarieCool, so I don't see any bugs that need triage17:07
sicarie#link https://bugs.launchpad.net/openstack-manuals/+bugs?field.tag=sec-guide17:07
elmikooh wait17:07
elmikohttps://bugs.launchpad.net/openstack-manuals/+bug/143269217:08
openstackLaunchpad bug 1432692 in openstack-manuals "Security Guide should contain meta-data about content that requires regular review" [Undecided,New]17:08
elmikoi added that as my action from last week17:08
sicarieawesome17:08
elmikoi just forgot to tag it as sec-guide17:08
sicarieYeah, there are about 10 more this week because there were a bunch I opened that I'd forgotten to tag as sec-guide :)17:09
elmikohehe17:09
openstackgerritTravis McPeak proposed stackforge/bandit: Moving lineno into generic visitor  https://review.openstack.org/16478617:10
sicarieSo I confirmed it, but I can't set the Importance17:10
pdesai1432692 - a simple approach sound reasonable17:11
elmikopdesai: yea, that's probably enough but i wanted to explore other options just in case17:11
openstackgerritDoug Chivers proposed stackforge/anchor: Added validation for CA configuration  https://review.openstack.org/16468917:12
sicarieIt's probably going to be at the discretion of whoever takes if - if they're familiar with the markup/docbook/etc... tools to be able to do the automation17:12
pdesaithe other option would be ideal and less painful for reviewers but we might reach out to doc core17:13
sicarieYep - I joined the doc meeting last week and was planning on doing it again this week17:13
sicarieI can take that action17:13
pdesaisounds good17:13
*** singlethink has joined #openstack-security17:14
sicarieIt's Wednesday at either 6pm or 7pm PST if anyone is interested (you'll have to confirm the time as I"m not sure with daylight savings)17:14
sicarieSo what do you guys think the importance should be on this?17:15
pdesaii think *high*17:15
elmikoi was gonna say medium, but i don't have objection to high17:15
sicarieI'd say Medium or High - I can ask the doc core to set it when I'm asking about the automated tooling capabilities17:15
pdesaicool17:15
sicarieSo I'll probably go with Medium as we're working right now to get everything updated for L, and I see this really helping after that (obviously it'll be helpful before, but as we only have the Kilo release in between now and then, I think it'll be more helpful after)17:16
sicariepdesai: does that sound reasonable? Or am I missing something?17:17
pdesainope sounds reasonable17:17
sicarieCool, and on that note, Priti did a great new submission on the checklist: https://review.openstack.org/#/c/157164/17:17
pdesaithanks sicarie17:18
sicarieSo reviews on that are always appreciated - I'm betting it's close to or in final state17:18
elmikoyea, i just started to review that earlier17:18
sicarieAwesome17:18
pdesaiyup the idea is to get the checklist done per chapter instead of updating all of the chapters at once17:18
sicarie+1 sounds reasonable17:19
sicarieit's a fair amount of work anyway, so I'm a fan of the incremental updates17:19
pdesaialso, I will open two new bugs (1) confirm that we cover the entire chapter in the checklist (2) also add checklist in the appendix, preferably using some automation17:19
sicarieI have three in-flight where I'm mostly tracking progress through the launchpad bugs17:19
*** bdpayne has joined #openstack-security17:19
sicarieAwesome - so the tooling automation is definitely a good thing to bring up at the doc meeting17:20
sicarieand bdpayne has entered! :)17:20
elmikoagreed, i like the smaller chunks approach17:20
pdesaiyeah, i might join you this week but can not promise17:20
bdpaynearg, sorry guys17:20
bdpayneI got pulled aside when I walked into the door this morning17:20
sicarieFor sure, I can report back17:20
sicariewelcome!17:20
bdpayneheh, hi!17:21
elmikohey =)17:21
pdesaihi bdpyane17:21
sicariebdpayne you are a suspicious character17:21
bdpaynehrm, not sure how to take that17:21
bdpaynedid I miss anything?17:21
bdpaynehopefully you guys started without me?17:21
elmikowe did17:21
elmikowe talked about my action item from last week, and pdesai's checklist reviews17:22
sicarieelmiko's bug: https://bugs.launchpad.net/openstack-manuals/+bug/143269217:22
openstackLaunchpad bug 1432692 in openstack-manuals "Security Guide should contain meta-data about content that requires regular review" [Undecided,Confirmed]17:22
sicariepriti's checklist review link: https://review.openstack.org/#/c/157164/17:22
* bdpayne reads the backlog17:23
* sicarie stops summarizing :)17:23
bdpayneis this the bug that you guys felt should be med or high?17:24
elmikoyea17:24
pdesaiwe talked about it and agreed on med17:24
bdpayneok, set to medium17:24
bdpayneok, I think I'm caught up17:25
bdpayneso good morning everyone :-)17:25
sicariemorning!17:25
pdesaigood morning :)17:25
elmikohehe, morning =)17:25
bdpayneanything else on the agenda that you guys wantted to discuss?17:25
bdpaynemorning-ish for elmiko17:25
elmikowell yea17:25
elmikonothing from me, doc-wise17:26
pdesaii had one, https://review.openstack.org/#/c/157550/17:26
pdesaihave updated images (color and fonts Open Sans :)17:26
bdpayneahh, I see the question there at the bottom17:26
bdpayneI don't know the answer off hand, perhaps sicarie or elmiko doeS?17:27
sicarieI do not, but I added myself as a reviewer, so I'll take a look at what is currently being done throughout17:27
elmikoi'd have to look deeper at the html, i don't know off-hand17:27
bdpayneok cool17:27
pdesaithanks guys17:27
sicarieThat is one thing I noticed is that the pics tend to not scale well17:27
sicarieelmiko: I was looking at restructuring the introductions and was wondering if you had any issue with me pulling a paragraph or two up into the ch_dataprocessing file17:27
elmikoyea, i noticed that as well (re: images)17:28
bdpaynebefore we run... one more quick thing17:28
elmikosicarie: not necessarily17:28
sicarieCool, I'll put somethign up on Gerrit and tag you as a reviewer17:28
*** dave-mccowan has joined #openstack-security17:28
elmikoawesome, that works17:28
bdpayneI wanted to let you guys know that I'm leaving Nebula and, as a result, leaving my OpenStack work as well.17:29
tmcpeakbooooo17:29
elmikooh wow...17:29
pdesaiomg17:29
bdpaynehowever, I've been working with sicarie and he has agreed to take over leadership of the book project17:29
bdpayneI did want to say thanks to everyone for a great time with the book and OSSG and openstack and everything17:30
bdpayneit's been a wonderful time17:30
elmiko+1, it's been a pleasure working with you =)17:30
bdpayneand i'm sure you guys will continue doing amazing things in the months and years to come17:30
bdpaynein fact, I require it... I'll be watching for it :-)17:30
elmikohehe17:30
pdesaisame here, it was great working with you, we will miss you17:30
sicarieagreed - I've said it a few times, but you'll be missed bdpayne; you're always welcome17:30
bdpaynethanks guys17:30
tmcpeakbdpayne: when is your last day?17:31
bdpayneMarch 2517:31
elmikojust in time for k-3 ;)17:31
bdpayneso shoot any questions Re transition and such to me17:31
tmcpeakit's been a good run17:31
bdpaynehowever, right now, I actually need to run to another meeting17:31
elmikotake care, good luck bdpayne !17:31
bdpaynecheers!17:32
pdesaigood luck bdpayne, bye guys17:32
elmikopdesai: later17:32
sicariesee you guys next week!17:32
elmikoyup17:32
pdesaiyup17:33
*** asly has joined #openstack-security17:35
asly¡dios  quien  estará  conectado  en  esa  pejina  que  quiera platicar!>:o17:38
*** pdesai has quit IRC17:38
tmcpeakoh yeah, bdpayne: that reminds me17:38
tmcpeakyou need to pass on your ops17:38
elmikolol, that was timely!17:39
tmcpeakhaha yeah17:39
elmikoit was like they came out to say good bye as well lol17:39
tmcpeaklmao17:40
*** asly1 has joined #openstack-security17:40
tmcpeakmaybe he's taking the spambots with him to his new gig17:41
elmikolol17:41
openstackgerritMerged stackforge/bandit: Moving lineno into generic visitor  https://review.openstack.org/16478617:41
*** asly has quit IRC17:42
*** asly1 has left #openstack-security17:45
*** asly1 has joined #openstack-security17:45
*** salv-orl_ has joined #openstack-security17:57
*** dwyde has quit IRC17:58
*** asly1 has quit IRC18:00
*** salv-orlando has quit IRC18:01
*** pdesai has joined #openstack-security18:03
openstackgerritDave Belcher proposed stackforge/bandit: Fixed nosec flagging  https://review.openstack.org/16480818:10
bdpaynetmcpeak that's a good point Re ops... I'll have to figure out how to do that... you want them?18:11
*** ChanServ sets mode: +o bdpayne18:11
tmcpeakbdpayne: sure!18:16
tmcpeaktha powa!!!!!18:16
bdpaynelol18:16
*** bdpayne sets mode: +o tmcpeak18:16
elmikolol18:16
bdpaynelet's see if that works18:16
tmcpeakmuwahahahahaha18:16
tmcpeakso leave and come back?18:16
bdpayneyeah, that's probably worth trying18:18
*** tmcpeak has left #openstack-security18:18
*** tmcpeak has joined #openstack-security18:18
tmcpeakdoesn't seem like it re-oped me18:19
tmcpeakYou're not a channel operator18:19
tmcpeakwhen I tried to +o myself18:19
bdpaynehmm18:19
bdpaynehow did you try to do it?18:19
bdpaynesomething like ... """/msg chanserv op #openstack-security tmcpeak"""18:20
*** pdesai has quit IRC18:20
tmcpeak(notice) You are not authorized to (de)op tmcpeak on irc://chat.freenode.net:7000/#openstack-security.18:20
bdpaynekk, we should probably sync with infra on this18:20
bdpayneyou have a sec to do that now?18:21
tmcpeaksure18:21
* bdpayne hops over to infra channel18:21
*** pdesai has joined #openstack-security18:28
*** pdesai has quit IRC18:29
tmcpeakbdpayne: that command work?18:31
*** pdesai has joined #openstack-security18:31
bdpayneit said I wasn't authorized to do that ;-)18:31
tmcpeakahh18:31
bdpaynethey are looking into it18:31
bdpayneI may need more perms18:32
tmcpeakok cool18:35
*** dwyde has joined #openstack-security18:40
bdpaynetmcpeak you should be gtg18:42
*** ChanServ sets mode: +o tmcpeak18:43
tmcpeakwoot18:43
bdpaynetmcpeak, in case you want to add anyone, this is the command: """/msg chanserv access #openstack-security add whoever_you_want +Aefortv"""18:43
tmcpeakbdpayne: awesome, thanks for sorting it all out18:43
tmcpeakwas planning to follow the action and got somewhat distracted :)18:44
bdpayneyou can also do stuff like """/msg chanserv access #openstack-security list""" to view the current people on the list18:44
tmcpeakI guess the rest of these folks are general #openstack ops?18:44
bdpayneyeah, from the infra team18:45
bdpaynethey actually know that they are doing18:45
bdpayne;-)18:45
tmcpeak;)18:45
*** ChanServ sets mode: +o tmcpeak18:46
*** ChanServ sets mode: -o tmcpeak18:46
tmcpeaksweet18:46
tmcpeakthanks bdpayne18:47
bdpaynenp18:47
openstackgerritDoug Chivers proposed stackforge/anchor: Added validation for CA configuration  https://review.openstack.org/16468918:59
openstackgerritDave Belcher proposed stackforge/bandit: Fixed nosec flagging  https://review.openstack.org/16480819:03
openstackgerritDave Belcher proposed stackforge/bandit: Fixed nosec flagging  https://review.openstack.org/16480819:11
*** ljfisher has left #openstack-security19:18
*** ljfisher has joined #openstack-security19:19
openstackgerritMerged stackforge/bandit: Fixed nosec flagging  https://review.openstack.org/16480819:23
openstackgerritMerged openstack/security-doc: Adding Security Checklist  https://review.openstack.org/15716419:30
*** sicarie has left #openstack-security19:40
*** tmcpeak has quit IRC19:46
dwydebandit folks: I just filed some bugs at https://bugs.launchpad.net/bandit/19:49
dwydeplease let me know if anything is unclear19:49
*** tmcpeak has joined #openstack-security19:52
*** salv-orl_ has quit IRC19:55
tmcpeakdwyde: you're finding some good stuff ;)20:07
dwydethanks tmcpeak :-)20:11
*** pdesai1 has joined #openstack-security20:28
*** pdesai2 has joined #openstack-security20:28
*** pdesai has quit IRC20:31
*** pdesai1 has quit IRC20:32
*** salv-orlando has joined #openstack-security20:35
*** pdesai2 has quit IRC21:02
*** pdesai has joined #openstack-security21:03
*** pdesai has quit IRC21:04
*** pdesai1 has joined #openstack-security21:10
*** ljfisher has quit IRC21:16
*** browne has quit IRC21:16
*** pdesai1 has quit IRC21:20
*** pdesai has joined #openstack-security21:20
*** browne has joined #openstack-security21:22
*** browne has quit IRC21:23
*** browne has joined #openstack-security21:28
*** browne_ has joined #openstack-security21:44
*** browne_ has quit IRC21:44
*** browne1 has joined #openstack-security21:44
*** browne1 has quit IRC21:44
*** browne_ has joined #openstack-security21:47
*** browne has quit IRC21:47
*** singlethink has quit IRC21:59
*** tkelsey has quit IRC22:03
*** elo1 has joined #openstack-security22:05
openstackgerritNathaniel Dillon proposed openstack/security-doc: Adding new introudctions for chapters missing one  https://review.openstack.org/16488322:06
*** elo2 has joined #openstack-security22:09
*** elo1 has quit IRC22:13
*** browne_ has quit IRC22:16
*** browne has joined #openstack-security22:18
*** bpb has quit IRC22:18
*** bpokorny_ has joined #openstack-security22:20
openstackgerritNathaniel Dillon proposed openstack/security-doc: Adding new introudctions for chapters missing one  https://review.openstack.org/16488322:21
*** bknudson has quit IRC22:22
*** bpokorny has quit IRC22:23
*** dave-mccowan has quit IRC22:24
*** salv-orl_ has joined #openstack-security22:37
*** dwyde has quit IRC22:38
*** salv-orlando has quit IRC22:39
*** elo2 has quit IRC22:41
*** dave-mccowan has joined #openstack-security22:50
*** pdesai has quit IRC22:58
*** voodookid has quit IRC23:00
*** dave-mccowan has quit IRC23:09
*** salv-orl_ has quit IRC23:23
*** salv-orlando has joined #openstack-security23:31
*** salv-orlando has quit IRC23:35
*** bknudson has joined #openstack-security23:55

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!