16:00:41 #startmeeting hyper-v 16:00:42 Meeting started Tue Mar 11 16:00:41 2014 UTC and is due to finish in 60 minutes. The chair is primeministerp. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:43 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:46 The meeting name has been set to 'hyper_v' 16:00:51 Hi all 16:00:56 ociuhandu: morning ;) 16:00:59 hi 16:01:03 luis_fdez: luis! 16:01:05 morning primeministerp :) 16:01:07 hi all 16:01:13 luis_fdez: glad you could join us 16:01:27 It's been a long time since last meeting yeps 16:01:50 ociuhandu: give alex a kick 16:02:24 hi there 16:02:30 alexpilotti: howdy 16:02:39 sorry, was having a chat in -horizon about passwords 16:02:46 no worries 16:02:53 we all have a lot going on 16:03:05 figured we could sync on current status 16:03:32 sure 16:03:38 #topic status update 16:03:52 ok 16:03:56 alexpilotti: I know there were new commits 16:04:00 so, everything looks bright 16:04:06 alexpilotti: you want to give the quick run down? 16:04:24 RDP merged in nova, python-novaclient and horizon 16:04:30 great 16:04:35 that's a big one 16:04:43 hyper-v security groups merged in neutron 16:05:16 also good news, we've got people wanting that 16:05:24 nova get-password feature merged in horizon (thanks arezmerita) 16:06:04 bug fixes are merged or in teh process 16:06:22 so things are looking well 16:06:27 awesome 16:06:59 questions on the status? 16:07:03 we can almost start thinking about atlanta 16:07:09 luis_fdez? :-) 16:07:24 no questions alexpilotti, all the new features sound fantastic 16:07:44 luis_fdez: i've got a thread going w/ Tim 16:07:55 luis_fdez: re: cinder/smb3 16:08:03 cool, I know that you guys are interested in backporting to Havana, let me know if you need help 16:08:22 ok alexpilotti, I'll use your help for sure :D 16:08:25 primeministerp: should we briefly talk about what we plan to add for Juno? 16:08:30 primeministerp: smb3 is an option we want to explore yes 16:08:37 yes we can start 16:08:51 #topic juno ideas 16:08:53 cool 16:09:15 so 16:09:28 the idea is to have others in the community to chime in as well, if they'd like some features that we didn't think of, or we didn't want to prioritize yet 16:09:34 1) smb3 16:09:36 smb3/cinder work is on the table 16:09:43 development is basically done 16:09:55 it's a big set of patches 16:10:05 involving mostly nova and cinder 16:10:32 the important part, is that it'll involve libvirt support as well, not only hyper-v 16:10:43 smb3 suport on kvm? 16:10:47 yep 16:10:50 alexpilotti: yes we should not exclude linux functionality here 16:10:59 luis_fdez: yes 16:11:01 that's a good point 16:11:10 luis_fdez: the idea is that this is going to be a cinder driver 16:11:18 luis_fdez: both sides can consume it 16:11:28 and as such it'll need to be consumed by as many hypervisors as possible 16:11:55 think about an horizontal support, like what happens for ceph 16:12:35 luis_fdez: we can start beta testing it almost right away 16:12:54 it'll take at least one release cycle to get all the parts reviewed etc 16:13:15 alexpilotti: perfect, I imagine a lot of refactoring/review involved 16:13:21 yep 16:13:46 alexpilotti: plus we'll want to include it in the regular CI runs by then as well 16:13:53 alexpilotti: all thing equal 16:13:58 if you guys want to run some tests, it'd be great. As we could provide the community with a third party point of view on the benefits 16:13:59 er things 16:14:20 primeministerp: sure! 16:14:40 any questions on the SMB3 part? 16:14:49 not really 16:14:52 from my end 16:14:53 nop :) 16:15:05 ok, next is windows passwordless authentication 16:15:38 we did a lot of work to get x509 passwordless certification working in cloudbase-init and pywinrm 16:15:55 it's the rough equivalent of ssh keypairs 16:16:08 but native in the WIndows OS 16:16:51 we're going to propose a BP for certificates 16:16:51 in Nova 16:16:51 and Horizon 16:17:21 so teh use can choose a certificate and it gets provided via metadata to the instance 16:17:21 *the user 16:17:21 like: 16:18:00 nova boot --x509 myvert1 vm1 16:18:00 *mycert1 16:18:26 and the you can just use powershell to access the VM 16:18:26 no password involved, finally 16:18:48 this is mandatory for proper automation, security, etc 16:18:56 alexpilotti: that's great news 16:19:09 same use cases as the SSH pubkey auth in Linux 16:19:12 alexpilotti: yeps, it's a must have 16:19:49 it's already working, by passwing the certificate in userdata or cutome metadata: #link http://www.cloudbase.it/windows-without-passwords-in-openstack/ 16:20:38 but we really need a consistent API model in Nova to handle teh certificate generation and storage 16:20:53 ok 16:21:18 isn't ayoung working on that 16:21:32 primeministerp, sort of 16:21:40 cermonger 16:21:43 ayoung: ahh 16:21:47 certmonger 16:22:03 ayoung: hi there! 16:22:04 alexpilotti, ++ I was discussing something along those lines earlier 16:22:15 ayoung: we need to have lunch soon 16:22:16 ayoung: cool 16:22:20 how do we autoregister a host with a domain controller. I assume that is what you are discussing? 16:22:37 ayoung: no, passwordless authentication in WIndows 16:22:38 ayoung: that would be part of your config mgmt right now 16:22:45 ayoung: a la SSH pubkey 16:22:49 ayoung: what alexpilotti says 16:23:15 so...let me subvert this discussion\ 16:23:21 ayoung: guest DC registration is a separate painpoint at the moment :-) 16:23:31 we were discussing the same thing, but within the context of FreeIPA 16:23:48 I assume that a new windows vm, should be able to enroll with a PDC, no? 16:24:00 no "have to" but "should be able to" 16:24:06 yes 16:24:06 and the pattern would be something like 16:24:11 ayoung: optionally 16:24:28 nova generates an OTP, passes it to the PDC as well as to the new vm via Vendoer data 16:24:32 vendoer 16:24:36 * ayoung gives up 16:24:41 venderrrrrrr 16:24:44 anyways 16:24:46 ayoung: the feature we are discussing is the equivalent of SSH pubkey auth 16:24:54 ayoung: stop peddling the bike ;) 16:24:55 ayoung: #link http://www.cloudbase.it/windows-without-passwords-in-openstack/ 16:25:21 ayoung: said that, we are also VERY interested in your work 16:25:32 alexpilotti, so Windows also has this whole Kerberos infrastructure, as well as a CA etc 16:25:40 ayoung: as we are using crazy Heat templates at the moment to handle AD DC registration 16:26:02 and I think that a single mechanism supporting PDC registration for Windows and FreeIPA for Linux would be a powerful abstraction, and get you a good extension to that blueprint 16:26:06 ayoung: sure, but I wouldn't mix the two scenarios 16:26:20 yeah, but that means that an user registering a VM via Horizon or Nova can bypass 16:26:46 so...key injection is currently done in the LInux use case, so you need to handle the analogue in that blueprint 16:26:50 not arguing against that 16:27:06 ayoung: sure, that's just the vry basic scenario 16:27:06 but I think you have it under control, and I like the fact that you are using X509s instead of raw keys 16:27:31 right now, however, horizon doesn't let me say "create a vm, and let me inject alexpilotti 's key into it" 16:27:37 I can only add my own key 16:27:39 and that sux 16:27:54 ayoung: sure 16:28:18 alexpilotti, for certificates to be done right, the secret key should never leave the remote machine 16:28:25 it should generate the CSR and post to a CA 16:28:28 and there is the rub 16:28:41 ayoung: it never does 16:28:51 ayoung: we inject only a self signed x509 (w/o key) 16:29:06 ayoung: in teh same way in which you inject the pubkey in SSH case 16:29:12 ah, but for logging into a machine, you don't have a problem. You only have a problem when the machine needs to call out...which is what HEAT is facing 16:29:43 ayoung: sure, that's why I'm saying that there are 2 completely different use cases :-) 16:29:47 certmonger can help, in that it allows you a mechanism for posting the CSR, but you still need an approval strategy 16:29:59 alexpilotti, but related....you want single sign on 16:30:12 ayoung: not everytime 16:30:16 alexpilotti, I thin the x509 case you ahve well covered 16:30:30 but I think quickly you are going to run into this issue 16:30:38 antyway, I'll leave you guys to discuss 16:30:43 look into certmonger 16:30:44 ayoung: a user can just say: I just want a VM, no complex Heat stuf, just let me log in w/o having to handle passwords 16:30:53 https://fedorahosted.org/certmonger/ 16:31:11 alexpilotti, that is the easy sider 16:31:21 ayoung: #link https://fedorahosted.org/certmonger/ thx! 16:31:23 the hard side is getting the X509 signed. 16:31:36 ayoung: certmonger has the potential to solve all the other cases 16:31:50 ayoung: not for the basica auth case we are facing here 16:31:58 ayoung: self signed is way enough 16:32:07 ayoung: and one detail: 16:32:07 alexpilotti, it is part of the solution, but you still need to figure out the approval process. 16:32:09 alexpilotti, ugh 16:32:31 selfsigned is....not something you want in production 16:32:32 ayoung: like teh SSH case 16:32:43 yeah...same argument 16:32:52 * ayoung mutters about cowboys 16:32:59 hehe 16:33:06 ayoung: you generate your own key, it never leaves your client, etc etc 16:33:11 lol 16:33:16 alexpilotti, right...and there is no revocation 16:33:20 and no expiration 16:33:28 at least selfsigned will have expiration 16:33:57 i want to second that 16:34:02 ayoung: yep, but again I would'nt mix the various cases 16:34:02 his lunch part 16:34:06 ;) 16:34:31 alexpilotti: let's finish this up, and you guys can continue the discussion 16:34:32 ayoung-lunch: you mean dinner, here? :-) 16:35:03 so, let's join the certmonger effort 16:35:13 and help on teh AD bits 16:35:38 alexpilotti: sounds like a plan, let's discuss more later and see what we can do 16:36:06 I want to touch on the puppet modules for a moment 16:36:13 great 16:36:14 luis_fdez: we're going to be starting cleanup work 16:36:25 primeministerp: ok great :) 16:36:26 luis_fdez: in order to get things ready for puppetforge 16:36:33 luis_fdez: so I'll be looking into your bits 16:36:44 luis_fdez: sorry for the delay 16:36:44 Ok, I have to push local changes for the refactoring of: 16:36:49 nova_hyper_v... 16:36:53 luis_fdez: great 16:36:55 I also have some work done in 16:36:57 ceilometer_hyper_v 16:37:11 luis_fdez: let's align over the next week or so 16:37:15 I'm trying to align with the main stackforge modules structure 16:37:17 ok 16:37:18 perfect 16:37:26 luis_fdez: great 16:37:46 luis_fdez: let's keep that going, i want to get to the point where we could potentially merge into existing modules if possible 16:37:55 luis_fdez: knowing that will take some time 16:38:06 ok, perfect 16:38:19 luis_fdez: It may be another week before I get to get my hands more into the code 16:38:31 no problem 16:38:33 Hello Guys, I am also working on HyperV for openstack as a compute node, I'd like to contribute on this effort 16:38:34 luis_fdez: still trying to get back into things after two weeks at the mothership 16:38:41 hehe 16:38:44 digambar: hey there 16:38:48 yes 16:38:52 digambar: have you seen the existing bits 16:39:11 digambar: https://github.com/openstack-hyper-v/puppet-openstack_hyper_v 16:39:14 just joined here 16:39:16 ok 16:39:18 digambar: o great 16:39:19 digambar: cool, welcome onboard! 16:39:34 Thank you guys :) 16:39:38 digambar: what time zone are you in? 16:39:46 IST 16:39:57 digambar: we can have a call/skype and I can catch up 16:40:11 absolutely 16:40:18 we can 16:40:23 can you email me ppouliot@microsoft.com 16:40:38 digambar: ^^ and I'll work on scheduling something 16:40:51 digambar: for later this week 16:40:53 yep, I'll mail you on this 16:40:56 yep 16:40:58 digambar: perfect 16:41:03 :) 16:41:26 digambar: the main channel for the project is #openstack-hyper-v 16:41:28 luis_fdez: let's touch base later in the week too to see where we each stand 16:41:34 ok primeministerp 16:41:39 luis_fdez: I need to catch up w/ vijay and tim and see what they want to take on 16:41:59 luis_fdez: anything else to add? 16:42:00 Sure, I'll be available from today on this node 16:42:09 digambar: great 16:42:14 I'm also thinking about have some kind of 'meta python module' like other linux distribution have like 'openstack-nova-common' 16:42:41 luis_fdez: we sort of started one 16:42:43 yep 16:42:48 luis_fdez: w/ our python module 16:42:58 it's the easiest aproach to align with stackforge modules but not sure if it's the best option. 16:43:11 luis_fdez: we're prob going to have to do it 16:43:23 luis_fdez: considering the different options for getting the python bits 16:43:27 yeps 16:43:41 luis_fdez: esp w/ what we're doing w/ the autocompilation 16:44:28 ok then, if there's nothing else 16:44:33 i think we'll end it here 16:44:42 ok, have a nice day all of you :) 16:44:45 #endmeeting