Tuesday, 2024-10-01

gouthamrtc-members: gentle reminder that we're meeting via Zoom today, and taking notes in this channel: https://wiki.openstack.org/wiki/Meetings/TechnicalCommittee#Agenda17:03
gouthamrin ~57 minutes17:03
bauzasoh, zoom17:03
bauzasokay, fair enough17:03
* bauzas starts preparing the dinner now then :)17:03
gouthamr:) 17:06
cardoeApologies I’m on PTO and don’t have a computer to Zoom with today.17:09
gouthamrcardoe: ack np; thanks for letting us know..17:10
fungitc meeting is going to be my 4th straight hour on a headset, so no guarantees my battery will hold out17:18
fungi#brutalmeetingtuesdays17:18
spotz[m]bauzas: you can camera off and eat, I do a good portion of my meetings like that cause back to back to back17:32
fungii don't even bother to plug in a camera17:39
noonedeadpunkI always have a problem of finding the link :D17:59
fungiin the wiki above the agenda items17:59
gouthamr#startmeeting tc18:00
opendevmeetMeeting started Tue Oct  1 18:00:32 2024 UTC and is due to finish in 60 minutes.  The chair is gouthamr. Information about MeetBot at http://wiki.debian.org/MeetBot.18:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.18:00
opendevmeetThe meeting name has been set to 'tc'18:00
spotz[m]link link link!!!:)18:00
noonedeadpunk#link https://us06web.zoom.us/j/87108541765?pwd=emlXVXg4QUxrUTlLNDZ2TTllWUM3Zz0918:01
gouthamr#info Today's meeting is being held primarily via video call. Action items and meeting minutes will be documented in IRC but for a full replay of the meeting, please visit the OpenStack TC youtube channel, where the recording will be uploaded soon.18:01
gouthamr#link https://www.youtube.com/channel/UCBuGwBXOmWHydSE09RM84wQ18:01
gouthamrWelcome to the weekly meeting of the OpenStack Technical Committee. A reminder that this meeting is held under the OpenInfra Code of Conduct available at https://openinfra.dev/legal/code-of-conduct.18:01
gouthamrToday's meeting agenda can be found at https://wiki.openstack.org/wiki/Meetings/TechnicalCommittee18:01
gouthamr#topic Roll Call18:01
gmanno/18:01
noonedeadpunko/18:01
bauzas\o18:02
gtemao/18:02
JayFo/18:02
gouthamrnoted absence: f r i c k l e r, c a r d o e18:04
spotz[m]o/18:04
gouthamrcourtesy ping: slaweq 18:04
slaweqgouthamr: sorry but I don't feel well today and will not be at the meeting 18:05
slaweqI added my absence in the wiki page 18:05
spotz[m]Feel better!18:05
slaweqThx18:06
gouthamrah sorry about that; i reloaded the page now slaweq 18:06
gouthamrhope you feel better soon18:06
gouthamr#topic Last Week's AIs18:06
gouthamrStart ML discussion about Watcher’s leaderless situation (gouthamr)18:06
gouthamr#link https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/thread/3DRYZFDPVCZ45TOULOZ4R7K6BUOIHLU2/ ([tc][watcher] No leaders for project team, heading to retirement)18:06
gouthamri was proposing waiting for a week before beginning the process to retire the project18:08
gouthamrwe need some more push this week18:09
gouthamrbauzas: you could type out what you were trying to say 18:10
bauzasmeh18:10
bauzasI was saying that maybe we should use the DPL support for this cylce18:11
gmann++ 18:11
gouthamr#action gouthamr will respond to the mail thread and ask for an update this week18:11
gouthamrnoted bauzas 18:11
gouthamrmoving on to the next AI:18:11
gouthamrPropose marking Kuryr-related projects inactive (gmann)18:11
gouthamr#link https://review.opendev.org/c/openstack/governance/+/929698 (Mark kuryr-kubernetes and kuryr-tempest-plugin Inactive)18:12
gouthamr^ we had to stop the release for these projects in 2024.2 18:13
gouthamrgmann says we should have marked these projects inactive while we were figuring out retirement; we're backfilling this patch so our stance is clear18:14
gouthamrplease review this patch so we can merge this week ^ 18:14
gouthamrnext AI:18:14
gouthamrCoordinate a cross-project session at PTG to discuss translating documentation and improving accessibility for non-English-speaking users (gouthamr)18:14
gouthamr#link https://etherpad.opendev.org/p/oct2024-ptg-os-tc (OpenStack TC PTG Planning Etherpad)18:15
gouthamrseongsoo will be leading a TC PTG discussion 18:16
gouthamrgouthamr will be sharing a finer schedule this week18:16
gouthamrnoonedeadpunk says there's confusion about the state of translations right now; there was someone that added horizon translations months ago; however, it wasn't proposed by the tooling18:17
gouthamrnext AI: Monitor Zun and Kuryr release issues18:19
gouthamrkudos to noonedeadpunk to helping Zun fix their CI18:19
gouthamr#link https://review.opendev.org/c/openstack/releases/+/930554 (Do not release Kuryr in Dalmatian)18:20
gouthamrthe release team seems to be geared to have a smooth release tomorrow:18:21
gouthamr#link https://review.opendev.org/c/openstack/releases/+/930752 (2024.2 Dalmatian final releases for cycle-with-rc projects)18:21
gouthamr#topic Meeting time18:22
gouthamr 18:22
gouthamr#link https://framadate.org/openstacktc-25-1 (OpenStack TC Weekly Meeting times poll)18:23
gouthamr^ there were three contenders for the meeting time18:23
gouthamrbut for any of those slots, only 6 of us could actually make it18:23
gouthamrthree others were "Maybe" for this slot: 1800 UTC on Tuesdays18:23
gouthamrthe two other slots had at least one of us respond with a hard No18:24
spotz[m]Maybe we wait and ask again later when Slaweq is here?18:24
gouthamroh, why? 18:24
gouthamrhe could be busy between 1700 and 1900 UTC on Thursdays18:25
gouthamrwe've had a week to look at these results; and they've been visible to everyone :) 18:26
gouthamr#agreed we keep the existing meeting time18:26
gouthamr#topic TC Election Liaison18:27
spotz[m]Needs to be someone from this cycle or not re-running18:28
gouthamryes18:29
gouthamrwe have four TC members who aren't up for election 18:29
bauzasI can help to be the TC liaison if needed18:29
gouthamrthank you bauzas 18:30
gouthamr#topic A check on gate health18:31
gouthamr#link https://bugs.launchpad.net/devstack/+bug/208261718:31
gouthamrdevstack ceph jobs are affected by this bug a lot these days18:31
gouthamrstill don't know the root cause here ^18:31
fungiironic noticed keystone has started breaking on postgresql: https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/message/MVHR5WZFEDOZA4ESBN5764EVP67GKOS5/18:33
fungi#link ironic noticed keystone has started breaking on postgresql: https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/message/MVHR5WZFEDOZA4ESBN5764EVP67GKOS5/18:33
fungisorry, forgot to link it the first time18:33
gouthamrthanks fungi 18:33
gmanngouthamr: can you hear us?18:34
gouthamrgmann: nope18:34
gmannwe can hear you18:34
gouthamri thought i was talking to myself18:34
* gouthamr fixes the broken sound18:36
gmann#link https://review.opendev.org/c/openstack/grenade/+/93050718:36
gmann#link https://bugs.launchpad.net/python-openstackclient/+bug/208060018:37
gouthamr^ this fix has merged in master; new OSC release is necessary along with an upper-constraint bump18:38
gouthamrwe're going to do this after the coordinated 2024.2 release tomorrow18:39
gouthamrthe UC update patch will execute -cross jobs to test if projects are okay with the OSC changes coming with the bump18:39
gouthamrTheJulia's post to the ML regarding keystone's breakage on postgres isn't a LP bug yet (please correct me if one was reported)18:40
JayFIt's not a bug as nobody officially supports postgres anymore aiui18:41
JayFat least, I wouldn't personally file it as a bug18:41
gouthamrnoonedeadpunk spotted nodepool's responsiveness has increased18:41
JayFthe job was intended (from an Ironic POV) to be a canary so we could tell operators when things broke18:41
spotz[m]Maybe a won't fix and explanation?18:42
funginoonedeadpunk: yes, rackspace's new "flex" environment is more than twice as fast on half the number of vcpus18:42
fungifor many of our jobs anyway18:42
gouthamrfungi: very nice 18:42
JayFThere seems to be no interest in the Ironic community in doing any effort on these jobs other than removing them, unless someone asks for it :)18:42
fungilonger term we hope to slowly swap out classic rackspace nodes for flex, as they bring more regions online18:42
gouthamrJayF: manila folks maintain postgres jobs too; because some large deployments use it18:42
gouthamrthey're non-voting for the reason you mentioned18:43
JayFI invite them to help reintroduce official postgres support into openstack; until then it's not really a priority IMO18:43
gouthamr+118:43
gouthamranything else for $topic?18:43
gouthamr#topic TC Tracker18:43
noonedeadpunkfungi: frankly - I was o_O on tests time and was thinking for real that we broke smth to a point that smth is simply not executed18:43
gouthamr#link https://etherpad.opendev.org/p/tc-2024.2-tracker (Technical Committee activity tracker - 2024.2)18:43
gouthamr#link https://etherpad.opendev.org/p/tc-2025.1-tracker (Technical Committee activity tracker - 2025.1)18:44
gouthamr^ you'll notice goal tracking as well here; just something we can try for this release18:45
gouthamrwe've been pretty good with these trackers18:46
gouthamrplease pull in anything you were finishing up for 2024.2 into the 2025.1 etherpad18:47
gouthamrlets switch to Open Discussion18:47
gouthamr#topic Open Discussion18:47
gmann++ good tracking too gouthamr 18:47
noonedeadpunk#link https://review.opendev.org/c/openstack/governance/+/92796218:47
gouthamr^ we're asking some questions on this change; alongside the swift PTL appointment change18:49
bauzas(sorry folks, trying to fix my pipewire issue on my F40 laptop)18:49
gouthamrhoping we can get axel and timburke responding here18:49
* bauzas gets hit by https://bugzilla.redhat.com/show_bug.cgi?id=223258418:49
gouthamr#link https://review.opendev.org/c/openstack/governance/+/928881 (Appoint Tim Burke as PTL for Swift)18:50
gouthamrgmann notes that folks must be more responsive on these governance changes to prove to the TC that they're  responsible and willing to engage with the TC18:51
gouthamrbauzas is asking about PTG planning18:53
gouthamrhe suggests asking for who's interested in these topics to help with the scheduling18:55
gouthamr(and noting their timezones) 18:55
fungithe oceanbase topic is proposed by people in apac timezones, i think18:55
spotz[m]And I think I grabbed first slot on Monday for D&I18:59
gouthamr+1 on both points18:59
gouthamr#action gouthamr will share this etherpad on the ML asking interested folks to vote (with their nicks) on the topics19:00
fungiwe could maybe move (some of?) the inclusive terminology discussion into the d&i wg slot19:00
gmannor its good topic for TC+leader interaction sessions19:01
gouthamrfungi: agreed19:01
gouthamrgmann: yes; we can re-hash that discussion in a time boxed manner if it happens after the D&I discussion19:01
bauzasI guess we need to end the meeting here ? :)19:04
gmannyeah19:04
bauzas#endmeeting19:05
opendevmeetMeeting ended Tue Oct  1 19:05:22 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)19:05
opendevmeetMinutes:        https://meetings.opendev.org/meetings/tc/2024/tc.2024-10-01-18.00.html19:05
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/tc/2024/tc.2024-10-01-18.00.txt19:05
opendevmeetLog:            https://meetings.opendev.org/meetings/tc/2024/tc.2024-10-01-18.00.log.html19:05
bauzashehe, I don't need to be a chair :)19:05
bauzas(I remember that, we did that19:05
gmann++19:06
bauzasif people want to hear what I get as audio sometimes https://discussion.fedoraproject.org/t/garbled-audio/8747019:06
bauzaspipewire--19:06
bauzassorry for not having able to join the meeting most of the time :(19:06
fungiyeah, if the meeting has been running for at least an hour, anyone can end it19:14
JayFtc-members: vmt just opened https://bugs.launchpad.net/keystone/+bug/2069063 up to the public as it passed the embargo deadline; ignored security issues is a sign of project inactivity and this is extremely concerning for an authz-related project19:20
dansmithnot just auth-related but core and central to most of the other projects' existence :/19:21
JayFtc-members: I've informed #openstack-keystone as well, but if anyone has time/knowledge about keystone, is a core or knows a core, we need more engagement on security issues for that project19:21
gouthamrbauzas++ thank you 19:21
fungiyes, i know the keystone team is stretched, but their security reviewers don't seem to be able to find time to look at reports of potential vulnerabilities19:21
fungiso that would be a great area for interested folks to pitch in19:21
JayFkeystone team, as dansmith points out, might as well be everyone if it's nobody because if it's neglected it hits us all19:21
JayFnot the sorta thing that can go inactive without taking the whole project with it :/19:22
funginote we're not trying to shame the current volunteers, keystone is simply the epitome of the tragedy of the commons19:23
gouthamrhttps://launchpad.net/~keystone-coresec/+members#active19:23
JayFmy concern is more along the lines of $panic than trying to point at anyone/anything in particular19:23
fungialso serves as a reminder for teams to refresh their security review teams19:24
gouthamrfungi: i agree; but, this list is outdated wrt keystone maintainers i think19:24
fungiright, not keeping it up to date is another sign of a project that can't find enough volunteers for basic upkeep19:24
bauzasthat's something doable : ask the teams to review their coresec subteam19:26
JayFI'll send an email along those lines today19:26
bauzaswe did that for the pypi maintainers recently19:26
JayFas long as fungi or other vmt members don't object: )19:26
fungithanks JayF!19:26
TheJuliaYeah, definitely need to review their members since several of those keystone-coresec members have since moved on19:27
fungino objection. i tried to send reminders to the ml off and on about it, but it's been a while. i had hoped ptls worked it into their transition procedures19:27
bauzasalso, asking 3 existing maintainers to be in the coresec team seems a quite difficult level to ask, but that's reality19:27
TheJuliaReality is, critical components likely need *4*19:27
TheJuliaerr, *5*19:27
bauzasif you can't at least have 2 people in the coresec team, then you're fragile19:27
fungiit can just be their core review team if that's all the people they have19:27
bauzasTheJulia: I don't disagree for large security bugs (but we never had any of them impacting 3 projects like Nova, Cinder and Glance, right ? ^_^=19:28
bauzas)19:28
TheJuliafungi: indeed19:28
TheJulia... and Ironic19:29
bauzasfungi: I'm not exactly fan of opening embargoed bugs to the whole core team19:29
fungibauzas: if the whole core team is 3 people though?19:29
fungithat was my point19:29
bauzasheh19:29
bauzastbh, that's where the bond trust is difficult to make19:30
bauzasyou can trust someone for being able to review a critical patch on a non-affiliated manner19:30
bauzasbut sometimes you don't trust that person for keeping secrets19:30
TheJuliaAnd also, it is always possible to find more issues which begins to erode a small team's capacity when one issue is being worked. Basically need spill-over coverage capacity.19:31
bauzasthat's two different (and possibly not adjacent) groups of people19:31
gouthamrin may cases our coresec teams don't have the project PTL in them :( 19:31
bauzaswhich is understandable19:32
bauzasI always considered the "P" in PTL standing for Paperwork19:32
gmanni think existing core (active core) also sharing their bandwidth for other things which makes keystone change  take so much time to merge. we have experienced in RBAC cases.19:33
fungithe ptl doesn't have to be a security reviewer, but it's up to them to keep the roster of security reviewers up to date19:33
fungisimilar to keeping the roster of core reviewers up to date19:34
gmannIMO, 2 people should be ok to keep things active but things really matter is how much bandwidth they have for upstream activity 19:34
JayFbauzas: in some communities (e.g. CNCF) they do have split core teams (e.g. reviewers vs approvers or some similar split of "kinda trusted" v "fully trusted"). I think it'd be interesting to see this applied to OpenStack -- it might enable us to have trusted-people with more access (reviewers) without having to open them up to full access (approvers). For this kinda split, we could use approvers group as the coresec group.19:34
JayFbecause generally this all works back to "we are too siloed to succeed without more people"19:34
JayFand unless you have more open job reqs than I do I don't think we're going to solve the problem without unsiloing some19:35
gouthamrwe do have that split: project-core, project-stable-maint, project-coresec 19:35
JayF(I know this probably is dripping with hypocrisy as Ironic has been more of a lone wolf team, but I think that makes us uniquely qualified to know how much that's painful)19:35
JayFgouthamr: on some teams, they have stable-maint members that aren't even regular cores; and -coresec is a launchpad concept unrelated to code review19:36
JayFgouthamr: so I think you're right that vibe-wise we follow that pattern in some places, but I think it'd be smart of us to evaluate following it more closely throughout the stack19:37
gouthamryes; and making it one of the early PTL tasks; so you're PTL now (or again), please ensure this item is top on your checklist 19:38
gouthamrhttps://docs.openstack.org/project-team-guide/ptl.html#at-the-beginning-of-a-new-cycle19:39
gouthamrthese lists are woefully out of date: https://wiki.openstack.org/wiki/CrossProjectLiaisons (you wouldn't know looking at all the thankless work that happens from our PTLs and project maintainers despite the lack of this)19:41
fungiyeah, the vmt mainly consults that list as a fallback, in combination with the dpl liaisons and ptl in governance19:41
JayFWell, the wiki is pretty miserable in terms of being up to date for most projects in general19:42
fungiin keystone's case, the ptl has also volunteered to participate in the vmt and so has visibility into all private security bugs, not just keystone's19:42
fungibut if they don't have time for those tasks, it doesn't help much19:42
gouthamrah19:43
fungiagain, not trying to call anyone out, this is a collective problem19:43
fungihttps://launchpad.net/~openstack-vuln-mgmt19:44
JayFyeah I mean, Ironic didn't even officially get VMT managed until a couple weeks ago19:44
JayFafter I intended to get it done during my run as PTL19:44
fungicongratulations though!19:44
JayFjust difficult to keep all the plates spinning19:45
gouthamrwhich, is still lightyears ahead of Manila - i've only been thinking about it and not acting19:45
gouthamrthanks for working on (and sharing) Ironic's VMT transition JayF 19:45
JayFgouthamr: if you wanna schedule some time, happy to work through it with you 19:45
gouthamrYES19:45
JayFgouthamr: jay@gr-oss.io, just send a meeting invite sometime between 7am-4pm and you'll probably get lucky enough to hit an open spot :D 19:45
gouthamrhaha thanks :) 19:46
JayFfungi: I wonder if we should have a x-project VMT session to evangelize the VMT19:46
gouthamr^ yes19:46
JayFaltohugh I guess if people know enough to join the session, they know enough to just have a conversation :)19:46
fungiJayF: in the past we've called that the security sig session at the ptg, because basically only vmt members have shown up to those since years19:49
JayFmakes sense19:49
JayFthat's basically the relationship of ironic to the BM SIG19:49
JayFBM SIG is just different marketing for our operator meetups so we don't scare away metal3 users :P 19:49
fungii'm happy to re-title the ptg track in the future if it will draw more interest19:50
JayFI don't know if it will, but I apprecaite the reminder to make sure I show up to the security sig :D 19:51
fungibut basically, if anyone wants to discuss openstack vulnerability management, the security sig is the vehicle for those discussions19:51
gouthamr^ maybe bring this up during the TC/project leaders discussion19:51
gouthamri'll be sure to schedule that on Monday19:51
fungii need to book a timeslot or two for it still, but i try to avoid colliding with other teams and that gets... challenging19:51
gouthamrtrue :( i wish we could have cross project discussions on a different week :D 19:52
gmann++ for TC leaders discussion. 19:52
spotz[m]Why can't you? No one is stopping you:)19:52
gouthamr^ true, isn't it19:53
JayFHonestly even if you look at VMT over the last year, we're getting better. Trajectory improving.19:53
JayFIt went from basically just fungi to me, fungi, rosmaita (and a couple others?, but tbh we are the most active 3 right now)19:54
fungiit's far less of just me occasionally getting other people to weigh in with an opinion on something occasionally, yep. refreshing!19:54
JayFand I think overall the project did a good job of navigating the security minefield qemu chucked at us this year :)19:54
fungi...so far19:54
fungithe year's not over yet!19:55
JayFdon't say things like that! karma is listening...19:55
* fungi is a "glass half full of karma" kind of person19:55
JayFI'm a "I hope the glass doesn't shatter in my hand" kind of person19:56
JayFwe probably need to audit https://security.openstack.org/repos-overseen.html#repositories-overseen even for projects in the VMT19:56
JayFe.g. nova is clearly VMT, but placement isn't listed there19:57
JayFlikely just a bitrot thing and not anything policy-impacting19:57
fungiyes, unless the tc decides to pull the trigger on all official openstack repos being vulnerability managed (which i wouldn't object to, but then there are a lot of other changes the teams need to make, particularly to their bug trackers)19:58
fungiin my opinion the best possible outcome would be that the list of overseen repos becomes a link to the list of official openstack deliverable repos19:58
JayFMy only concern about that is in the inactive project case19:59
JayFthat this might be just turn into another monitoring system for project activity19:59
fungiyes, we'd of course come up with some additional mitigating policies19:59
JayFif I were to propose this, I'd probably put something like19:59
JayFafter 30 days if $project-coresec hasn't responded, TC is given access to the bug19:59
JayFor something similar19:59
fungibut i don't like tracking half-synced lists of repositories in different places any more than the next person20:00
JayFso that VMT is not "the buck stops here" for those technical problems20:00
JayFand we have a catch before something goes private->public20:00
fungisure, i could get behind that20:00
JayFgouthamr: would you be in support of a resolution to: 1) say all official openstack deliverables on a cycle-* release cadence are VMT managed & 2) TC becomes the final escalation point in case of any project covered by #1 where there is no response from security team before $deadline20:01
JayFfungi: ^ note the "cycle-*" deliniation20:01
JayFthere are lots of "official openstack" projects that don't make sense to VMT; e.g. sushy-tools, virtualbmc, virtualpdu, other things that are official projects but not supported for production20:01
JayFand usually cycle-with-x release cadences is a good signal of that20:02
cardoeApologies for not being around earlier was with my kids (I’m on PTO). Something we need to encourage is more involvement from contributors. That’s how we’ll get more reviews. It won’t happen overnight. We need to “teach, not preach” for contributors.20:02
JayFcardoe: you should apologize for IRC'ing during PTO. Go be with your kids, we'll take care of your adopted-tech-children in the meantime ;) 20:03
cardoeWe need to be encouraging projects all over the board to welcome contributors.20:03
fungiright, effectively we can come up with a dynamic filter for what repos make no sense for vmt oversight, but the current opt-in list (which was a continuation of the earlier governance tag) doesn't scale well once we start covering a larger amount of the project list20:03
fungibecause it's guaranteed to get out of sync20:04
cardoeMy fear is the xz issue if we get too thin on reviewers. So in addition to adding more security reviewers I’d like to see us encourage more to use their +1 on regular reviews.20:06
JayFcardoe: I think we've already improved somewhat by raising scrutiny levels on randomly appearing contributors ... the interesting thing is, this kinda behavior would be an enhancement, not a impediment, to new folks, as it would (theretically) come with mentorship/auditing20:10
fungicardoe: as for improving the contributor experience, if you missed it, you may want to weigh in on https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/thread/GTPTFUPXXBDMWNQZGZDLM2IIX4FSTT5Y/ and if you're going to be in indianapolis for oid-na stop by our forum session on the topic. also we've proposed to discuss it with the tc during the ptg20:12
TheJuliacardoe: family > work-family > work.... Go enjoy your PTO :)20:12
cardoeI’m going back to the water. Been called!20:12
TheJuliaEnjoy!20:12
fungienjoy!20:12
spotz[m]While I'm thinking about it, any tc-members I haven't already emailed plan on being at OpenInfra Days NA?20:13
* gouthamr had stepped away 21:36
gouthamrJayF: ack; lets talk about this.. i think that'd be a good move.. but, we'd need to make sure PTLs/DPLs are aware and revisit their security liaisons and in parallel we will need more folks to staff the VMT 21:37
fungiif people were more active in the per-project security review teams, that would also take some of the burden off the vmt though. a lot of our time is spent chasing people to get them to look at reports21:42
gouthamrack; i know that can be frustrating.. do you resort to emailing them? 21:49
JayFwe also just recently went from 1 active -> 3 active VMT members21:50
JayFso that in itself is already a significant scale-up21:50
gouthamrnice! great to see that https://security.openstack.org/vmt.html 21:51
fungithough in keeping with the discussion about making sure lists of active people are up to date, we do need to reach out to several vmt volunteers who apparently didn't have the time they thought they did to assist in our usual tasks21:53

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!