15:00:39 #startmeeting manila 15:00:40 Meeting started Thu Sep 8 15:00:39 2016 UTC and is due to finish in 60 minutes. The chair is bswartz. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:41 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:43 The meeting name has been set to 'manila' 15:00:44 hello all 15:00:45 Hi 15:00:47 hello o/ 15:00:47 hi 15:00:48 hi 15:00:48 hello 15:00:49 \\// 15:00:53 Hello 15:00:55 hi 15:01:01 hi 15:01:24 hello 15:01:27 hi 15:01:27 hi 15:01:42 #agenda https://wiki.openstack.org/wiki/Manila/Meetings 15:01:58 #topic RC1 status 15:02:50 so we're driving towards RC1 15:02:59 the target date for that is just 1 week away 15:03:06 #link https://launchpad.net/manila/+milestone/newton-rc1 15:03:19 hi 15:03:38 the goal is to fix a the targeted bugs and the tag/branch 15:04:01 if anyone knows about bugs that need fixing, please make sure they're targetted, ideally by today 15:04:27 bswartz: actually we have lots of bugs with proposed fixes but not targeted 15:04:33 we're not going to allow targeting of new bugs to the RC unless they're critical after today 15:04:53 vponomaryov: let's get them targeted 15:05:12 my criteria for tagging RC1 will be when that list on LP has zero open bugs 15:06:22 #topic Project Logo 15:06:29 #link http://civs.cs.cornell.edu/cgi-bin/vote.pl?id=E_6f0d111cec78c5ef&akey=d34a751f2d084d79 15:06:42 For those who haven't voted on the new logo, there is the link 15:07:07 I'm using CIVS this time around because it allows us to determine a #2 and #3 winner in case the new winner is disqualified like the last one was 15:07:27 the poll closes tomorrow at noon UTC 15:08:07 #topic Container Driver Security 15:08:11 is it working for everybody? I got a blank page after I voted 15:08:19 * bswartz goes to look for link 15:08:38 so, there is a bug in the container driver 15:08:38 #link https://review.openstack.org/#/c/353463/ 15:08:51 #link https://bugs.launchpad.net/manila/+bug/1613675 15:08:51 Launchpad bug 1613675 in Manila "Container driver does not actually mount logical volumes" [High,In progress] - Assigned to Alexey Ovchinnikov (aovchinnikov) 15:08:59 and that's the bug 15:09:25 the proposed solution has attracted some criticism 15:09:32 there were some questions about the security implications of running containers in privileged mode 15:09:36 I've heard concerns from several community members about security aspects of this approach 15:10:33 My opinion on this is that: we're not using containers for any kind of security enforcement, we're using them for network namespace separation, and therefore whether the container is privileged or not doesn't matter 15:10:34 yes, also the way /dev is proposed to be handled by containers looks dangerous 15:10:46 nothing the container driver does is more dangerous than what the LVM driver does 15:11:06 I'd like to stress it that the only point of using containers in this driver is to avoid direct network namespaces manipulations 15:11:35 that is the sole purpose of containers here 15:11:57 so probably we should not worry too much about possible security risks here 15:12:19 as bswartz has mentioned it is not less secure than LVM driver 15:12:40 do we explicitly address the question of 15:12:44 ganso dgonzalez: does that make sense to you? 15:13:13 whether container and lvm drivers should be used in non POC and non-gate-testing environments? 15:13:14 bswartz: yes, if the vulnerability is present in other drivers as well, seems there is nothing much we can do 15:13:21 bswartz: it makes sense, but if there is a way to avoid mount /dev i would prefer it... 15:13:26 also suggestions and alternative opinions are welcome 15:13:45 dgonzalez: +1 15:13:49 dgonzalez: from what I know about docker, I'm fairly certain it's not -- docker doesn't support dynamically adding storage to running containers 15:14:27 Is it possible to stop the container and then start it with a new volume? 15:14:29 basically we treat every container the same as we treat the host 15:14:37 dgonzalez, ganso: it is definitely not the best thing to do, but it seems to be the only way to do it 15:14:46 dgonzalez: that would be supremely disruptive to clients 15:14:52 dgonzalez: what if someone is doing heavy io right at the moment? 15:15:42 aovchinnikov: right, that would be bad :D 15:16:19 dgonzalez: that is a very mild way to describe it:) 15:16:38 so apparently we have to mount the entire /dev to each container for now 15:16:45 personally I don't believe we even need docker's mount namespace separation -- we're only interested in the network, uts, and user namespaces being separate 15:17:16 that should nt be a problem as long as there are no exploitable bits in smbd 15:17:17 however we're chose docker because it's well understood and widely supported, rather than cooking up our own container-thingy 15:17:48 and we won't need to support our own solution 15:17:52 Seems like attaching a new volume to a running contaienr is possible via the API: https://github.com/docker/docker/issues/10975 15:17:57 and to add to what aovchinnikov said, if there are security holes in smbd, then they affect lvm driver too 15:18:00 But i am not sure if this helps us :P 15:18:22 is that a good argument? 15:18:30 dgonzalez: afaik it is not that simple 15:18:32 dgonzalez: I've seen that page -- it container inaccurate information 15:18:43 s/container/contains/ 15:19:18 i go back to the question of the scope and purpose of container and lvm drivers 15:19:39 dgonzalez: however if you can find a way to correctly plug new filesystems into a running docker container, then we would enthusiastically accept such a patch 15:20:09 tbarron: I wonder the same 15:20:29 we should consider the driver being used in production 15:20:43 tbarron: POC, gate and dev environments now, production at some point later 15:20:43 tbarron: container driver support share servers in the most efficient way we can do with open source 15:21:05 IMO the design of the driver is fits production use cases well 15:21:16 security concerns about real tenants escaping their walls in production may be very different than if they are not meant for production and that is explicitly stated 15:21:21 the main thing preventing container driver from running in production is the severe limitations of nfs-ganesha 15:22:00 ok, then we should ask that containers provide as good walls around tenants as do vm instnaces, right? 15:22:06 tbarron, We need to be very careful of supporting a driver for PoC/Test only because once they get out in the wild they end up in production. 15:22:27 tbarron: I'll try to make this pefectly clear -- the containers we create are NOT ACCESSIBLE to tenants -- they are merely for our own convenience to put samba into a tenant's network 15:22:44 (and nfs-ganesha in the future) 15:23:26 similar issues exist with q-dhcp and q-l3 -- those run in containers with no mount namespace protection 15:23:42 however nobody worries about this because those containers aren't accessible to tenants 15:24:46 bswartz: but when the container is attchaed to a tenant network, couldn't somebody gain access to it through security holes in samba? 15:24:52 yeah, i'm not arguing that the container driver is *not* secure enough, i'm just seeking clarity and what criteria are appropriate 15:25:21 dgonzalez: in theory he can do that 15:25:26 dgonzalez: yes! and the same is true for generic driver and lvm driver and zfs driver, and if ther are security holes in dnsmasq then the same is true for q-dhcp, etc 15:26:05 what I'm trying to argue is that what we're doing with container driver is no worse than what we do everywhere else 15:26:13 well, it will hurt less in the case of the generic driver 15:26:19 a little less 15:26:41 aovchinnikov: that's not true -- if you get into the service VM you have network access to the backend resources and you can do terrible things 15:27:18 yes, sure, but at least you are not seeing other's data immediately 15:27:33 bswartz: but if you have access to a container which can tamper with /dev from the host, you can mess with stuff that belongs to other containers and therefore other tenants 15:27:56 dgonzalez: the same is true of every first party driver 15:28:01 it is a couple of commands away. I guess this could be considered as little. 15:28:43 dgonzalez: when you have access to a generic driver's VM you still have a chance to mess with other's data 15:28:46 if you can exploit the server then you can gain access to other tenant's data with all of our first party drivers 15:29:15 we rely on samba and nfsd being secure as part of our security for manila 15:29:23 if they're not secure, we have much bigger problems 15:29:34 bswartz: ok, I didn't know that 15:30:16 with the generic driver we have a better chance to isolate tenants from attacks 15:30:46 with container/lvm/zfs it's really impossible to get secure separation if the client is able to hack samba/nfsd 15:30:58 okay we have several more agenda items so I'd like to move on 15:31:15 to get back on topic: I'm fine with mounting /dev in containers if there is no other way to do it. But i think we should warn users that there is no real isolation between teh data of different tenants 15:31:21 bswartz: +1 15:31:28 dgonzalez: that makes sense 15:31:56 we should ensure that admins are aware that the container driver doesn't offer any additional security compared to lvm/zfs 15:32:08 it's main value is support of share servers 15:32:30 #topic Security "vulnerability-managed" tag for manila 15:32:33 tbarron: you're up 15:32:54 I asked and yes, it is is important for us that all projecs that we ship as more than just "tech preview" have the managed vulnerability tag. 15:32:54 It's understood that the burden for getting the tag for newer projects is heavier than for established projects to keep it, but 15:32:54 we're expected to advocate for projects in which particpate to pursue the tag, and to work to make this feasi 15:33:05 feasible 15:33:39 tbarron: I abandoned the governance change related to this 15:33:50 bswartz: yes, you did 15:34:08 it's not clear to me how we get an independent security review of the project without someone volunteering to spend money 15:34:38 bswartz: I don't think that kind of external security audit was being requested 15:34:51 * bswartz goes to look for link 15:34:59 shouldn't the security audit be performed by the security council in OpenStack? 15:35:12 vkmc: It's not an "audit" 15:35:25 and prjects are OpenStack 15:35:33 #link http://governance.openstack.org/reference/tags/vulnerability_managed.html#requirements 15:35:45 we have to contribute and be a part of openstack, not run independently 15:36:05 Oh i wonder if the wording changed here 15:36:17 tbarron++ 15:36:26 the wording is "The deliverable?s repos should undergo a review, audit, or threat analysis looking for obvious signs of insecure design or risky implementation which could imply a large number of future vulnerability reports. The review, audit, or threat analysis may be done by the project team itself or an impartial third party. In the event the project team involved in the tagging peforms the review, audit, or threat analysis, the results 15:36:46 right, talking to fungi, the important thing was to "get started" on this 15:37:16 ihere is the current template :) 15:37:17 I'm not sure who normally undertakes these kind of reviews 15:37:23 https://git.openstack.org/cgit/openstack/security-analysis/tree/doc/source/templates/ 15:37:35 manila would be a pioneer, set precedent 15:37:48 and would be an awesome precedent to set 15:38:00 still, we need volunteers to do this work 15:38:08 i volunteer 15:38:17 i can help 15:38:19 i recommend popping into the security team's weekly meeting too and expressing your interest in being an early adopter of that process they've been designing 15:38:19 tbarron: awesome! thank you 15:38:43 tbarron: since you're on the project team, who could perform the third party validation of your work? 15:39:07 fungi: ?? ^^ 15:39:47 the text says: 15:39:54 well that's not something we need to address today 15:40:02 as long as we have a volunteer we can get started 15:40:11 and find a third party to validate results in parallel 15:40:23 I'm guessing projects may validate other projects for third party signoff 15:40:56 but if the manila community is OK with it I can get the ball rolling and we'll see where it goes 15:41:06 tbarron: so at what point should I restore my governance change? 15:41:17 is your understanding that we can request that tag before the review is complete? 15:41:42 how about I go to the security meeting that fungi pointed to and report back 15:41:51 okay 15:41:56 anything else on this topic? 15:41:59 and anyone else interested from manila too of course 15:42:10 gouthamr: ^ 15:42:14 yeah, the vmt is really fairly autonomous and not deeply involved with the security team. we're mostly separate groups except from a governance standpoint 15:42:34 i in fact usually don't have time to lurk the security team meeting and only pop in when summoned 15:42:54 #topic Zanata translations for manila-client and manila-ui 15:43:04 tbarron: this is you again 15:43:16 i meant to say for manila and manila client 15:43:22 we have them for manila ui 15:43:25 o_O 15:43:39 any objection to adding them to the main components too? 15:43:41 #undo 15:43:42 Removing item from minutes: 15:43:44 #topic Zanata translations for manila and python-manilaclient 15:44:07 bswartz: ty 15:44:29 I don't see why we wouldn't want this 15:44:29 no objections, translations are probably of great help to greater adoption 15:44:39 but i want to clarify why we'd stop backports 15:44:39 and if not, then waht is the correct interpretation of https://wiki.openstack.org/wiki/Translations#String_Freeze w.r.t timing 15:44:42 what issues exist with zanata? 15:44:53 ah, my question too :) 15:45:15 i think we can add zanata, we just can't add new strings :) 15:45:16 yes, string freeze has been a confusing topic for people 15:45:31 or do we have to wait till Ocata to turn on zanata 15:45:33 ? 15:45:39 when I -1 stuff for string freeze violations people always point out that we don't have any translations 15:45:57 my response is that we need to follow the rules if we want to have translations 15:46:03 but perhaps I'm wrong? 15:46:04 +1 15:46:07 https://review.openstack.org/#/c/337065/ is a pretty important bugfix for our customer; and it happens to introduce a translated string.. i wasn't able to find any place where it says this is forbidden? 15:46:41 i think there's email, prob. from dhellman 15:47:07 about string freeze itself 15:47:11 gouthamr: http://docs.openstack.org/project-team-guide/release-management.html 15:47:13 new string is ok 15:47:28 xyang1: new strings are okay up until hard string freeze 15:47:48 stable releases are permanently in hard string freeze AIUI 15:48:24 so this is good to talk about but wasn't actually what i was asking, i will wait to pop stack though 15:49:05 so when we have the translation catalogs in our project, we could include the translations in the backport itself.. 15:49:10 if we didn't enforce hard string freeze on stable stuff, then translators would have to watch all the stable branches all the time, which doesn't scale well 15:49:35 gouthamr: that sounds like a suggestion for the release mgmt team 15:49:47 i actually found that wording somewhere else 15:49:54 we're not going to make up our own rules for backports 15:49:56 * gouthamr looks for a link 15:50:30 sure.. but respectfully, i have been able to backport stuff in other projects :) i dunno if this is a new restriction 15:50:58 gouthamr: probably stable-maint reviewers not enforcing rules correctly -- you got lucky 15:51:05 okay so let's get back to what tbarron was asking about 15:51:19 * bswartz looks at clock 15:51:28 can we turn on zanata now, as a bug, or do we have to wait till O? 15:51:41 tbarron: I see no reason not to turn it on -- what risk could it possibly introduce? 15:51:53 just checking 15:52:27 that's all i have on this one 15:52:34 anyone disagree and think we should wait until ocata to turn on translations? 15:52:37 my ask is that we backport pending backports and then turn this on and gate on it, and call it out in the devref and make this very clear that even if a critical bugfix comes along, it can't be backported if it has a translatable string 15:53:08 gouthamr: whether we do translations or not, I still believe we need to enforce the string freeze 15:53:10 i don't understand the reasoning very well, and i might be wrong.. but this is breaking the contract that we will backport bugfixes that affect our users 15:53:56 okay 1 last topic 15:54:02 #topic Tempest direction 15:54:11 tbarron: you're up one last time 15:54:14 bswartz: what all constitute a "user facing string"? this is confusing, perhaps a mailing list item.. 15:54:15 let's take that one up next time as it's big, but 15:54:24 gouthamr: anything with _() 15:54:38 https://review.openstack.org/#/c/365250/ could use attention 15:54:41 tbarron: can you get this started? 15:55:20 yeah, the bigger topic is maybe we should write down our near term tactical approaches to tempest stability and longer term goals 15:55:28 and see if we can get agreement on these 15:55:42 tbarron: not a bad idea 15:55:47 but short term, while we don't have tempest lib, etc. it will be helpful 15:56:01 it's written down in meeting minutes already -- where else do you propose capturing this? 15:56:12 to advance the sha for the tempest we run to match the tempest label 12.2.0 15:56:18 hence above review 15:56:36 as new people come in, it's hard to have to read all the backlog 15:56:47 yeah I agree, but where? 15:56:52 probably we should have a devref? 15:56:54 is it a wiki thing? a devref thing? 15:57:01 +1 devref 15:57:23 devref is supposed to be a reference document for how stuff works today 15:57:34 typically you don't discuss future plans in a devref 15:57:39 perhaps a spec.... 15:57:48 it could start as an etherpad and evolve to more durable form, perhaps a spec 15:58:01 as long as that isn't a graveyard :) 15:58:11 tbarron: that's a whole other topic 15:58:13 +1 :P 15:58:24 one that I'm eager to address before barcelona 15:58:24 bswartz: XDXD 15:59:01 #topic open discussion 15:59:07 okay 1 minute for any last things 15:59:30 reminder: vote for our mascot/logo 15:59:42 reminder: make sure bugs are targeted to RC1 if they need to be 15:59:50 thanks everyone 15:59:59 #endmeeting