12:00:17 #startmeeting heat 12:00:18 Meeting started Wed Apr 15 12:00:17 2015 UTC and is due to finish in 60 minutes. The chair is shardy. Information about MeetBot at http://wiki.debian.org/MeetBot. 12:00:19 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 12:00:21 The meeting name has been set to 'heat' 12:00:50 Fuh. Bot works today :) 12:00:50 #topic rollcall 12:00:55 \o/ 12:00:56 o/ 12:00:59 whoe's around? 12:01:01 o/ 12:01:04 o/ 12:01:08 who's even.. 12:01:21 hi 12:02:08 o/ 12:02:27 \o 12:02:34 hi 12:02:51 Ok, hi all, let's get started 12:02:56 #link https://wiki.openstack.org/wiki/Meetings/HeatAgenda 12:03:06 #topic Adding items to the agenda 12:03:14 anyone have anything to add? 12:03:54 Ok, I'll take that as a no ;) 12:04:05 #topic Any critical bugs (rc2 potential) 12:04:34 just discovered after ML post - https://bugs.launchpad.net/heat/+bug/1444429 12:04:35 Launchpad bug 1444429 in heat "WaitConditionHandle creates stack user without a password" [Undecided,New] 12:04:47 So, I checked with ttx, and it's likely we'll have an rc2, but we're still waiting for the bugs we want to backport to be finalized 12:04:54 o/ 12:05:12 not sure how critical is that 12:05:19 pas-ha: It's not supposed to have a password, the AWS WaitCondition only has an ec2 keypair 12:05:27 I'll take a look after the meeting 12:05:30 no, thats native one 12:05:55 pas-ha: Ok, well definitely one to investigate ;) 12:05:59 Create_Failed: Resource CREATE failed: BadRequest: Password is not strong 12:05:59 enough (HTTP 400) 12:06:10 #link https://bugs.launchpad.net/heat/+bugs?field.tag=kilo-rc-potential 12:06:45 wow, that's a long list 12:06:46 If folks can tag bugs with kilo-rc-potential, it will help track what needs to get backported to proposed/kilo 12:06:51 shardy, what's the difference between kilo-rc-potential and kilo-backport-potential? 12:07:06 pas-ha: kilo-rc is pre-release 12:07:19 kilo-backport is stable release 12:07:19 pas-ha: kilo-rc-potential means it's something we might consider a release blocker 12:07:23 i.e. 2014.1.1 12:07:26 we already have kilo-backport-potentia 12:07:35 :) 12:07:35 kilo-backport-potential is something we'd consider for a post-release async stable release 12:08:07 if we're doing an RC2, we may as well get as many non-risky bugfixes in as we can IMO 12:08:32 +1 12:08:37 as zaneb says, that is looking like rather a long list though :) 12:09:52 may be some authors don't know, that their patches are backport potential ? 12:10:22 skraynev: it's up to the heat-core folks to set the tag appropriately either when reviewing or when triaging the bug 12:10:49 e.g before you +A something, you should think if its a release-worthy fix, and consider tagging the bug referenced from the commit 12:11:05 shardy: yeah, I know, but I told, about patches for review 12:11:42 when it was marked as backport potential and the author of original commit does not know about it and do not do patch to another branch 12:12:35 skraynev: Yeah, in that case, it's generally up to the PTL and any other kind folks who are prepared to propose the backports 12:13:12 we can't really mandate that authors backport their patches, although it's obviously good if they do :) 12:13:25 Ok, does anyone have anything else re rc2? 12:13:41 shardy: :) need gerrit-bot for it 12:13:46 at the risk of making work for myself, I'd say it's the responsibility of the whole core team at a minimum, not just the PTL ;) 12:14:27 zaneb: Yeah, I agree, but IME a lot of it falls to the PTL, hopefully that's improved now the role has been rotated quite a bit :) 12:15:08 zaneb: sure. we all can be on this place and nobody don't want to be alone with these responsibilities ;) 12:15:13 There are 4 High Triaged bugs on the rc-potential list, it'd be good if folks could either pick those up or deprioritize them 12:15:23 I have +A rights on the stable branches, feel free to add me to reviews :) 12:15:30 +1 12:16:29 #topic open discussion 12:16:40 Could be a quick meeting today ;) 12:16:51 anyone have anything they'd like to discuss? 12:16:51 yeah;) 12:17:13 ooops. it was answer on the first message ;) 12:17:22 I wanted to point out that events are a terrible interface for user notifications, FWIW 12:17:47 I think asalkeld started a thread about it, but I've been trying to consume hooks/breakpoints via events and it's nasty 12:17:57 lol 12:18:14 Just thought I'd share that with y'all ;) 12:18:16 shardy: you mean heat events, not "the general term 'events'" right? 12:18:44 ryansb: I think shardy meant first one;) 12:18:47 ryansb: Yeah, heat events 12:18:49 * zaneb warms up his zaqar rant 12:19:06 Because the conclusion to that notify-our-users thread was "we like sending events over zaqar as a solution" 12:19:20 zaneb: I'd prefer pluggable mechanism in this case 12:19:30 zaneb: not only zaqar 12:19:42 ryansb: I'll take anything which doesn't require 37 API calls and a ton of list mangling on the client side 12:19:43 skraynev: +1. there's no harm in sending it to multiple places 12:20:08 zaneb: I think everyone here has heard the zaqar rant ;) 12:20:09 hopefully you'll all take pity on me when I post my heatclient hacks which do that later today and not immediately -2 them ;) 12:20:28 skraynev: although in my broader vision, the zaqar message can be used to trigger a mistral workflow, so it's pluggable by the user :) 12:21:22 zaneb: sounds interesting. 12:21:40 * shardy concludes his event rant 12:22:30 Anyone have anything else they'd like to discuss? 12:23:37 would like to discuss 1312246 12:23:41 bug 1312246 12:23:49 tagging along on the event rant: ceilometer has a spec up for alarming/event notification if folks want to have a peek https://review.openstack.org/#/c/172893/1 12:23:59 12:24:26 wanted to know if it can be made public? https://bugs.launchpad.net/heat-cfntools/+bug/1312246 12:25:02 saw that in my email just now, but haven't read it yet 12:25:40 I'm puzzled by what an "attacker" would do in the context of a box they already have root via cloud-init on 12:26:07 wait, I have commented on this before 12:26:42 I think its about not setting the setuid properly before running 12:26:51 running the command 12:27:14 ananta: no, it's not 12:27:41 but I agree this should be public 12:28:08 zaneb: ok 12:28:12 it's up to the template author not to pass untrusted data as an argument there until this bug is fixed 12:28:13 Yeah I agree 12:28:24 so they should probably know about it 12:28:44 I'd be happy to see it fixed, but it can't be super high priority given that it's not been fixed in a year ;) 12:28:54 whereas I don't think knowing about it makes it significantly easier to exploit 12:29:40 zaneb: yes 12:29:42 zaneb: +1 12:30:31 shardy: its definitely not high priority 12:31:09 ananta: Ok, I've triaged it an assigned medium priority 12:31:19 shardy: thanks 12:31:23 if you're prepared to help fix it, that would be great 12:31:59 shardy: I will investigate and see 12:32:04 I don't know right now 12:32:07 ananta: thanks 12:32:18 Anyone have anything else, or shall we wrap things up early? 12:33:11 just changed it to "public security" 12:33:24 zaneb: thanks 12:33:47 Ok, if there's nothing else, I'll endmeeting, thanks everyone! 12:33:53 #endmeeting