19:59:58 #startmeeting barbican 19:59:59 Meeting started Mon Jul 14 19:59:58 2014 UTC and is due to finish in 60 minutes. The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:00:00 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:00:03 The meeting name has been set to 'barbican' 20:00:13 #topic Roll Call 20:00:25 hi everyone, 20:00:31 hello 20:00:34 can I get a show of hands for the Barbican weekly meeting? 20:00:39 o/ 20:00:45 o/ 20:00:47 o/ 20:01:23 o/ 20:01:38 I see a few more people who are probably here for barbican... paul_glass I'm looking at you. 20:01:49 o/ 20:02:41 as usual the meeting agenda is available here: https://wiki.openstack.org/wiki/Meetings/Barbican 20:03:07 o/ 20:03:18 o/ 20:03:46 o/ 20:04:10 Ok, cool, looks like there's plenty of us here. 20:04:20 #topic barbican-core nominations 20:05:03 First up in the agenda, in case you missed it, I nominated Ade Lee and Nate Reller ( rellerreller ) for barbican-cre 20:05:09 *barbican-core 20:05:36 I checked this morning and they've both gotten 6x +1 votes from the rest of the team 20:06:04 since there were no negative votes, and we're on day 5 I think we're good to add them to the team 20:06:07 redrobot, great nomination +1 from me too 20:06:09 which I will do shortly 20:06:28 #action redrobot will add alee and rellerreller to barbican-core 20:07:03 with great power comes great responsibility, so please be sure to take time to review patches as they come in :) 20:07:08 congrats 2 u both 20:07:17 Thank you! :) 20:07:20 rellerreller, alee congratulations 20:07:36 o/ 20:07:43 bubbva yes? 20:07:50 yes, late, but here :-) 20:08:03 bubbva oh, ok. :) I thought you had a question 20:08:26 ok, moving on to the next topic 20:08:39 #topic Better planning for large patches 20:08:47 #link https://review.openstack.org/#/c/103431 20:09:14 I think that in general we do want to strive for smaller patches 20:09:43 * jvrbanac agrees! 20:10:00 For this change in particular, the tradeoff was to either do one large patch, or small patches that would break HEAD 20:10:01 redrobot, yes that topic was added by me and I appreciate if we make better planning for such changes 20:10:11 seems we did hurry on this one 20:10:17 atiwari what do you mean by better planning? 20:10:35 I think we did a good job of planning for the refactor during the Atlanta summit 20:10:50 smaller change 20:10:55 maybe as part of a bp we could add a section for "phase-in" where we discuss how to break up implementation into smaller units 20:11:13 redrobot, in deed you guys did good job 20:11:15 :) 20:11:35 hockeynu_, +1 20:11:41 atiwari I just want to make sure we address your concern, if you think that planning was not adequate. 20:12:03 yes, we should have plan for smaller change 20:12:25 atiwari ok, so your concern is just smaller changes in general? 20:12:31 due to this one I think I need to start CR 87405 almost from scratch 20:13:09 redrobot, and better understanding for the change 20:13:36 atiwari yeah, this was a major change. I'm hopeful that the number of fundamental framework changes will be minimal. 20:13:45 seems with this one Secret store BP is not well documented and seems it is implemented in this CR 20:14:22 I think this change pre-dates the specs repo 20:14:40 I think that moving forward we'll have less issues with big changes like this thanks to the specs repo 20:15:39 redrobot, there was not enough time give to review this change. Seems there was some hurry 20:15:48 just mu opinion 20:15:52 my 20:16:15 June 29 - July 8 is when the patch was in review... do you think that was not enough time? 20:16:31 it wd be great if we make smaller change, specially if that change is affecting everyone 20:17:02 based on the size, I think not 20:17:18 anyway lets not worry about this 20:17:58 Actually, we did have a SPEC for this 20:18:00 #link https://review.openstack.org/#/c/98286/ 20:18:10 June 5 is when the SPEC was first proposed 20:18:45 this core reorg spec 20:19:04 I think for secret store there is no detailed specs 20:19:20 hope I am not missing something 20:19:45 atiwari SecretStore is part of the spec I linked above 20:20:13 atiwari but I do agree we need better documentation around that 20:20:39 I have it on my TODO list to write a detailed guide for using SecretStore plugins, so stay tuned :) 20:20:52 redrobot, thanks 20:21:11 any more questions/comments about CR sizes? 20:21:57 #agreed we want to strive for smaller patch sets, especially when they affect a lot of concurrent work 20:22:01 redrobot, I wd prefer smaller change targeting to just one BP 20:22:18 atiwari I think this change did target just the one BP 20:22:56 redrobot, OK 20:23:09 ok then, moving on 20:23:35 #topic python-barbicanclient release schedule 20:23:48 I added this one 20:23:52 We are creating a Barbican plugin in Nova to retrieve the keys for disk encryption from Barbican 20:24:03 We put in CR to add python-barbicanclient to global requirements, https://review.openstack.org/#/c/106411/ 20:24:16 +1 ^ would help :) 20:24:28 Our issue is that requirements pull the latest release of python-barbicanclient, and the latest release has a bug in it. The log for error is here, http://logs.openstack.org/01/104001/4/check/gate-nova-pep8/fdeaf4d/console.html.gz 20:24:45 The latest code in master does not have the error but has not been released. We need a new release to finish our integration. 20:25:14 So the question is when is the next release? 20:25:20 Yeah... the client needs a lot of TLC. 20:25:42 So we do have a lot of work in the pipeline for the client... but I think a lot of it is going to require a 3.x.x release 20:25:55 Do you think there can be another release before code freeze? If not then our unit tests will not pass, and we will not be able to integrate with Nova. 20:26:18 the clients aren't released on the same schedule 20:26:24 we can release it anytime we want 20:26:36 I'm ok with releasing a new 2.x, but keep in mind there may be some breaking changes for 3.x 20:26:46 A new release would help us at least get something into Nova 20:27:28 We should not need much functionality, probably just create and retrieve key and delete 20:27:32 does anyone have any issues with releasing a new 2.x barbicanclient ahead of the Keystone sessions refactor? 20:27:39 I'm okay with it 20:28:04 redrobot, tsv is pushing a change for tenant_id removal from api 20:28:42 which is on review, once that will be merged we have to immediately release one 20:29:02 wondering if it is good to wait for that cr? 20:29:07 atiwari I don't think we need to release clients immediately after merge, but it would be good to release alongside milestones 20:29:34 ok 20:29:51 atiwari would you be ok with a release now to unblock rellerreller and then another release once tsv's work is merged and released on a milestone? 20:30:09 redrobot, yes 20:30:25 ok, let's plan for that then. 20:30:40 #action redrobot will make a new barbicanclient 2.x release 20:30:47 Excellent! 20:31:16 rellerreller does current HEAD work for you? 20:31:31 blpoulos, can you answer that? 20:31:40 yes, it does 20:32:44 ok, good, I'll try to get that released today. 20:32:52 wonderful, thank you 20:33:34 ok, guys that's it for our agenda today. Does anyone have any other issues/questions they'd like to bring up right now? 20:34:15 yes I have some basic question regarding secret store plugin 20:34:25 #topic SecretStore 20:34:30 atiwari go ahead 20:34:40 ok 20:35:19 I have to store my secret in Barbican system, same way it is stored with crypto plugin 20:35:39 I am suppose to write separate secret store plugin ? 20:35:54 like StoreCryptoAdapterPlugin? 20:36:40 atiwari not necessarily, unless StoreCryptoAdapterPlugin does not work for you 20:37:18 the idea is that StoreCryptoAdapterPlugin is a generic way to store secrets in the Barbican db 20:37:29 as I mentioned I have a req to store one (or more) master KEK in HSM to encrypt the KEK 20:37:57 that implementation of SecretStore uses a CryptoPlugin. so it's a sort of plugin-within-plugin 20:38:20 yes 20:38:46 we at Rackspace are planning on using a CryptoPlugin that talks to an HSM via PKCS11... reaperhulk is currently exploring tiered keys to deal with the HSM storage limit, but I'm not sure what his progress is 20:39:19 ok 20:39:42 it sounds to me like your use case is similar to ours 20:39:51 I think so 20:40:13 but if the PKCS11 plugin we're using does not work with the HSM you may need to write your own CryptoPlugin 20:40:29 sure 20:40:35 redrobot, jraim another question around CryptoPlugin 20:40:39 but it sounds like you may be able to reuse the StoreCryptoAdapterPlugin 20:41:00 StoreCryptoAdapterPlugin >> MyNewPlugin ? 20:41:53 I'm not sure I undestand the question? >> ? 20:42:00 20:42:03 sorry 20:42:40 I will write my new CryptoPlugin (MyNewPlugin) which will be called from StoreCryptoAdapterPlugin 20:42:54 correct 20:43:08 yes, that may be a good approach for you if StoreCryptoAdapterPlugin does work for your storage needs. 20:43:17 ok 20:44:34 any more questions/comments about this or any other topic? 20:45:12 redrobot, one last from me :) 20:45:18 ok 20:45:24 may I ask what is holding https://review.openstack.org/#/c/104599/? 20:46:57 atiwari looks like it's just a case of the Mondays... I know the team here has been in meetings all day. 20:47:11 np 20:47:36 I was blocked due to this one. that is why raised 20:47:54 ok, I'll see if I can poke some people to go look at it 20:48:03 thanks 20:49:11 ok guys, looks like we may be able to call it a day a bit early today 20:50:21 see y'all back here next week. 20:50:29 #endmeeting